Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler. Number of rules (primarily dangerous function names) in C/C++ ruleset: 223 Examining data/openjdk-11-jre-dcevm-11.0.9+1/make/hotspot/src/native/dtrace/generateJvmOffsets.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/make/langtools/test/HelloWorld.gold.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/aarch64Test.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/abstractInterpreter_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/bytecodes_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/bytecodes_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/bytes_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_CodeStubs_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_Defs_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_FpuStackSim_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_FpuStackSim_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_FrameMap_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_FrameMap_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LIRAssembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LIRAssembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LIRGenerator_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LIR_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LinearScan_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_LinearScan_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_MacroAssembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_MacroAssembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_Runtime1_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c1_globals_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c2_globals_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/c2_init_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/codeBuffer_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/compiledIC_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/compiledIC_aot_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/copy_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/depChecker_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/depChecker_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/disassembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/g1/g1BarrierSetAssembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/g1/g1BarrierSetAssembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/barrierSetAssembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/barrierSetAssembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/cardTableBarrierSetAssembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/cardTableBarrierSetAssembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/modRefBarrierSetAssembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shared/modRefBarrierSetAssembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/shenandoahBarrierSetAssembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/shenandoahBarrierSetAssembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/globalDefinitions_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/globals_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/icBuffer_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/icache_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/icache_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/immediate_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/immediate_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/interp_masm_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/interp_masm_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/interpreterRT_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/interpreterRT_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/javaFrameAnchor_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/jniFastGetField_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/jniTypes_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/jvmciCodeInstaller_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64_log.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64_trig.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/methodHandles_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/methodHandles_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/nativeInst_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/nativeInst_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/registerMap_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/register_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/register_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/register_definitions_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/relocInfo_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/relocInfo_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/runtime_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/sharedRuntime_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/stubGenerator_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/stubRoutines_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/stubRoutines_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateInterpreterGenerator_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vmStructs_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vmreg_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vmreg_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vmreg_aarch64.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vtableStubs_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/abstractInterpreter_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm_32.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/assembler_arm_64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/bytes_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_CodeStubs_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_Defs_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_FpuStackSim_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_FpuStackSim_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_FrameMap_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_FrameMap_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIRAssembler_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIRAssembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIRGenerator_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIRGenerator_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LIR_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LinearScan_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_LinearScan_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_MacroAssembler_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_MacroAssembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_Runtime1_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c1_globals_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/c2_globals_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/codeBuffer_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/compiledIC_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/copy_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/depChecker_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/depChecker_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/disassembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/frame_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/frame_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/frame_arm.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/g1/g1BarrierSetAssembler_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/g1/g1BarrierSetAssembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/barrierSetAssembler_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/barrierSetAssembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/cardTableBarrierSetAssembler_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/cardTableBarrierSetAssembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/modRefBarrierSetAssembler_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/gc/shared/modRefBarrierSetAssembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/globalDefinitions_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/globals_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/icBuffer_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/icache_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/icache_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interp_masm_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interp_masm_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interpreterRT_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interpreterRT_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/javaFrameAnchor_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/jniFastGetField_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/jniTypes_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/jvmciCodeInstaller_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/macroAssembler_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/macroAssembler_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/macroAssembler_arm.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/methodHandles_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/methodHandles_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm_32.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/nativeInst_arm_64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/registerMap_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/register_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/register_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/register_definitions_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/relocInfo_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/relocInfo_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/runtime_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/sharedRuntime_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubGenerator_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutines_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutines_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateInterpreterGenerator_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vmStructs_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vmreg_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vmreg_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vmreg_arm.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vtableStubs_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/abstractInterpreter_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/bytes_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_CodeStubs_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Defs_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_FpuStackSim_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_FrameMap_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_FrameMap_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRGenerator_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIR_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LinearScan_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LinearScan_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_globals_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c2_globals_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c2_init_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/codeBuffer_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/compiledIC_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/copy_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/depChecker_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/disassembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/frame_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/frame_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/frame_ppc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/barrierSetAssembler_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/barrierSetAssembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/cardTableBarrierSetAssembler_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/cardTableBarrierSetAssembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/modRefBarrierSetAssembler_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/shared/modRefBarrierSetAssembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/globalDefinitions_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/globals_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/icBuffer_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/icache_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/icache_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interpreterRT_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interpreterRT_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/javaFrameAnchor_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/jniFastGetField_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/jniTypes_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/jvmciCodeInstaller_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/methodHandles_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/methodHandles_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/nativeInst_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/nativeInst_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/registerMap_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/register_definitions_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/register_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/register_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/relocInfo_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/relocInfo_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/runtime_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/sharedRuntime_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubRoutines_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubRoutines_ppc_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateInterpreterGenerator_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vmStructs_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vmreg_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vmreg_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vmreg_ppc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vtableStubs_ppc_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/abstractInterpreter_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/assembler_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/assembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/assembler_s390.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/bytes_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_CodeStubs_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_Defs_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_FpuStackSim_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_FrameMap_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_FrameMap_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LIRAssembler_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LIRAssembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LIRGenerator_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LIR_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LinearScan_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_LinearScan_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_MacroAssembler_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_MacroAssembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_Runtime1_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_globals_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c2_globals_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c2_init_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/codeBuffer_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/compiledIC_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/copy_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/depChecker_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/disassembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/g1/g1BarrierSetAssembler_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/g1/g1BarrierSetAssembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/barrierSetAssembler_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/barrierSetAssembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/cardTableBarrierSetAssembler_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/cardTableBarrierSetAssembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/modRefBarrierSetAssembler_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/gc/shared/modRefBarrierSetAssembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/globalDefinitions_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/globals_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/icBuffer_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/icache_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/icache_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/interp_masm_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/interp_masm_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/interpreterRT_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/interpreterRT_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/javaFrameAnchor_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/jniFastGetField_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/jniTypes_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/jvmciCodeInstaller_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/macroAssembler_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/macroAssembler_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/macroAssembler_s390.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/methodHandles_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/methodHandles_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/nativeInst_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/nativeInst_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/registerMap_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/registerSaver_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/register_definitions_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/register_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/register_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/relocInfo_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/relocInfo_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/runtime_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/sharedRuntime_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/stubGenerator_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/stubRoutines_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/stubRoutines_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/templateInterpreterGenerator_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/templateTable_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/templateTable_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vmStructs_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vmreg_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vmreg_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vmreg_s390.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vtableStubs_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/abstractInterpreter_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/assembler_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/assembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/assembler_sparc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/bytes_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_CodeStubs_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_Defs_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_FpuStackSim_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_FpuStackSim_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_FrameMap_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_FrameMap_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRGenerator_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIR_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LinearScan_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LinearScan_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_Runtime1_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_globals_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c2_globals_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c2_init_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/codeBuffer_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/compiledIC_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/copy_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/depChecker_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/depChecker_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/disassembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/frame_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/frame_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/frame_sparc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/barrierSetAssembler_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/barrierSetAssembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/cardTableBarrierSetAssembler_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/cardTableBarrierSetAssembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/modRefBarrierSetAssembler_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/modRefBarrierSetAssembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/globalDefinitions_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/globals_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/icBuffer_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/icache_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/icache_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interpreterRT_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interpreterRT_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/javaFrameAnchor_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/jniFastGetField_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/jniTypes_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/jvmciCodeInstaller_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/memset_with_concurrent_readers_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/registerMap_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/register_definitions_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/register_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/register_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/relocInfo_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/relocInfo_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/runtime_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubRoutines_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubRoutines_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vmStructs_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vmreg_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vmreg_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vmreg_sparc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vtableStubs_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/abstractInterpreter_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/assembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/assembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/assembler_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/bytes_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_CodeStubs_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Defs_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_FpuStackSim_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_FpuStackSim_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_FrameMap_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_FrameMap_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRGenerator_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIR_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LinearScan_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LinearScan_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_MacroAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_globals_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c2_globals_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c2_init_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/codeBuffer_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/compiledIC_aot_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/compiledIC_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/copy_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/crc32c.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/depChecker_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/depChecker_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/disassembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/frame_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/frame_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/frame_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/modRefBarrierSetAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/modRefBarrierSetAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/z/zBarrierSetAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/z/zBarrierSetAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/globalDefinitions_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/globals_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/icBuffer_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/icache_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/icache_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interpreterRT_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interpreterRT_x86_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interpreterRT_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/javaFrameAnchor_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/jniFastGetField_x86_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/jniFastGetField_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/jniTypes_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/jvmciCodeInstaller_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/rdtsc_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/rdtsc_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/registerMap_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/registerMap_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/register_definitions_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/register_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/register_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/relocInfo_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/relocInfo_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/runtime_x86_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/runtime_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubRoutines_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubRoutines_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubRoutines_x86_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubRoutines_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vmStructs_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vmreg_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vmreg_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vmreg_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/abstractInterpreter_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/assembler_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/assembler_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/assembler_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/bytecodeInterpreter_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/bytecodeInterpreter_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/bytecodeInterpreter_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/bytes_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/codeBuffer_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/compiledIC_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/copy_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/cppInterpreterGenerator_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/cppInterpreter_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/cppInterpreter_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/depChecker_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/depChecker_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/disassembler_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/disassembler_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/entryFrame_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/entry_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/fakeStubFrame_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/gc/g1/g1BarrierSetAssembler_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/gc/shared/barrierSetAssembler_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/gc/shared/cardTableBarrierSetAssembler_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/gc/shared/modRefBarrierSetAssembler_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/globalDefinitions_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/globals_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/icBuffer_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/icache_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/icache_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/interp_masm_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/interpreterFrame_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/interpreterRT_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/interpreterRT_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/javaFrameAnchor_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/jniFastGetField_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/jniTypes_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/macroAssembler_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/macroAssembler_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/methodHandles_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/methodHandles_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/nativeInst_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/nativeInst_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/registerMap_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/register_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/register_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/relocInfo_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/relocInfo_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/sharedRuntime_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stack_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stack_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stack_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stubGenerator_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stubRoutines_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/stubRoutines_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vmStructs_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vmreg_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vmreg_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vmreg_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vtableStubs_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/c1_globals_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/c2_globals_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/decoder_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/globals_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libo4.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libo4.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libodm_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libodm_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/loadlib_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/loadlib_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/misc_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/misc_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/osThread_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/osThread_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_share_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/safepointMechanism_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/threadCritical_aix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/vmStructs_aix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/c1_globals_bsd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/c2_globals_bsd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/decoder_machO.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/decoder_machO.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/globals_bsd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/osThread_bsd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/osThread_bsd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_share_bsd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/semaphore_bsd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/semaphore_bsd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/threadCritical_bsd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/vmStructs_bsd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/c1_globals_linux.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/c2_globals_linux.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/decoder_linux.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/globals_linux.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osThread_linux.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osThread_linux.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_share_linux.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/threadCritical_linux.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/vmStructs_linux.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/include/jvm_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/jvm_posix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/semaphore_posix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/semaphore_posix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/threadLocalStorage_posix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/vmError_posix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/c1_globals_solaris.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/c2_globals_solaris.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/decoder_solaris.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/globals_solaris.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/osThread_solaris.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/osThread_solaris.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_share_solaris.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/threadCritical_solaris.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/vmStructs_solaris.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/c1_globals_windows.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/c2_globals_windows.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/decoder_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/globals_windows.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/include/jvm_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/iphlp_interface.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/iphlp_interface.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/jvm_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/osThread_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/osThread_windows.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_share_windows.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/pdh_interface.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/pdh_interface.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/semaphore_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/semaphore_windows.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/sharedRuntimeRem.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/threadCritical_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/threadLocalStorage_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/vmError_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/vmStructs_windows.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/atomic_aix_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/bytes_aix_ppc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/globals_aix_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/orderAccess_aix_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/os_aix_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/os_aix_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/prefetch_aix_ppc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/thread_aix_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/thread_aix_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/vmStructs_aix_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/assembler_bsd_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/atomic_bsd_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/bytes_bsd_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/copy_bsd_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/globals_bsd_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/orderAccess_bsd_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/prefetch_bsd_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/thread_bsd_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/thread_bsd_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/vmStructs_bsd_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/vm_version_bsd_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/assembler_bsd_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/atomic_bsd_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/bytes_bsd_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/globals_bsd_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/orderAccess_bsd_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/prefetch_bsd_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/thread_bsd_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/thread_bsd_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/vmStructs_bsd_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/vm_version_bsd_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/assembler_linux_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/atomic_linux_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/bytes_linux_aarch64.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/copy_linux_aarch64.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/globals_linux_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/orderAccess_linux_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/os_linux_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/os_linux_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/os_linux_aarch64.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/prefetch_linux_aarch64.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/thread_linux_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/thread_linux_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/vmStructs_linux_aarch64.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/vm_version_linux_aarch64.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/atomic_linux_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/bytes_linux_arm.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/copy_linux_arm.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/globals_linux_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/macroAssembler_linux_arm_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/orderAccess_linux_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/os_linux_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/os_linux_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/prefetch_linux_arm.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/thread_linux_arm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/thread_linux_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/vmStructs_linux_arm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/vm_version_linux_arm_32.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/atomic_linux_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/bytes_linux_ppc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/globals_linux_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/orderAccess_linux_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/os_linux_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/os_linux_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/prefetch_linux_ppc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/thread_linux_ppc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/thread_linux_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/vmStructs_linux_ppc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/atomic_linux_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/bytes_linux_s390.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/globals_linux_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/orderAccess_linux_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/os_linux_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/os_linux_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/prefetch_linux_s390.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/thread_linux_s390.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/thread_linux_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/vmStructs_linux_s390.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/atomic_linux_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/globals_linux_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/orderAccess_linux_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/os_linux_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/os_linux_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/prefetch_linux_sparc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/thread_linux_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/thread_linux_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vmStructs_linux_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/assembler_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/atomic_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/bytes_linux_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/copy_linux_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zAddress_linux_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingPath_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingPath_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zGlobals_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zGlobals_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zLargePages_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zNUMA_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zPhysicalMemoryBacking_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zPhysicalMemoryBacking_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zVirtualMemory_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/globals_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/orderAccess_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/os_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/os_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/os_linux_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/prefetch_linux_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/thread_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/thread_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/vmStructs_linux_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/vm_version_linux_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/assembler_linux_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/atomic_linux_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/bytes_linux_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/globals_linux_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/orderAccess_linux_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/os_linux_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/prefetch_linux_zero.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/thread_linux_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/thread_linux_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/vmStructs_linux_zero.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/vm_version_linux_zero.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/atomic_solaris_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/count_trailing_zeros_solaris_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/globals_solaris_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/orderAccess_solaris_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/os_solaris_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/os_solaris_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/prefetch_solaris_sparc.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/thread_solaris_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/thread_solaris_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/vmStructs_solaris_sparc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/vm_version_solaris_sparc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/assembler_solaris_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/atomic_solaris_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/bytes_solaris_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/copy_solaris_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/count_trailing_zeros_solaris_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/globals_solaris_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/orderAccess_solaris_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/os_solaris_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/os_solaris_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/os_solaris_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/prefetch_solaris_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/thread_solaris_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/thread_solaris_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/vmStructs_solaris_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/vm_version_solaris_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/assembler_windows_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/atomic_windows_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/bytes_windows_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/globals_windows_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/orderAccess_windows_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/prefetch_windows_x86.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/thread_windows_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/thread_windows_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/unwind_windows_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/vmStructs_windows_x86.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/vm_version_windows_x86.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/arena.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/arena.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/filebuff.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/filebuff.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/forms.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/forms.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formsopt.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formsopt.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCompiledMethod.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCompiledMethod.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/compiledIC_aot.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/compiledIC_aot.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/assembler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/assembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/assembler.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/codeBuffer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/codeBuffer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/macroAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/macroAssembler.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/register.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/asm/register.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_CFGPrinter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_CFGPrinter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Canonicalizer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Canonicalizer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_CodeStubs.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compilation.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compilation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compiler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compiler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Decorators.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Defs.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Defs.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_FpuStackSim.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_FrameMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_FrameMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_GraphBuilder.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_GraphBuilder.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_IR.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_IR.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Instruction.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Instruction.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_InstructionPrinter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_InstructionPrinter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIR.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIR.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRAssembler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LinearScan.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LinearScan.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_MacroAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Optimizer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Optimizer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_RangeCheckElimination.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_RangeCheckElimination.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueStack.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueStack.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueType.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_ValueType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_globals.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/bcEscapeAnalyzer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/bcEscapeAnalyzer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciArrayKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciArrayKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciBaseObject.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciBaseObject.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciCallProfile.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciCallSite.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciCallSite.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciClassList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciConstant.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciConstant.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciConstantPoolCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciConstantPoolCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciExceptionHandler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciExceptionHandler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciField.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciField.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciFlags.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciFlags.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstance.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstance.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstanceKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstanceKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMemberName.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMemberName.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMetadata.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMetadata.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethod.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethod.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodBlocks.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodBlocks.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodData.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodHandle.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodHandle.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodType.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciNullObject.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciNullObject.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArrayKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArrayKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObject.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObject.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjectFactory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjectFactory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciSignature.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciSignature.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciStreams.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciStreams.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciSymbol.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciSymbol.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciType.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeArrayKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeArrayKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeFlow.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeFlow.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciUtilities.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciUtilities.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciUtilities.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/compilerInterface.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/altHashing.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/altHashing.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/bytecodeAssembler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/bytecodeAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileError.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderData.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderData.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderHierarchyDCmd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderHierarchyDCmd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderStats.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderStats.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/defaultMethods.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/defaultMethods.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dictionary.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dictionary.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dictionary.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/klassFactory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/klassFactory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/loaderConstraints.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/loaderConstraints.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/metadataOnStackMark.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/metadataOnStackMark.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/moduleEntry.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/moduleEntry.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/packageEntry.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/packageEntry.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/placeholders.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/placeholders.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/protectionDomainCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/protectionDomainCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/resolutionErrors.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/resolutionErrors.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapFrame.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapFrame.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stackMapTableFormat.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stringTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/stringTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/systemDictionary.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/systemDictionary.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/systemDictionaryShared.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/systemDictionaryShared.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verificationType.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verificationType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledIC.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledIC.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledMethod.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledMethod.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compiledMethod.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/debugInfo.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/debugInfo.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/debugInfoRec.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/debugInfoRec.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencies.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencies.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencyContext.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencyContext.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/exceptionHandlerTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/exceptionHandlerTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/icBuffer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/icBuffer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/location.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/location.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nativeInst.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nmethod.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nmethod.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/oopRecorder.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/oopRecorder.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/pcDesc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/pcDesc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/relocInfo.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/relocInfo.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/relocInfo_ext.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/relocInfo_ext.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/scopeDesc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/scopeDesc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/stubs.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/stubs.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vmreg.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vmreg.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vmreg.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vtableStubs.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/vtableStubs.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/abstractCompiler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/abstractCompiler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileTask.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileTask.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDefinitions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDefinitions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodLiveness.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodLiveness.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/oopMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/oopMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/adaptiveFreeList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/adaptiveFreeList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/allocationStats.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/allocationStats.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsArguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsArguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsCardTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsCardTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsCollectorPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsCollectorPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsGCStats.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsGCStats.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsHeap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsLockVerifier.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsLockVerifier.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsOopClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cmsOopClosures.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/cms_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/compactibleFreeListSpace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/compactibleFreeListSpace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/compactibleFreeListSpace.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/freeChunk.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/freeChunk.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/gSpaceCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/gSpaceCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/jvmFlagConstraintsCMS.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/jvmFlagConstraintsCMS.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parNewGeneration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parNewGeneration.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parNewGeneration.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parOopClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/parOopClosures.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/promotionInfo.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/promotionInfo.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/promotionInfo.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/vmCMSOperations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/vmCMSOperations.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/vmStructs_cms.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/yieldingWorkgroup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/yieldingWorkgroup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonArguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonArguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonBarrierSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonBarrierSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonCollectorPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMemoryPool.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMemoryPool.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonThreadLocalData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilon_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/vmStructs_epsilon.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/collectionSetChooser.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/collectionSetChooser.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/dirtyCardQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/dirtyCardQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/evacuationInfo.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1AllocRegion.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1AllocRegion.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1AllocRegion.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Analytics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Analytics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSetAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSetRuntime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BarrierSetRuntime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BiasedArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BiasedArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BlockOffsetTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BlockOffsetTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1BlockOffsetTable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardCounts.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardCounts.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CardTable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeBlobClosure.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeBlobClosure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeCacheRemSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeCacheRemSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CodeRootSetTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectionSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectionSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectorPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectorPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectorState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentRefine.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentRefine.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentRefineThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentRefineThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EdenRegions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacFailure.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacFailure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacStats.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacStats.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1EvacStats.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FromCardCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FromCardCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullCollector.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullCollector.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCAdjustTask.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCAdjustTask.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCCompactTask.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCCompactTask.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCCompactionPoint.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCCompactionPoint.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarkTask.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarkTask.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCMarker.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCOopClosures.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCOopClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCOopClosures.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCPrepareTask.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCPrepareTask.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCReferenceProcessorExecutor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCReferenceProcessorExecutor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCScope.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCScope.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCTask.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1FullGCTask.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1GCPhaseTimes.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1GCPhaseTimes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HRPrinter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapRegionEventSender.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapRegionEventSender.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapRegionTraceType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapSizingPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapSizingPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapSizingPolicy_ext.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapTransition.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapTransition.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapVerifier.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HeapVerifier.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HotCardCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HotCardCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1IHOPControl.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1IHOPControl.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1InCSetState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1InitialMarkToMixedTimeTracker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MMUTracker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MMUTracker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MemoryPool.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MemoryPool.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MonitoringSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1MonitoringSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1OopClosures.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1OopClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1OopClosures.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1PageBasedVirtualSpace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1PageBasedVirtualSpace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ParScanThreadState.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ParScanThreadState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ParScanThreadState.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Policy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Policy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Predictions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionToSpaceMapper.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RegionToSpaceMapper.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetSummary.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetSummary.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetTrackingPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetTrackingPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RootClosures.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RootClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RootProcessor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RootProcessor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1SharedClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedupQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedupQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedupStat.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1StringDedupStat.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1SurvivorRegions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1SurvivorRegions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ThreadLocalData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YCTypes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YoungGenSizer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YoungGenSizer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YoungRemSetSamplingThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1YoungRemSetSamplingThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegion.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegion.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegion.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionBounds.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionBounds.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionManager.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionRemSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionRemSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionTracer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionTracer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionType.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/heapRegionType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/jvmFlagConstraintsG1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/jvmFlagConstraintsG1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/ptrQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/ptrQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/satbMarkQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/satbMarkQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/sparsePRT.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/sparsePRT.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/survRateGroup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/survRateGroup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/vmStructs_g1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/vm_operations_g1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/vm_operations_g1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/adjoiningGenerations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/adjoiningGenerations.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/adjoiningVirtualSpaces.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/adjoiningVirtualSpaces.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/asPSOldGen.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/asPSOldGen.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/asPSYoungGen.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/asPSYoungGen.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcAdaptivePolicyCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcAdaptivePolicyCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcTaskManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcTaskManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcTaskThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/gcTaskThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/generationSizer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/generationSizer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/immutableSpace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/immutableSpace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/jvmFlagConstraintsParallel.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/jvmFlagConstraintsParallel.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableNUMASpace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableSpace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableSpace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/objectStartArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/objectStartArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/objectStartArray.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parMarkBitMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parMarkBitMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parMarkBitMap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelArguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelArguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelScavengeHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelScavengeHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallelScavengeHeap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/parallel_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/pcTasks.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/pcTasks.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psAdaptiveSizePolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psAdaptiveSizePolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCardTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCardTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCompactionManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCompactionManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psCompactionManager.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGCAdaptivePolicyCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGCAdaptivePolicyCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGenerationCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGenerationCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweep.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweep.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweepDecorator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweepDecorator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweepProxy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMemoryPool.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMemoryPool.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psOldGen.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psOldGen.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psParallelCompact.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psParallelCompact.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psParallelCompact.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionLAB.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionLAB.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionLAB.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psPromotionManager.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psScavenge.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psScavenge.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psScavenge.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psTasks.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psTasks.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psVirtualspace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psVirtualspace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psYoungGen.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psYoungGen.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/spaceCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/spaceCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/vmPSOperations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/vmPSOperations.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/vmStructs_parallelgc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/cSpaceCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/cSpaceCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/defNewGeneration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/defNewGeneration.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/defNewGeneration.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/genMarkSweep.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/genMarkSweep.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/markSweep.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/markSweep.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/markSweep.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialArguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialArguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serialHeap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/serial_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/tenuredGeneration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/tenuredGeneration.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/tenuredGeneration.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/vmStructs_serial.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/accessBarrierSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/accessBarrierSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/accessBarrierSupport.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/adaptiveSizePolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/adaptiveSizePolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTableTracer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTableTracer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/allocTracer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/allocTracer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSetAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSetConfig.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/barrierSetConfig.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/blockOffsetTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/blockOffsetTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/blockOffsetTable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/cardTableBarrierSetC2.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/cardTableBarrierSetC2.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardGeneration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardGeneration.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardGeneration.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableBarrierSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableBarrierSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableBarrierSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableBarrierSetAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableRS.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/cardTableRS.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectedHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectedHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectedHeap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/concurrentGCPhaseManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/concurrentGCPhaseManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/concurrentGCThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/concurrentGCThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/copyFailedInfo.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/dcevmSharedGC.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/dcevmSharedGC.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcArguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcArguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcArguments.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcCause.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcCause.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcConfig.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcConfig.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcConfiguration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcConfiguration.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcHeapSummary.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcId.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcId.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcLocker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcLocker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcLocker.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcName.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcPolicyCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcPolicyCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcStats.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcStats.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcThreadLocalData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTimer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTimer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTrace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTrace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTraceSend.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTraceTime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTraceTime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcTraceTime.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcUtil.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcUtil.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcUtil.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gcWhen.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/gc_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genCollectedHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genCollectedHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genMemoryPools.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genMemoryPools.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genOopClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/genOopClosures.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generation.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationSpec.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationSpec.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/hSpaceCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/hSpaceCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/isGCActiveMark.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/jvmFlagConstraintsGC.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/jvmFlagConstraintsGC.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/memAllocator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/memAllocator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/memset_with_concurrent_readers.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/modRefBarrierSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/modRefBarrierSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/modRefBarrierSetAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/objectCountEventSender.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/objectCountEventSender.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorageParState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorageParState.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/preservedMarks.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/preservedMarks.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/preservedMarks.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceDiscoverer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referencePolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referencePolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessor.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessorPhaseTimes.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessorPhaseTimes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/referenceProcessorStats.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/softRefGenPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/softRefGenPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/softRefPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/softRefPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/space.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/space.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/space.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/spaceDecorator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/spaceDecorator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedup.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupStat.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupStat.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/strongRootsScope.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/strongRootsScope.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/suspendibleThreadSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/suspendibleThreadSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/threadLocalAllocBuffer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/threadLocalAllocBuffer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/threadLocalAllocBuffer.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/vmGCOperations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/vmGCOperations.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/vmStructs_gc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/weakProcessor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/weakProcessor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workerDataArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workerDataArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workerDataArray.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workerManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workgroup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/workgroup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAdaptiveHeuristics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAdaptiveHeuristics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahCompactHeuristics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahCompactHeuristics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahHeuristics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahHeuristics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahPassiveHeuristics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahPassiveHeuristics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahStaticHeuristics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahStaticHeuristics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/markBitMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/markBitMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/markBitMap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahIUMode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahIUMode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahMode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahPassiveMode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahPassiveMode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahSATBMode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/mode/shenandoahSATBMode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/parallelCleaning.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/parallelCleaning.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahAllocRequest.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahArguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahArguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahAsserts.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahAsserts.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSetAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahBarrierSetClone.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahClosures.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCodeRoots.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCodeRoots.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectorPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahCollectorPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahControlThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahControlThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahEvacOOMHandler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahEvacOOMHandler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahForwarding.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahForwarding.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahFreeSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahFreeSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahJfrSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahJfrSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahLock.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkCompact.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkCompact.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMemoryPool.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMemoryPool.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMetrics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMetrics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMonitoringSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahMonitoringSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahNumberSeq.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahNumberSeq.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahOopClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahOopClosures.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPacer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPacer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPacer.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPadding.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPhaseTimings.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahPhaseTimings.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootVerifier.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRootVerifier.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRuntime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahRuntime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahSATBMarkQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahSATBMarkQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahSharedVariables.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahThreadLocalData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahTracer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahUtils.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahUtils.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahVMOperations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahVMOperations.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahVerifier.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahVerifier.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahWorkGroup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahWorkGroup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahWorkerPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahWorkerPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoah_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/vmStructs_shenandoah.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/vmStructs_z.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/vmStructs_z.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddress.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddress.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddress.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddressRangeMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAddressRangeMap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zAllocationFlags.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArray.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrier.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrier.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrier.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSetAssembler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSetAssembler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSetRuntime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBarrierSetRuntime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBitField.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBitMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zBitMap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCPU.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCPU.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCollectedHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCollectedHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCollectorPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zCollectorPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zDirector.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zDirector.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zDriver.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zDriver.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zErrno.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zErrno.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zForwardingTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zForwardingTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zForwardingTable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zForwardingTableEntry.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zFuture.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zFuture.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zGlobals.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zGlobals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHash.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHash.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeapIterator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zHeapIterator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zInitialize.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zInitialize.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLargePages.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLargePages.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLargePages.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zList.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLiveMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLiveMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLiveMap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLock.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zLock.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMark.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMark.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMark.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkCache.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkStack.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkStack.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkStack.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkStackEntry.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkTerminate.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMarkTerminate.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMemory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMemory.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMessagePort.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMessagePort.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMetronome.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zMetronome.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNMethodTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNMethodTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNMethodTableEntry.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNUMA.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zNUMA.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zObjectAllocator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zObjectAllocator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOop.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOop.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOopClosures.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOopClosures.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zOopClosures.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPage.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPage.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPage.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageAllocator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageAllocator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageCache.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageTable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPageTableEntry.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPhysicalMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPhysicalMemory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPhysicalMemory.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPreMappedMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPreMappedMemory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zPreMappedMemory.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zReferenceProcessor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zReferenceProcessor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocate.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocate.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSetSelector.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSetSelector.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zResurrection.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zResurrection.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zResurrection.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRootsIterator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRootsIterator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRuntimeWorkers.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRuntimeWorkers.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zServiceability.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zServiceability.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zStat.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zStat.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTask.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTask.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zThreadLocalData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTracer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTracer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zTracer.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zUtils.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zUtils.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zUtils.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zValue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zVirtualMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zVirtualMemory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zVirtualMemory.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWeakRootsProcessor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWeakRootsProcessor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWorkers.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWorkers.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zWorkers.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/z_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/include/cds.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/include/jmm.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/include/jvm.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/abstractInterpreter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/abstractInterpreter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecode.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeHistogram.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeHistogram.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreterProfiling.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeStream.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeStream.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeTracer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeTracer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodes.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/cppInterpreter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/cppInterpreter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/cppInterpreterGenerator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/cppInterpreterGenerator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interp_masm.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreterRuntime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreterRuntime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/invocationCounter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/invocationCounter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/oopMapCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/oopMapCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/rewriter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/rewriter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateInterpreter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateInterpreter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateInterpreterGenerator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateInterpreterGenerator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/dcmd/jfrDcmds.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/dcmd/jfrDcmds.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jfr.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jfr.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jfrEvents.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrGetAllEventClasses.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrGetAllEventClasses.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaCall.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaCall.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethod.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethod.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bitset.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bitset.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/dfsClosure.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/dfsClosure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edge.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edge.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeStore.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeStore.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeUtils.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/edgeUtils.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/objectSampleMarker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/rootSetClosure.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/rootSetClosure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/eventEmitter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/eventEmitter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleCheckpoint.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleCheckpoint.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleWriter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleWriter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/objectSample.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/objectSampler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/objectSampler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/sampleList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/sampleList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/samplePriorityQueue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/sampling/samplePriorityQueue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/startOperation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/stopOperation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/granularTimer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/granularTimer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/saveRestore.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/saveRestore.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/unifiedOop.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/vmOperation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/metadata/jfrSerializer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrModuleEvent.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrModuleEvent.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrOSInterface.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrOSInterface.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadCPULoadEvent.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadCPULoadEvent.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/sampling/jfrCallTrace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/sampling/jfrCallTrace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/sampling/jfrThreadSampler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/sampling/jfrThreadSampler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointWriter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointWriter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrMetadataEvent.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrMetadataEvent.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadState.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrType.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdBits.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdEpoch.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdEpoch.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdMacros.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrEventSetting.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrEventSetting.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrEventSetting.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkRotation.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkRotation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrEvent.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrEvent.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrMemorySizer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrMemorySizer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrPostBox.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrPostBox.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTraceRepository.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTraceRepository.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrBuffer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrBuffer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrMemorySpaceRetrieval.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorageControl.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorageControl.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorageUtils.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorageUtils.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPool.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPool.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolBuffer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolBuffer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolWriter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolWriter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrAllocationTracer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrAllocationTracer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrEventClass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrEventClass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrFlush.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrFlush.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrIntrinsics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrKlassExtension.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrStackTraceMark.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrStackTraceMark.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrThreadExtension.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrThreadId.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrThreadLocal.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrThreadLocal.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/support/jfrTraceIdExtension.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBlob.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBlob.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrDoublyLinkedList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrHashtable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrIterator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrJavaLog.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrJavaLog.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrRefCountPointer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrResourceManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrSpinlockHelper.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTimeConverter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTimeConverter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTryLock.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrTypes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrBigEndianWriter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoders.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoding.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEventWriterHost.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEventWriterHost.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrJavaEventWriter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrJavaEventWriter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrNativeEventWriter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrPosition.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrPosition.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStorageAdapter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStorageHost.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStorageHost.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStreamWriterHost.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStreamWriterHost.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrTypeWriterHost.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrWriterHost.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/compilerRuntime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/compilerRuntime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompiler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompiler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciEnv.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciEnv.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciJavaClasses.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciJavaClasses.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmci_globals.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmci_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/systemDictionary_jvmci.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/vmStructs_compiler_runtime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/vmStructs_jvmci.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/vmStructs_jvmci.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/vmSymbols_jvmci.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/vectset.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/vectset.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/log.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorations.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorators.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorators.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDiagnosticCommand.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDiagnosticCommand.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileStreamOutput.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileStreamOutput.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logHandle.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logLevel.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logLevel.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logMessage.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logMessageBuffer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logMessageBuffer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutputList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutputList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logPrefix.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelection.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelection.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelectionList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelectionList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSetDescriptions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSetDescriptions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag_ext.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/allocation.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/allocation.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/allocation.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/arena.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/arena.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/binaryTreeDictionary.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/binaryTreeDictionary.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/freeList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/freeList.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/guardedMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/guardedMemory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapInspection.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapInspection.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapShared.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapShared.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapShared.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/iterator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/iterator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/iterator.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/memRegion.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/memRegion.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metadataFactory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/blockFreelist.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/blockFreelist.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/chunkManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/chunkManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaDebug.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaDebug.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metabase.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metablock.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metachunk.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metachunk.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceCommon.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceCommon.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceDCmd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceDCmd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceStatistics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaspaceStatistics.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/occupancyMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/occupancyMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/printCLDMetaspaceInfoClosure.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/printCLDMetaspaceInfoClosure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/printMetaspaceInfoKlassClosure.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/printMetaspaceInfoKlassClosure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/smallBlocks.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/smallBlocks.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/spaceManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/spaceManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/virtualSpaceList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/virtualSpaceList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/virtualSpaceNode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/virtualSpaceNode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceChunkFreeListSummary.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceClosure.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceClosure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceGCThresholdUpdater.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceTracer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceTracer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/oopFactory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/oopFactory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/operator_new.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/referenceType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/resourceArea.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/resourceArea.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/resourceArea.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/virtualspace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/virtualspace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/conditional.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/decay.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/enableIf.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/integralConstant.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isConst.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isFloatingPoint.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isIntegral.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isPointer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isRegisteredEnum.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isSame.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isSigned.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/isVolatile.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/primitiveConversions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/removeCV.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/removePointer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/metaprogramming/removeReference.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/access.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/access.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/access.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/accessBackend.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/accessBackend.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/accessBackend.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/accessDecorators.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/annotations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/annotations.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/array.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/array.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayKlass.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayOop.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/arrayOop.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/compiledICHolder.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/compiledICHolder.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/compressedOops.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/cpCache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/cpCache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/cpCache.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/fieldInfo.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/fieldStreams.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceClassLoaderKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceClassLoaderKlass.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceMirrorKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceMirrorKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceMirrorKlass.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceOop.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceOop.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceRefKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceRefKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceRefKlass.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klassVtable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klassVtable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/markOop.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/markOop.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/markOop.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/metadata.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/metadata.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodCounters.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodCounters.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayKlass.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayOop.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayOop.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayOop.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oop.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oop.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oop.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oopHandle.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oopHandle.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oopsHierarchy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oopsHierarchy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayKlass.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayKlass.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayOop.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/typeArrayOop.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/verifyOopClosure.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/weakHandle.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/weakHandle.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/weakHandle.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/ad.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/addnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/addnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/adlcVMDeps.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/arraycopynode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/arraycopynode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/buildOopMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/bytecodeInfo.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/c2_globals.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/c2_globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/c2compiler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/c2compiler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callGenerator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callGenerator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/castnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/castnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/cfgnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/cfgnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/classes.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/classes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/coalesce.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/coalesce.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/connode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/connode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/convertnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/convertnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/countbitsnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/countbitsnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/divnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/divnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/doCall.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/domgraph.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/escape.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/escape.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/gcm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/generateOptoStub.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealKit.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealKit.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/ifg.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/ifnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/indexSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/indexSet.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/intrinsicnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/intrinsicnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/lcm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/library_call.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/live.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/live.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/locknode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/locknode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopPredicate.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopTransform.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopUnswitch.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/loopopts.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/machnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/machnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/macro.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/macro.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/macroArrayCopy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/matcher.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/matcher.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/mathexactnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/mathexactnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/memnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/memnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/movenode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/movenode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/mulnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/mulnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/multnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/multnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/narrowptrnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/narrowptrnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/node.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/node.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/opaquenode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/opaquenode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/opcodes.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/opcodes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/optoreg.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/output.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/output.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse1.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse3.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parseHelper.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phase.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phase.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phaseX.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phaseX.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phasetype.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/postaloc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/regalloc.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/regalloc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/regmask.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/regmask.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/replacednodes.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/replacednodes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/rootnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/rootnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/runtime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/runtime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/split_if.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/stringopts.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/stringopts.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/subnode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/subnode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/vectornode.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/vectornode.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/precompiled/precompiled.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/cdsoffsets.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/cdsoffsets.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/evmCompat.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/forte.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/forte.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniExport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniFastGetField.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniFastGetField.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm_misc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiAgentThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiCodeBlobEvents.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiCodeBlobEvents.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnter.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvThreadState.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvThreadState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEventController.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEventController.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEventController.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiGetLoadedClasses.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiGetLoadedClasses.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiImpl.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiImpl.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiManageCapabilities.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiManageCapabilities.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRawMonitor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRawMonitor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTagMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTagMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiThreadState.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiThreadState.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiThreadState.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiUtil.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiUtil.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodComparator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodComparator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodHandles.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodHandles.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/perf.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/privilegedStack.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/privilegedStack.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/resolvedMethodTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/resolvedMethodTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/stackwalk.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/stackwalk.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/unsafe.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/unsafe.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments_ext.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments_ext.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/atomic.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/basicLock.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/basicLock.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/biasedLocking.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/biasedLocking.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/compilationPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/compilationPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/extendedPC.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldDescriptor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldDescriptor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldDescriptor.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldType.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldType.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/flagSetting.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintsCompiler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintsCompiler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintsRuntime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagConstraintsRuntime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagRangeList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagRangeList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagWriteableList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlagWriteableList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/globals.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/globals.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/globals_ext.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/globals_extension.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handles.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handles.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handles.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handshake.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/handshake.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/icache.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/icache.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/init.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/init.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/java.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/java.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/javaCalls.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/javaCalls.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/javaFrameAnchor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jfieldIDWorkaround.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniHandles.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniHandles.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniHandles.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniPeriodicChecker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/jniPeriodicChecker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/monitorChunk.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/monitorChunk.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/orderAccess.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/orderAccess.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/osThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/osThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os_ext.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os_perf.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/park.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/park.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfMemory.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/prefetch.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/prefetch.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflectionUtils.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflectionUtils.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/registerMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/rframe.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/rframe.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/rtmLocking.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/rtmLocking.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepoint.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepoint.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointMechanism.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointMechanism.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointMechanism.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointVerifiers.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/safepointVerifiers.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/semaphore.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/semaphore.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/serviceThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/serviceThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntimeMath.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntimeTrans.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntimeTrig.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/signature.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/signature.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValue.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValue.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValueCollection.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValueCollection.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/statSampler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/statSampler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stubCodeGenerator.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stubCodeGenerator.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stubRoutines.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stubRoutines.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sweeper.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sweeper.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/task.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/task.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadCritical.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadHeapSampler.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadHeapSampler.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadLocalStorage.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadSMR.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadSMR.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadSMR.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadStatisticalInfo.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/tieredThresholdPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/tieredThresholdPolicy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/timer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/timer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/timerTrace.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/timerTrace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/unhandledOops.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/unhandledOops.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframeArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframeArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe_hp.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe_hp.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmOperations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmOperations.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/allocationSite.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/classLoadingService.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/classLoadingService.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand_ext.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/dtraceAttacher.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/dtraceAttacher.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/gcNotifier.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/gcNotifier.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/lowMemoryDetector.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/lowMemoryDetector.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocSiteTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocSiteTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocTracker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocTracker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/mallocTracker.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memBaseline.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memBaseline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memReporter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memReporter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryPool.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryPool.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryService.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryService.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryUsage.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/nmtCommon.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/nmtCommon.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/nmtDCmd.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/nmtDCmd.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/runtimeService.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/runtimeService.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/threadIdTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/threadIdTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/threadService.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/threadService.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/virtualMemoryTracker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/virtualMemoryTracker.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/accessFlags.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/accessFlags.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/align.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bitMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bitMap.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bitMap.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/breakpoint.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bytes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/chunkedList.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/compilerWarnings.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTableTasks.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/constantTag.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/constantTag.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/copy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/copy.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/count_trailing_zeros.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/decoder.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/decoder.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/decoder_elf.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/decoder_elf.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/defaultStream.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/dtrace.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/dtrace_disabled.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFuncDescTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFuncDescTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfStringTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfStringTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfSymbolTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfSymbolTable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/errorReporter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/errorReporter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/events.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/events.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/exceptions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/exceptions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/fakeRttiSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/formatBuffer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/formatBuffer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalCounter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalCounter.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalCounter.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_gcc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_sparcWorks.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_xlc.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/growableArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/growableArray.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/histogram.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/histogram.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/intHisto.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/intHisto.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/internalVMTests.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/internalVMTests.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/linkedlist.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/macros.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/nativeCallStack.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/nativeCallStack.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/numberSeq.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/numberSeq.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/pair.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/preserveException.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/preserveException.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/quickSort.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/resourceHash.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/singleWriterSynchronizer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/singleWriterSynchronizer.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/sizes.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/sizes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/spinYield.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/spinYield.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stack.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stack.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ticks.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ticks.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libjava/ProcessHandleImpl_aix.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libjli/java_md_aix.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libjli/java_md_aix.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnet/aix_close.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/ch/AixPollPort.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/Metrics.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnet/linux_close.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/ch/EPoll.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxWatchService.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/ProcessHandleImpl_macosx.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/bsd_close.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/ch/KQueue.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/MacOSXNativeDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/UTIFileTypeDetector.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/include/jni.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/include/jvmticmlr.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/defines.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/main.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_acos.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_asin.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_atan2.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_atanh.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_cosh.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_exp.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_fmod.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_log.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_log10.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_rem_pio2.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_remainder.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_scalb.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_sinh.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/e_sqrt.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/fdlibm.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/jfdlibm.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_cos.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_rem_pio2.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_sin.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_standard.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/k_tan.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_atan.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_ceil.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_copysign.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_cos.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_expm1.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_fabs.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_finite.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_floor.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_frexp.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_ilogb.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_isnan.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_ldexp.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_lib_version.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_log1p.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_logb.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_matherr.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_modf.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_nextafter.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_rint.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_scalbn.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_signgam.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_significand.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_sin.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_tan.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/s_tanh.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_acos.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_asin.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_atan2.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_atanh.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_cosh.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_exp.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_fmod.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_log.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_log10.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_remainder.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_scalb.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_sinh.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libfdlibm/w_sqrt.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/AccessController.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Array.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/AtomicLong.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/BootLoader.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Class.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ConstantPool.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Double.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Executable.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Field.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/FileInputStream.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Float.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Module.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/NativeAccessors.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Object.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ObjectInputStream.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ObjectOutputStream.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ObjectStreamClass.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/RandomAccessFile.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Reference.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Reflection.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Runtime.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/SecurityManager.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Shutdown.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Signal.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/StackStreamFactory.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/StackTraceElement.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/StrictMath.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/String.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/StringCoding.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Thread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Throwable.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/TimeZone.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/VM.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/VMSupport.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/check_version.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/gdefs.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/java_props.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jdk_util.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jdk_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jio.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jlong.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/sizecalc.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/verify_stub.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/NativeImageBuffer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/endian.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/endian.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/inttypes.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/osSupport.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/emessages.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/manifest_info.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/splashscreen.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/splashscreen_stubs.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/DatagramPacket.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/Inet4Address.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/Inet6Address.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/InetAddress.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/net_util.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/net_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/proxy_util.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnet/proxy_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnio/ch/nio.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libnio/nio_util.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_format.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/Adler32.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/CRC32.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/Deflater.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/Inflater.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/compress.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/crc32.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/deflate.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/deflate.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzclose.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/infback.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inffast.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inffast.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inffixed.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inflate.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inflate.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inftrees.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inftrees.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/trees.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/trees.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/uncompr.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zadler32.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zconf.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zcrc32.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zlib.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjava/ProcessHandleImpl_solaris.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnet/solaris_close.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/ch/DevPollArrayWrapper.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/ch/SolarisEventPort.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisWatchService.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/include/jni_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/jspawnhelper/jspawnhelper.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/Console_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/FileDescriptor_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/FileOutputStream_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessEnvironment_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/VM_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/gdefs_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jdk_util_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jdk_util_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jlong_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/locale_str.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjimage/osSupport_unix.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjsig/jsig.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/InetAddressImplFactory.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainSocketImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/ResolverConfigurationImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SdpSupport.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketInputStream.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketOutputStream.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/portconfig.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/MappedByteBuffer.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/DatagramChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/DatagramDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/FileChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/FileDispatcherImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/FileKey.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/InheritedChannel.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/NativeThread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/Net.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/PollSelectorImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/ServerSocketChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/SocketChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/SocketDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/UnixAsynchronousServerSocketChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/UnixAsynchronousSocketChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/nio_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixCopyFile.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/include/jni_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Console_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/FileDescriptor_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/FileOutputStream_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessEnvironment_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/VM_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Win32ErrorMode.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinCAPISeedGenerator.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/gdefs_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_main_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jlong_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/locale_str.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DefaultProxySelector.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/InetAddressImplFactory.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthSequence.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthentication.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/PlainSocketImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketInputStream.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketOutputStream.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/MappedByteBuffer.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileKey.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/Iocp.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/Net.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/ServerSocketChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsAsynchronousFileChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsAsynchronousServerSocketChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsAsynchronousSocketChannelImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/nio_util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/RegistryFileTypeDetector.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/failure_handler/src/windows/native/libtimeoutHandler/GatherProcessInfoTimeoutHandler.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-death-test.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-message.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-param-test.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-printers.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-spi.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-test-part.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest-typed-test.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest_pred_impl.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest_prod.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/custom/gtest-port.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/custom/gtest-printers.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/custom/gtest.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-death-test-internal.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-filepath.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-internal.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-linked_ptr.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-param-util-generated.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-param-util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port-arch.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-string.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-tuple.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-all.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-death-test.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-filepath.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-printers.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-test-part.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-typed-test.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest_main.cc Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/classfile/test_AltHashing.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/classfile/test_symbolTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/code/test_dependencyContext.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/code/test_vtableStub.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_freeRegionList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1Analytics.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1BiasedArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1CodeCacheRemSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1HeapVerifier.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1IHOPControl.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_g1Predictions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/g1/test_heapRegion.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/parallel/test_psAdaptiveSizePolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/parallel/test_psParallelCompact.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_collectedHeap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_collectorPolicy.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_oopStorage.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_oopStorage_parperf.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_preservedMarks.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_workerDataArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zAddress.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zArray.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zBitField.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zBitMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zForwardingTable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zLiveMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zPhysicalMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zUtils.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/z/test_zVirtualMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestLauncher.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/precompiled.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_networkUtilization.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestFixture.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestFixture.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestUtils.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_gcTraceTime.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_log.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorators.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logFileOutput.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logLevel.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logOutputList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelectionList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logStream.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTag.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_chunkManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_guardedMemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_is_metaspace_obj.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metachunk.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_spaceManager.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_conditional.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_decay.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_enableIf.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isConst.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isFloatingPoint.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isIntegral.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isPointer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isRegisteredEnum.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isSame.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isSigned.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_isVolatile.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_primitiveConversions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_removeCV.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_removePointer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/metaprogramming/test_removeReference.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_arrayOop.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_instanceKlass.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_oop.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_typeArrayOop.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/opto/test_mathexact.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_arguments.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_classLoader.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_committed_virtualmemory.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_globals.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_perfdata.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_semaphore.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_virtualMemoryTracker.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_vmStructs.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/unittest.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_align.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_bitMap.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_bitMap_large.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_bitMap_search.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_bitMap_setops.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_chunkedList.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_concurrentHashtable.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_count_trailing_zeros.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_globalCounter.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_globalDefinitions.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_java_arithmetic.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_json.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_linkedlist.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_quicksort.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_resourceHash.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_singleWriterSynchronizer.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_stringUtils.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/utilitiesHelper.inline.hpp Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/calls/common/libCallsNative.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/calls/libTestDirtyInt.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/floatingpoint/libTestFloatJNIArgs.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/floatingpoint/libTestFloatSyncJNIArgs.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/jsr292/cr8026328/libTest8026328.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/jvmci/jdk.vm.ci.code.test/libNativeCallTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/runtime/criticalnatives/argumentcorruption/libCNCheckLongArgs.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/runtime/criticalnatives/lookup/libCNLookUp.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/compiler/testlibrary/rtm/libXAbortProvoker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/cslocker/libTestCSLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/g1/TestJNIWeakG1/libTestJNIWeakG1.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libCriticalNative.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNICritical.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNIGlobalRefs.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libTestPinnedGarbage.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jvmti/libTestHeapDump.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/stress/TestJNIBlockFullGC/libTestJNIBlockFullGC.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/stress/gclocker/libTestGCLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/native_sanity/libJniVersion.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/BoolReturn/libJNIBooleanTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/BoolReturn/libNativeSmallIntCalls.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/Nestmates/libNestmatesJNI.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/RedefineTests/libRedefineDoubleDelete.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/SameObject/libSameObject.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/ThreadSignalMask/exeThreadSignalMask.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/exceptionMsgs/ArrayIndexOutOfBoundsException/libArrayIndexOutOfBoundsExceptionTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/exceptionMsgs/ArrayStoreException/libArrayStoreExceptionTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/execstack/libtest-rw.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/execstack/libtest-rwx.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/handshake/libHandshakeTransitionTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/8025979/libUninitializedStrings.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/8033445/libDefaultMethods.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/CallWithJNIWeak/libCallWithJNIWeak.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/CalleeSavedRegisters/exeFPRegs.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/FindClass/libbootLoaderTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/PrivateInterfaceMethods/libPrivateInterfaceMethods.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/ReturnJNIWeak/libReturnJNIWeak.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/ToStringInInterfaceTest/libToStringTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/atExit/libatExit.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/checked/libTestCheckedEnsureLocalCapacity.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/checked/libTestCheckedJniExceptionCheck.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jni/terminatedThread/libterminatedThread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/jsig/libTestJNI.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/libadimalloc.solaris.sparc/liboverflow.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/modules/getModuleJNI/libGetModule.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/noClassDefFoundMsg/libNoClassDefFoundMsg.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/signal/exesigtest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/dcmd/jvmti/AttachFailed/libHasNoEntryPoint.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/dcmd/jvmti/AttachFailed/libReturnError.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleReads/libAddModuleReadsTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleUsesAndProvides/libAddModuleUsesAndProvidesTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/CanGenerateAllClassHook/libCanGenerateAllClassHook.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetModulesInfo/libJvmtiGetAllModulesTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetNamedModule/libGetNamedModuleTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorInfo/libGetOwnedMonitorInfoTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorInfo/libGetOwnedMonitorInfoWithEATest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorStackDepthInfo/libGetOwnedMonitorStackDepthInfoTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorStackDepthInfo/libGetOwnedMonitorStackDepthInfoWithEATest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/GetSystemProperty/libJvmtiGetSystemPropertyTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/IsModifiableModule/libIsModifiableModuleTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ClassFileLoadHook/libMAAClassFileLoadHook.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ClassLoadPrepare/libMAAClassLoadPrepare.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ThreadStart/libMAAThreadStart.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/NotifyFramePop/libNotifyFramePopTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/StartPhase/AllowedFunctions/libAllowedFunctions.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/sa/libNoFramePointer.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/g1/unloading/libdefine.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC1/libmallocWithGC1.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC2/libmallocWithGC2.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC3/libmallocWithGC3.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC01/libnativeGC01.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC02/libnativeGC02.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC03/libnativeGC03.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC05/libnativeGC05.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent01.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent02.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent03.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent01.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent02.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent03.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine09/agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine09/libVirtualMachine09agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jdi/ThreadReference/forceEarlyReturn/forceEarlyReturn004/libforceEarlyReturn004a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jdi/ThreadReference/forceEarlyReturn/forceEarlyReturn005/libforceEarlyReturn005a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jdwp/ThreadReference/ForceEarlyReturn/forceEarlyReturn002/libforceEarlyReturn002a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps001/addcaps001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps001/libaddcaps001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps002/addcaps002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps002/libaddcaps002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps003/addcaps003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps003/libaddcaps003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload001/agentonload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload001/libagentonload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload002/agentonload002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload002/libagentonload002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload003/agentonload003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload003/libagentonload003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnUnload/agentonunload001/agentonunload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnUnload/agentonunload001/libagentonunload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Allocate/alloc001/alloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Allocate/alloc001/liballoc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/libattach002Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/attach002aAgent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/libattach002aAgent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/libattach008Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/libattach009Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach012/attach012Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach012/libattach012Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/attach014Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/libattach014Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent01.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Target.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Agent01.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Target.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach020/attach020Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach020/libattach020Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach021/attach021Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach021/libattach021Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/attach022Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/libattach022Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/libattach037Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/libattach038Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/libattach039Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/libattach040Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/libattach041Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/libattach042Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent01.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent02.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent01.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent02.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent03.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/attach046Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/libattach046Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach050/attach050Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach050/libattach050Agent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/sharedAgents/libsimpleAgent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/sharedAgents/simpleAgent00.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Breakpoint/breakpoint001/breakpoint001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Breakpoint/breakpoint001/libbreakpoint001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk001/classfloadhk001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk001/libclassfloadhk001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk002/classfloadhk002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk002/libclassfloadhk002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk003/classfloadhk003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk003/libclassfloadhk003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk004/classfloadhk004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk004/libclassfloadhk004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk005/classfloadhk005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk005/libclassfloadhk005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk006/classfloadhk006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk006/libclassfloadhk006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk007/classfloadhk007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk007/libclassfloadhk007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk008/classfloadhk008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk008/libclassfloadhk008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk009/classfloadhk009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk009/libclassfloadhk009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassLoad/classload001/classload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassLoad/classload001/libclassload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassPrepare/classprep001/classprep001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassPrepare/classprep001/libclassprep001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk001/clrbrk001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk001/libclrbrk001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk002/clrbrk002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk002/libclrbrk002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk005/clrbrk005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk005/libclrbrk005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw001/clrfldw001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw001/libclrfldw001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw002/clrfldw002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw002/libclrfldw002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw001/clrfmodw001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw001/libclrfmodw001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw002/clrfmodw002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw002/libclrfmodw002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodLoad/compmethload001/compmethload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodLoad/compmethload001/libcompmethload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodUnload/compmethunload001/compmethunload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodUnload/compmethunload001/libcompmethunload001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/libcrrawmon001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon002/crrawmon002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon002/libcrrawmon002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DataDumpRequest/datadumpreq001/datadumpreq001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DataDumpRequest/datadumpreq001/libdatadumpreq001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Deallocate/dealloc001/dealloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Deallocate/dealloc001/libdealloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/libdrrawmon001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon003/drrawmon003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon003/libdrrawmon003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon004/drrawmon004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon004/libdrrawmon004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv001/disposeenv001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv001/libdisposeenv001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv002/disposeenv002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv002/libdisposeenv002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DynamicCodeGenerated/dyncodgen001/dyncodgen001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DynamicCodeGenerated/dyncodgen001/libdyncodgen001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Exception/exception001/exception001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Exception/exception001/libexception001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ExceptionCatch/excatch001/excatch001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ExceptionCatch/excatch001/libexcatch001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc001/fieldacc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc001/libfieldacc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc002/fieldacc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc002/libfieldacc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc003/fieldacc003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc003/libfieldacc003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc004/fieldacc004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc004/libfieldacc004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod001/fieldmod001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod001/libfieldmod001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod002/fieldmod002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod002/libfieldmod002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceEarlyReturn/ForceEarlyReturn001/ForceEarlyReturn001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceEarlyReturn/ForceEarlyReturn001/libForceEarlyReturn001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc001/forcegc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc001/libforcegc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc002/forcegc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc002/libforcegc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop001/framepop001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop001/libframepop001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/framepop002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/libframepop002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionFinish/gcfinish001/gcfinish001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionFinish/gcfinish001/libgcfinish001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart001/gcstart001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart001/libgcstart001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart002/gcstart002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart002/libgcstart002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GenerateEvents/genevents001/genevents001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GenerateEvents/genevents001/libgenevents001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/liballthr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr002/allthr002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr002/liballthr002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize001/argsize001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize001/libargsize001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize002/argsize002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize002/libargsize002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAvailableProcessors/getavailproc001/getavailproc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAvailableProcessors/getavailproc001/libgetavailproc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes001/bytecodes001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes001/libbytecodes001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes002/bytecodes002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes002/libbytecodes002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes003/bytecodes003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes003/libbytecodes003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps001/getcaps001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps001/libgetcaps001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps002/getcaps002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps002/libgetcaps002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld005/getclfld005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld005/libgetclfld005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld006/getclfld006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld006/libgetclfld006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld007/getclfld007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld007/libgetclfld007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr001/getclsldr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr001/libgetclsldr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr002/getclsldr002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr002/libgetclsldr002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr003/getclsldr003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr003/libgetclsldr003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss001/clsldrclss001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss001/libclsldrclss001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss002/clsldrclss002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss002/libclsldrclss002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd005/getclmthd005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd005/libgetclmthd005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd006/getclmthd006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd006/libgetclmthd006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd007/getclmthd007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd007/libgetclmthd007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf004/getclmdf004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf004/libgetclmdf004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf005/getclmdf005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf005/libgetclmdf005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf006/getclmdf006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf006/libgetclmdf006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf007/getclmdf007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf007/libgetclmdf007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig004/getclsig004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig004/libgetclsig004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig005/getclsig005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig005/libgetclsig005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig006/getclsig006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig006/libgetclsig006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat005/getclstat005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat005/libgetclstat005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat006/getclstat006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat006/libgetclstat006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat007/getclstat007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat007/libgetclstat007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon001/contmon001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon001/libcontmon001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon002/contmon002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon002/libcontmon002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon003/contmon003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon003/libcontmon003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/curthrcputime001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/libcurthrcputime001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/curthrtimerinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/libcurthrtimerinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnv/GetEnv001/GetEnv001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnv/GetEnv001/libGetEnv001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnvironmentLocalStorage/getenvstor001/getenvstor001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnvironmentLocalStorage/getenvstor001/libgetenvstor001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname001/geterrname001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname001/libgeterrname001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname002/geterrname002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname002/libgeterrname002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/libextevents001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/libextfuncs001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl001/getfldecl001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl001/libgetfldecl001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl002/getfldecl002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl002/libgetfldecl002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl004/getfldecl004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl004/libgetfldecl004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf003/getfldmdf003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf003/libgetfldmdf003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf004/getfldmdf004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf004/libgetfldmdf004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm003/getfldnm003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm003/libgetfldnm003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm004/getfldnm004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm004/libgetfldnm004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm005/getfldnm005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm005/libgetfldnm005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt001/framecnt001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt001/libframecnt001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt002/framecnt002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt002/libframecnt002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt003/framecnt003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt003/libframecnt003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc001/frameloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc001/libframeloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/frameloc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/libframeloc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc003/frameloc003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc003/libframeloc003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf005/getintrf005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf005/libgetintrf005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf006/getintrf006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf006/libgetintrf006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf007/getintrf007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf007/libgetintrf007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt001/getjlocfmt001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt001/libgetjlocfmt001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt002/getjlocfmt002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt002/libgetjlocfmt002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab001/getjniftab001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab001/libgetjniftab001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab002/getjniftab002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab002/libgetjniftab002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab001/liblinetab001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab001/linetab001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab002/liblinetab002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab002/linetab002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab003/liblinetab003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab003/linetab003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss001/libloadedclss001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss001/loadedclss001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss002/libloadedclss002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss002/loadedclss002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal001/getlocal001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal001/libgetlocal001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal002/getlocal002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal002/libgetlocal002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab001/liblocaltab001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab001/localtab001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab002/liblocaltab002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab002/localtab002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab003/liblocaltab003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab003/localtab003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab004/liblocaltab004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab004/localtab004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab005/liblocaltab005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab005/localtab005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc001/libmaxloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc001/maxloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc002/libmaxloc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc002/maxloc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls001/declcls001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls001/libdeclcls001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls002/declcls002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls002/libdeclcls002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls003/declcls003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls003/libdeclcls003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc001/libmethloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc001/methloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc002/libmethloc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc002/methloc002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod001/libmethmod001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod001/methmod001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod002/libmethmod002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod002/methmod002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname001/libmethname001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname001/methname001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname002/libmethname002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname002/methname002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname003/libmethname003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname003/methname003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectHashCode/objhashcode001/libobjhashcode001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectHashCode/objhashcode001/objhashcode001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage001/libobjmonusage001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage001/objmonusage001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage002/libobjmonusage002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage002/objmonusage002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage003/libobjmonusage003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage003/objmonusage003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage004/libobjmonusage004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage004/objmonusage004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage005/libobjmonusage005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage005/objmonusage005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage006/libobjmonusage006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage006/objmonusage006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectSize/objsize001/libobjsize001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectSize/objsize001/objsize001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectsWithTags/objwithtags001/libobjwithtags001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectsWithTags/objwithtags001/objwithtags001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf001/libownmoninf001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf001/ownmoninf001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf002/libownmoninf002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf002/ownmoninf002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf003/libownmoninf003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf003/ownmoninf003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase001/getphase001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase001/libgetphase001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase002/getphase002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase002/libgetphase002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPotentialCapabilities/getpotcaps001/getpotcaps001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPotentialCapabilities/getpotcaps001/libgetpotcaps001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex001/libsrcdebugex001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex001/srcdebugex001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex002/libsrcdebugex002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex002/srcdebugex002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex003/libsrcdebugex003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex003/srcdebugex003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn004/getsrcfn004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn004/libgetsrcfn004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn005/getsrcfn005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn005/libgetsrcfn005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn006/getsrcfn006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn006/libgetsrcfn006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr001/getstacktr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr001/libgetstacktr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr002/getstacktr002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr002/libgetstacktr002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr003/getstacktr003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr003/libgetstacktr003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr004/getstacktr004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr004/libgetstacktr004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr005/getstacktr005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr005/libgetstacktr005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr006/getstacktr006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr006/libgetstacktr006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr007/getstacktr007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr007/libgetstacktr007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr008/getstacktr008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr008/libgetstacktr008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr009/getstacktr009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr009/libgetstacktr009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops001/getsysprops001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops001/libgetsysprops001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops002/getsysprops002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops002/libgetsysprops002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop001/getsysprop001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop001/libgetsysprop001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop002/getsysprop002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop002/libgetsysprop002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTag/gettag001/gettag001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTag/gettag001/libgettag001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/libthrcputime001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/thrcputime001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/libthrcputime002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/thrcputime002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/libthrtimerinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/thrtimerinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/getthrdgrpchld001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/libgetthrdgrpchld001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo001/libthrgrpinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo001/thrgrpinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo002/libthrgrpinfo002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo002/thrgrpinfo002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/libthrinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo002/libthrinfo002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo002/thrinfo002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadLocalStorage/getthrdstor001/getthrdstor001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadLocalStorage/getthrdstor001/libgetthrdstor001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat001/libthrstat001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat001/thrstat001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat002/libthrstat002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat002/thrstat002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat003/libthrstat003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat003/thrstat003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat004/libthrstat004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat004/thrstat004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat005/libthrstat005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat005/thrstat005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/gettime001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/libgettime001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/libtimerinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/timerinfo001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp001/libtopthrgrp001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp001/topthrgrp001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp002/libtopthrgrp002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp002/topthrgrp002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetVersionNumber/getvern001/getvern001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetVersionNumber/getvern001/libgetvern001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd001/intrpthrd001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd001/libintrpthrd001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd002/intrpthrd002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd002/libintrpthrd002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd003/intrpthrd003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd003/libintrpthrd003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray004/isarray004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray004/libisarray004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray005/isarray005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray005/libisarray005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin002/isfldsin002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin002/libisfldsin002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin003/isfldsin003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin003/libisfldsin003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf004/isintrf004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf004/libisintrf004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf005/isintrf005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf005/libisintrf005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative001/isnative001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative001/libisnative001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative002/isnative002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative002/libisnative002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodObsolete/isobsolete001/isobsolete001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodObsolete/isobsolete001/libisobsolete001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth001/issynth001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth001/libIsMethodSyntheticIssynth001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth002/issynth002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth002/libissynth002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap001/iterheap001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap001/libiterheap001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap002/iterheap002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap002/libiterheap002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap003/iterheap003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap003/libiterheap003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap004/iterheap004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap004/libiterheap004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap005/iterheap005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap005/libiterheap005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap006/iterheap006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap006/libiterheap006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap007/iterheap007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap007/libiterheap007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls001/iterinstcls001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls001/libiterinstcls001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls002/iterinstcls002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls002/libiterinstcls002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls003/iterinstcls003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls003/libiterinstcls003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls004/iterinstcls004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls004/libiterinstcls004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls005/iterinstcls005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls005/libiterinstcls005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls006/iterinstcls006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls006/libiterinstcls006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls007/iterinstcls007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls007/libiterinstcls007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj001/iterobjreachobj001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj001/libiterobjreachobj001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj002/iterobjreachobj002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj002/libiterobjreachobj002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj003/iterobjreachobj003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj003/libiterobjreachobj003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj004/iterobjreachobj004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj004/libiterobjreachobj004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj005/iterobjreachobj005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj005/libiterobjreachobj005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj001/iterreachobj001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj001/libiterreachobj001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj002/iterreachobj002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj002/libiterreachobj002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj003/iterreachobj003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj003/libiterreachobj003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj004/iterreachobj004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj004/libiterreachobj004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj005/iterreachobj005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj005/libiterreachobj005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/abort/Abort.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/abort/libAbort.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/libCallbacks.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/concrete-klass-filter/ConcreteKlassFilter.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/concrete-klass-filter/libConcreteKlassFilter.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/HeapFilter.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/libHeapFilter.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/non-concrete-klass-filter/NonConcreteKlassFilter.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/non-concrete-klass-filter/libNonConcreteKlassFilter.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/libmentry001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/mentry001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry002/libmentry002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry002/mentry002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/libmexit001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/mexit001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/libmexit002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/mexit002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEnter/mcontenter001/libmcontenter001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEnter/mcontenter001/mcontenter001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEntered/mcontentered001/libmcontentered001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEntered/mcontentered001/mcontentered001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWait/monitorwait001/libmonitorwait001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWait/monitorwait001/monitorwait001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWaited/monitorwaited001/libmonitorwaited001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWaited/monitorwaited001/monitorwaited001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/libnativemethbind001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind002/libnativemethbind002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind002/nativemethbind002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind003/libnativemethbind003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind003/nativemethbind003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind004/libnativemethbind004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind004/nativemethbind004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop001/libnframepop001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop001/nframepop001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop002/libnframepop002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop002/nframepop002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop003/libnframepop003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop003/nframepop003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/libobjfree001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/objfree001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/libobjfree002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/objfree002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe001/libpopframe001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe001/popframe001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe002/libpopframe002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe002/popframe002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe003/libpopframe003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe003/popframe003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe004/libpopframe004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe004/popframe004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe005/libpopframe005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe005/popframe005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe006/libpopframe006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe006/popframe006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe007/libpopframe007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe007/popframe007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe008/libpopframe008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe008/popframe008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe009/libpopframe009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe009/popframe009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe010/libpopframe010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe010/popframe010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe011/libpopframe011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe011/popframe011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/librawmonenter001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter002/librawmonenter002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter002/rawmonenter002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter003/librawmonenter003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter003/rawmonenter003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter004/librawmonenter004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter004/rawmonenter004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/librawmonexit001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit002/librawmonexit002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit002/rawmonexit002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit003/librawmonexit003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit003/rawmonexit003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit005/librawmonexit005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit005/rawmonexit005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/librawmnntfy001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy002/librawmnntfy002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy002/rawmnntfy002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy003/librawmnntfy003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy003/rawmnntfy003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy004/librawmnntfy004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy004/rawmnntfy004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/librawmnntfyall001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall002/librawmnntfyall002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall002/rawmnntfyall002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall003/librawmnntfyall003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall003/rawmnntfyall003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall004/librawmnntfyall004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall004/rawmnntfyall004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/librawmnwait001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait002/librawmnwait002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait002/rawmnwait002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait003/librawmnwait003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait003/rawmnwait003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait004/librawmnwait004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait004/rawmnwait004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait005/librawmnwait005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait005/rawmnwait005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/StressRedefine/libstressRedefine.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/StressRedefine/stressRedefine.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass001/libredefclass001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass001/redefclass001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass002/libredefclass002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass002/redefclass002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass003/libredefclass003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass003/redefclass003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass004/libredefclass004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass004/redefclass004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass005/libredefclass005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass005/redefclass005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass006/libredefclass006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass006/redefclass006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass008/libredefclass008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass008/redefclass008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass009/libredefclass009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass009/redefclass009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass010/libredefclass010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass010/redefclass010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass011/libredefclass011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass011/redefclass011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass012/libredefclass012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass012/redefclass012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass013/libredefclass013.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass013/redefclass013.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass014/libredefclass014.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass014/redefclass014.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass015/libredefclass015.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass015/redefclass015.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass016/libredefclass016.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass016/redefclass016.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass017/libredefclass017.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass017/redefclass017.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass018/libredefclass018.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass018/redefclass018.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass019/libredefclass019.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass019/redefclass019.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass020/libredefclass020.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass020/redefclass020.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass021/libredefclass021.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass021/redefclass021.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass022/libredefclass022.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass022/redefclass022.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass023/libredefclass023.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass023/redefclass023.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass024/libredefclass024.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass024/redefclass024.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass025/libredefclass025.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass025/redefclass025.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass026/libredefclass026.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass026/redefclass026.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/libredefclass027.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass028/libredefclass028.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass028/redefclass028.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass029/libredefclass029.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass029/redefclass029.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass030/libredefclass030.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass030/redefclass030.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass031/libredefclass031.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass031/redefclass031.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps001/librelcaps001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps001/relcaps001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps002/librelcaps002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps002/relcaps002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResourceExhausted/libresexhausted.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResourceExhausted/resexhausted.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd001/libresumethrd001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd001/resumethrd001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd002/libresumethrd002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd002/resumethrd002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/libresumethrdlst001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/resumethrdlst001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/libresumethrdlst002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/resumethrdlst002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform002/libretransform002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform002/retransform002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/libretransform003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/libretransform004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/retransform004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr001/agentthr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr001/libagentthr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr002/agentthr002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr002/libagentthr002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr003/agentthr003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr003/libagentthr003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk002/libsetbrk002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk002/setbrk002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk003/libsetbrk003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk003/setbrk003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk005/libsetbrk005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk005/setbrk005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk007/libsetbrk007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk007/setbrk007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk008/libsetbrk008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk008/setbrk008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/libsetenvstor001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/setenvstor001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/libsetenvstor002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/setenvstor002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/libsetenvstor003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/setenvstor003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb001/libsetevntcallb001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb001/setevntcallb001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb002/libsetevntcallb002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb002/setevntcallb002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb003/libsetevntcallb003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb003/setevntcallb003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/libsetnotif001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetExtensionEventCallback/setextevent001/libsetextevent001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetExtensionEventCallback/setextevent001/setextevent001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/libsetfldw001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw002/libsetfldw002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw002/setfldw002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/libsetfldw003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/setfldw003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/libsetfldw004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/setfldw004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw005/libsetfldw005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw005/setfldw005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw006/libsetfldw006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw006/setfldw006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/libsetfmodw001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw002/libsetfmodw002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw002/setfmodw002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/libsetfmodw003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/setfmodw003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/libsetfmodw004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/setfmodw004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw005/libsetfmodw005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw005/setfmodw005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw006/libsetfmodw006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw006/setfmodw006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab001/libsetjniftab001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab001/setjniftab001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab002/libsetjniftab002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab002/setjniftab002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal001/libsetlocal001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal001/setlocal001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal002/libsetlocal002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal002/setlocal002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal003/libsetlocal003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal003/setlocal003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/libsetlocal004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/setlocal004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix001/SetNativeMethodPrefix001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix001/libSetNativeMethodPrefix001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/SetNativeMethodPrefix002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/SetNativeMethodPrefix002Main.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/libSetNativeMethodPrefix002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/libSetNativeMethodPrefix002Main.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop002/libsetsysprop002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop002/setsysprop002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop003/libsetsysprop003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop003/setsysprop003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetTag/settag001/libsettag001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetTag/settag001/settag001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/libsetthrdstor001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/setthrdstor001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/libsetthrdstor002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/setthrdstor002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/libsetthrdstor003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/setthrdstor003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag001/libsetvrbflag001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag001/setvrbflag001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag002/libsetvrbflag002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag002/setvrbflag002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep001/libsinglestep001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep001/singlestep001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep002/libsinglestep002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep002/singlestep002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep003/libsinglestep003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep003/singlestep003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd006/libstopthrd006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd006/stopthrd006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd007/libstopthrd007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd007/stopthrd007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd001/libsuspendthrd001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd001/suspendthrd001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd002/libsuspendthrd002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd002/suspendthrd002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd003/libsuspendthrd003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd003/suspendthrd003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/libsuspendthrdlst001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/suspendthrdlst001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/libsuspendthrdlst002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/suspendthrdlst002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/libthreadend001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend002/libthreadend002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend002/threadend002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/libthreadstart001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart002/libthreadstart002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart002/threadstart002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart003/libthreadstart003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart003/threadstart003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMDeath/vmdeath001/libvmdeath001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMDeath/vmdeath001/vmdeath001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMInit/vminit001/libvminit001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMInit/vminit001/vminit001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMObjectAlloc/vmobjalloc001/libvmobjalloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMObjectAlloc/vmobjalloc001/vmobjalloc001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP01/ap01t001/ap01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP01/ap01t001/libap01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP02/ap02t001/ap02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP02/ap02t001/libap02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP03/ap03t001/ap03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP03/ap03t001/libap03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t001/ap04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t001/libap04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t002/ap04t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t002/libap04t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t003/ap04t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t003/libap04t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t001/ap05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t001/libap05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t002/ap05t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t002/libap05t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP06/ap06t001/ap06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP06/ap06t001/libap06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t001/ap07t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t001/libap07t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t002/ap07t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t002/libap07t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP09/ap09t001/ap09t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP09/ap09t001/libap09t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/ap10t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/libap10t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP11/ap11t001/ap11t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP11/ap11t001/libap11t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP12/ap12t001/ap12t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP12/ap12t001/libap12t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t001/bi01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t001/libbi01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t002/bi01t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t002/libbi01t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t001/bi02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t001/libbi02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t002/bi02t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t002/libbi02t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t001/bi03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t001/libbi03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t002/bi03t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t002/libbi03t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/libbi04t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t001/cm01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t001/libcm01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t002/cm01t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t002/libcm01t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t003/cm01t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t003/libcm01t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t004/cm01t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t004/libcm01t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t005/cm01t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t005/libcm01t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t006/cm01t006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t006/libcm01t006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t007/cm01t007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t007/libcm01t007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/cm01t008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/libcm01t008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t009/cm01t009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t009/libcm01t009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t010/cm01t010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t010/libcm01t010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t011/cm01t011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t011/libcm01t011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t012/cm01t012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t012/libcm01t012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t013/cm01t013.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t013/libcm01t013.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t014/cm01t014.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t014/libcm01t014.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t015/cm01t015.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t015/libcm01t015.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t016/cm01t016.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t016/libcm01t016.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t017/cm01t017.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t017/libcm01t017.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t018/cm01t018.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t018/libcm01t018.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t019/cm01t019.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t019/libcm01t019.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t020/cm01t020.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t020/libcm01t020.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t021/cm01t021.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t021/libcm01t021.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/cm02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/libcm02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/cm03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/libcm03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC01/tc01t001/libtc01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC01/tc01t001/tc01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC02/tc02t001/libtc02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC02/tc02t001/tc02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t001/libtc03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t001/tc03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t002/libtc03t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t002/tc03t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC04/tc04t001/libtc04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC04/tc04t001/tc04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/libtc05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t001/em01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t001/libem01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t002/em01t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t002/libem01t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t001/em02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t001/libem02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t002/em02t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t002/libem02t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t003/em02t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t003/libem02t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t004/em02t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t004/libem02t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t005/em02t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t005/libem02t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t006/em02t006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t006/libem02t006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t007/em02t007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t007/libem02t007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t008/em02t008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t008/libem02t008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t009/em02t009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t009/libem02t009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t010/em02t010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t010/libem02t010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t011/em02t011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t011/libem02t011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t012/em02t012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t012/libem02t012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/libem04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/libem05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/libem05t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM06/em06t001/em06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM06/em06t001/libem06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t001/em07t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t001/libem07t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/libem07t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/extension/EX03/ex03t001/ex03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/extension/EX03/ex03t001/libex03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/gf01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/libgf01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF04/gf04t001/gf04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF04/gf04t001/libgf04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/gf06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/libgf06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t001/gf08t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t001/libgf08t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t002/gf08t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t002/libgf08t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t003/gf08t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t003/libgf08t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/hs103t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/libhs103t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/hs104t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/libhs104t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/hs104t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/libhs104t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/libhs201t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/libhs201t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t003/hs201t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t003/libhs201t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t001/hs202t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t001/libhs202t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/hs202t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/libhs202t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/hs203t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/libhs203t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/hs203t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/libhs203t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/hs203t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/libhs203t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/hs203t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/libhs203t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/libhs204t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/libhs204t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/hs204t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/libhs204t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/hs204t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/libhs204t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/hs301t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/libhs301t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/hs301t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/libhs301t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/hs301t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/libhs301t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/hs301t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/libhs301t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/hs301t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/libhs301t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/hs302t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/libhs302t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/hs302t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/libhs302t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/hs302t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/libhs302t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/hs302t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/libhs302t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/hs302t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/libhs302t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/hs302t006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/libhs302t006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/hs302t007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/libhs302t007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/hs302t008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/libhs302t008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/hs302t009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/libhs302t009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/hs302t010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/libhs302t010.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/hs302t011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/libhs302t011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/hs302t012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/libhs302t012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI01/ji01t001/ji01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI01/ji01t001/libji01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t001/ji03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t001/libji03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t002/ji03t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t002/libji03t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t003/ji03t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t003/libji03t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t004/ji03t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t004/libji03t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI05/ji05t001/ji05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI05/ji05t001/libji05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI06/ji06t001/ji06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI06/ji06t001/libji06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/libma01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/libma01t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/ma01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/ma01t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/libma02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/libma02t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/ma02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/ma02t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/libma03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/libma03t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/ma03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/ma03t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/libma04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/libma04t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/libma04t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/libma04t002a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/libma04t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/libma04t003a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/libma05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/libma05t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/ma05t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/ma05t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/libma06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/libma06t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/libma07t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/libma07t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/libma08t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/libma08t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/ma08t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/ma08t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/libma10t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/libma10t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/ma10t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/ma10t001a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/libma10t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/libma10t002a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/ma10t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/ma10t002a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/libma10t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/libma10t003a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/ma10t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/ma10t003a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/libma10t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/libma10t004a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/libma10t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/libma10t005a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/ma10t005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/ma10t005a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/libma10t006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/libma10t006a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/ma10t006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/ma10t006a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/libma10t007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/libma10t007a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/ma10t007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/ma10t007a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/libma10t008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/libma10t008a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/ma10t008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/ma10t008a.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t001/libsp01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t001/sp01t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t002/libsp01t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t002/sp01t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t003/libsp01t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t003/sp01t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/libsp02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/sp02t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/libsp02t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/libsp02t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t001/libsp03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t001/sp03t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t002/libsp03t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t002/sp03t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t001/libsp04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t001/sp04t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t002/libsp04t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t002/sp04t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t002/libsp05t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t002/sp05t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t003/libsp05t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t003/sp05t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/libsp06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/libsp06t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/libsp06t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/libsp07t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/libsp07t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref001/followref001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref001/libfollowref001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref002/followref002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref002/libfollowref002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref003/followref003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref003/libfollowref003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref004/followref004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref004/libfollowref004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref005/followref005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref005/libfollowref005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref006/followref006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref006/libfollowref006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretbase/earlyretbase.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretbase/libearlyretbase.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/libearlyretfp.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/libearlyretint.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretlong/earlyretlong.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretlong/libearlyretlong.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretobj/earlyretobj.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretobj/libearlyretobj.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretstr/earlyretstr.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretstr/libearlyretstr.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretvoid/earlyretvoid.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretvoid/libearlyretvoid.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/libgetallstktr001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetConstantPool/getcpool001/getcpool001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetConstantPool/getcpool001/libgetcpool001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLineNumberTable/linetab004/liblinetab004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLineNumberTable/linetab004/linetab004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal003/getlocal003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal003/libgetlocal003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal004/getlocal004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal004/libgetlocal004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/IsSynthetic/issynth001/issynth001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/IsSynthetic/issynth001/libIsSyntheticIssynth001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/libMethodBind.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/OnUnload/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/OnUnload/JvmtiTest/libOnUnload.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/libStackTrace.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/agentthr/agentthr.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/agentthr/libagentthr.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/clsldrclss00x/clsldrclss00x.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/clsldrclss00x/libclsldrclss00x.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/libredefineCFLH.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/extmech/extmech.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/extmech/libextmech.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/libAddToBootstrapClassLoaderSearch.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/libDispose.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/libgc.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/libenvironment.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/libnosuspendMonitorInfo.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/libnosuspendStackTrace.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/librawmonitor.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/heapref.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/libheapref.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/librefignore.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/refignore.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/libsetNullVMInit.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/libtimers.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/StackTraceController.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/ThreadController.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/libStackTraceController.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/libThreadController.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/Deadlock.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/LockingThreads.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/RecursiveMonitoringThread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libDeadlock.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libLockingThreads.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libNativeBlockedThread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libRecursiveMonitoringThread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMDITools.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMDITools.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/aod/aod.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/aod/aod.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/BooleanArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/ByteArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/CharArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/DoubleArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/FloatArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/IntArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/LongArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/ShortArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/StringCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libBooleanArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libByteArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libCharArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libDoubleArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libFloatArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libIntArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libLongArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libShortArrayCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libStringCriticalLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIGlobalRefLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNILocalRefLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIRefLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIWeakGlobalRefLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIGlobalRefLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNILocalRefLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIRefLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIWeakGlobalRefLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jvmti/JVMTIAllocLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jvmti/libJVMTIAllocLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/malloc/MallocLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/malloc/libMallocLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jdi/MonitorEnterExecutor.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jdi/libMonitorEnterExecutor.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/JNIreferences.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/libJNIreferences.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jpda/libNativeMethodsTestThread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/libbootclssearch_agent.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/libsystemclssearch_agent.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_common/agent_common.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_common/agent_common.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_tools.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/libHotSwap.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/unit/Heap.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/unit/libHeap.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/locks/JNIMonitorLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/locks/LockingThread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/locks/libJNIMonitorLocker.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/locks/libLockingThread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_thread.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_thread.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_utils.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_list.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_list.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/gclocker/libgcl001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/jnihelper.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress002.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress007.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace014.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace015.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/nsk_strace.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace003.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace004.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace005.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace006.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace008.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace009.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace011.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace012.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace014.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace015.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/share/IndyRedefineClass.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/share/libIndyRedefineClass.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/stepBreakPopReturn/libstepBreakPopReturn.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/stepBreakPopReturn/stepBreakPopReturn.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/meth/stress/jni/nativeAndMH/libnativeAndMH.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/meth/stress/jni/nativeAndMH/nativeAndMH.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/runtime/defmeth/shared/libredefineClasses.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/runtime/defmeth/shared/redefineClasses.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c Examining data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/libProcessUtils.c FINAL RESULTS: data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:236:19: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:240:21: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:215:19: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:220:21: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:216:19: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:220:21: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:630:3: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. chmod(_full_path, _S_IREAD | _S_IWRITE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:179:23: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. if ((cmdlen = readlink(fn, cmdline, PATH_MAX)) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:495:5: [5] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is high; the length parameter appears to be a constant, instead of computing the number of characters left. strncat(jvm_cfg, "/lib/jvm.cfg", MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:692:16: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. if ((ret = readlink(fn, exePath, PATH_MAX - 1)) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:307:20: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. if ((len = readlink(DEFAULT_ZONEINFO_FILE, linkbuf, sizeof(linkbuf)-1)) == -1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:217:17: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(path, mode) >= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:449:17: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. if (chmod(path, mode & ~(S_IWUSR | S_IWGRP | S_IWOTH)) >= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:669:19: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. int len = readlink(self, buf, PATH_MAX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:631:17: [5] (race) chmod: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchmod( ) instead. RESTARTABLE(chmod(path, (mode_t)mode), err); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:657:17: [5] (race) chown: This accepts filename arguments; if an attacker can move those files, a race condition results. (CWE-362). Use fchown( ) instead. RESTARTABLE(chown(path, (uid_t)uid, (gid_t)gid), err); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:917:13: [5] (race) readlink: This accepts filename arguments; if an attacker can move those files or change the link content, a race condition results. Also, it does not terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach. int n = readlink(path, target, sizeof(target)); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:141:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(out + (p - in), "%s%s", rep, p + sub_len); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:266:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(files_to_delete[num_files_to_delete], name); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:270:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(atname+1, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:959:8: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. void system(int op0, int op1, int CRn, int CRm, int op2, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:973:5: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(0b00, 0b011, 0b0010, 0b0000, imm); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1030:5: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(0b00, 0b011, 0b00011, imm, 0b100); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1034:5: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(0b00, 0b011, 0b00011, imm, 0b101); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1038:5: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(0b00, 0b011, 0b00011, SY, 0b110); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1043:5: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. system(0b01, op1, CRn, CRm, op2, rt); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:61:71: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ShenandoahBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:62:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BasicType bt = access.type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:63:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:64:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator *gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:66:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:66:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:66:72: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:75:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr addr = access.resolved_addr()->as_address_ptr()->base(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:82:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:85:68: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ShenandoahBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:86:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator* gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:87:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BasicType type = access.type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:93:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:94:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:94:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:94:86: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:99:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. __ xchg(access.resolved_addr(), value_opr, result, tmp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:101:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:102:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. result = load_reference_barrier(access.gen(), result, LIR_OprFact::addressConst(0)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:107:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:107:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:107:60: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1483:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buffer, sizeof(buffer), "0x%"PRIX64, imm64); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1546:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buffer, sizeof(buffer), "0x%"PRIX64, imm64); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1659:7: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buffer, sizeof(buffer), "0x%"PRIX32, imm32); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/interp_masm_arm.cpp:1900:35: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. InlinedAddress Lprintf((address)printf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:56:7: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(reg&1 ? "H" : "L"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:197:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(LP64 ? "LP64 " : "LP32 "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:198:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(LONGS_IN_ONE_ENTRY ? "long1: " : "long2: "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:278:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(LP64 ? "LP64 " : "LP32 "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:279:3: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(LONGS_IN_ONE_ENTRY ? "long1: " : "long2: "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:70:71: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ShenandoahBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:72:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:73:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator* gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:75:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:75:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:75:72: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:84:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr addr = access.resolved_addr()->as_address_ptr()->base(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:91:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:94:68: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ShenandoahBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:95:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator* gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:96:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BasicType type = access.type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:102:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:103:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:103:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:103:86: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:110:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. __ xchg(access.resolved_addr(), result, result, LIR_OprFact::illegalOpr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:112:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:113:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. result = load_reference_barrier(access.gen(), result, LIR_OprFact::addressConst(0)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:118:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:118:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:118:60: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:207:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(valuebuf, buflen, PTR_FORMAT, *addr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:285:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(valuebuf, buflen, PTR_FORMAT " (bci %d)", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:224:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(addr.sun_path, initial_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.cpp:182:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pci->description, psct.description); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.cpp:246:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ppi->name, pspt.name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.cpp:296:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pwi->name, pswt.name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/misc_aix.hpp:40:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, fmt, ##__VA_ARGS__); \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:589:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(ld_library_path, "%s%s" DEFAULT_LIBPATH, v, v_colon); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:594:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "%s" EXTENSIONS_DIR, Arguments::get_java_home()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1584:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, saved_jvm_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1633:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1637:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 == access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:257:13: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. n = vsscanf(tmp, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:575:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(user_name, p->pw_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:630:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(usrdir_name, tmpdirname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:632:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(usrdir_name, dentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:665:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, usrdir_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:667:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, udentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:691:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(oldest_user, user); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:1194:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rfilename, filename); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:204:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(addr.sun_path, initial_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:417:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(ld_library_path, "%s%s" SYS_EXT_DIR "/lib/%s:" DEFAULT_LIBPATH, v, v_colon, cpu_arch); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:423:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "%s" EXTENSIONS_DIR ":" SYS_EXT_DIR EXTENSIONS_DIR, Arguments::get_java_home()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:510:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ld_library_path, "%s%s%s%s%s" SYS_EXTENSIONS_DIR ":" SYS_EXTENSIONS_DIRS ":.", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:521:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "%s" SYS_EXTENSIONS_DIR ":%s" EXTENSIONS_DIR ":" SYS_EXTENSIONS_DIRS, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1727:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, saved_jvm_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1783:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1791:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1798:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 == access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:329:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path, buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:491:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(user_name, p->pw_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:548:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(usrdir_name, tmpdirname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:550:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(usrdir_name, dentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:571:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, usrdir_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:573:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, udentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:597:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(oldest_user, user); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:1106:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rfilename, filename); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:205:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(addr.sun_path, initial_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:191:23: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int matched = sscanf(p, scan_fmt, returnval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:197:25: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int matched = sscanf(p, scan_fmt, discard, returnval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:321:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. if (sscanf(p, "%*d %*d %*d:%*d %s %s %*[^-]- cgroup %*s %s", tmproot, tmpmount, tmpcgroups) != 3) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:478:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(ld_library_path, "%s%s" SYS_EXT_DIR "/lib:" DEFAULT_LIBPATH, v, v_colon); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:484:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "%s" EXTENSIONS_DIR ":" SYS_EXT_DIR EXTENSIONS_DIR, Arguments::get_java_home()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1160:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. i = sscanf(s, "%c %d %d %d %d %d %lu %lu %lu %lu %lu %lu %lu %ld %ld %ld %ld %ld %ld " _UFM _UFM _DFM _UFM _UFM _UFM _UFM, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2059:21: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int matches = sscanf(line, UINT64_FORMAT_X "-" UINT64_FORMAT_X " %*s %*s %*s " INT64_FORMAT " %s", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2577:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, saved_jvm_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2633:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2637:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 == access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:252:13: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. n = vsscanf(tmp, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:410:11: [4] (buffer) vsscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (vsscanf(line, fmt, args) == 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:504:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(user_name, p->pw_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:574:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(usrdir_name, tmpdirname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:576:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(usrdir_name, dentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:609:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, usrdir_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:611:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, udentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:635:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(oldest_user, user); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:1188:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rfilename, filename); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:345:9: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int os::vsnprintf(char* buf, size_t len, const char* fmt, va_list args) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:347:18: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int result = ::vsnprintf(buf, len, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:649:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(agent_entry_name, sym_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1438:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(outbuf, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:643:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(common_path, SYS_EXT_DIR "/lib"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:660:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(library_path, common_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:667:11: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, common_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:668:11: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, os::path_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:671:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, path->dls_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:672:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, os::path_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:690:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "%s" EXTENSIONS_DIR ":" SYS_EXT_DIR EXTENSIONS_DIR, Arguments::get_java_home()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1953:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, saved_jvm_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2003:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 != access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2007:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (0 == access(buf, F_OK)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:479:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(user_name, p->pw_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:536:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(usrdir_name, tmpdirname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:538:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(usrdir_name, dentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:571:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, usrdir_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:573:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, udentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:597:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(oldest_user, user); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:1133:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rfilename, filename); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:219:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(home_path, home_dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:228:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dll_path, home_dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:229:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(dll_path, bin); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:263:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, tmp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:267:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, tmp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:268:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, PACKAGE_DIR BIN_DIR); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:272:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, tmp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:276:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, tmp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:280:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(library_path, path_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:294:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s%s;%s%s%s", Arguments::get_java_home(), EXT_DIR, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1138:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirp->path, dirname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1181:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirp->dirent.d_name, dirp->find_data.cFileName); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1538:9: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int os::vsnprintf(char* buf, size_t len, const char* fmt, va_list args) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1541:18: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int result = ::vsnprintf(buf, len, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1873:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, saved_jvm_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4943:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. base = (char*)MapViewOfFileEx(hMap, access, 0, (DWORD)file_offset, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5335:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmd_string, cmd_prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5336:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(cmd_string, cmd); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5603:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(agent_entry_name, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5606:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(agent_entry_name, sym_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5611:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(agent_entry_name, sym_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:288:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(user_name, user); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:331:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(usrdir_name, tmpdirname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:333:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(usrdir_name, dentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:364:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(filename, usrdir_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:366:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(filename, udentry->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:400:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(latest_user, user); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:489:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path, dirname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:491:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path, filename); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1642:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(rfilename, filename); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1643:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(robjectname, objectname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:252:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(p, directory); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp:250:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, fmt, sig, info->si_addr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:280:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return access(ZFILENAME_SHMEM_ENABLED, R_OK) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingPath_linux_x86.cpp:60:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access(line_mountpoint, R_OK|W_OK|X_OK) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zPhysicalMemoryBacking_linux_x86.cpp:76:22: [4] (buffer) fscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. const int result = fscanf(file, SIZE_FORMAT, &actual_max_map_count); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlc.hpp:54:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlc.hpp:54:18: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:214:11: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s_%d", instr->_ident, match_rules_cnt++); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:2862:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ec_name, "%s%s", prefix, inst._ident); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3333:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(ec_name, "%s%s", prefix, inst._ident); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4466:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, location); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4467:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(result, cppBlock); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4468:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(result, end_loc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4555:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, location); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4556:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(result, token2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4557:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(result, end_loc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4653:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "(%s)", param); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5261:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(location, "\n#line %d \"%s\"\n", line, file); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:788:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(errfile, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:813:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(regMask,"%s%s()", rc_name, mask); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:906:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(result,"%s%s", stack_or, reg_mask_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:218:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Expr::buffer(), "_kids[0]->_cost[%s]", lchild_to_upper); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:224:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(Expr::buffer(), "_kids[1]->_cost[%s]", rchild_to_upper); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1538:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(s,"/*%s*/(",(char*)i._key); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3464:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(subtree,"_%s_%s_%s", _opType, lstr, rstr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3881:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "%s_%d", instr_ident, match_rules_cnt++); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:460:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(fname,"%s%s",base,suffix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:214:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. templen += sprintf(&operand_stages[templen], " stage_%s%c\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:288:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. templen += sprintf(&resource_stages[templen], " stage_%s%-*s // %s\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:361:16: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. templen += sprintf(&resource_cycles[templen], " %*d%c // %s\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:459:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(&resource_mask[templen], " %s(0x%0*x, %*d, %*d, %s %s(", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:499:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(&resource_mask[templen], "0x%08x%s", res_mask[j], j > 0 ? ", " : ""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2527:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ib += sprintf(ib, " unsigned idx_%-5s = mach_constant_base_node_input(); \t// %s, \t%s\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2529:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. nb += sprintf(nb, " Node *n_%-7s = lookup(idx_%s);\n", name, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2536:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ib += sprintf(ib, " unsigned idx_%-5s = idx%d; \t// %s, \t%s\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2538:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. nb += sprintf(nb, " Node *n_%-7s = lookup(idx_%s);\n", name, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2539:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. ob += sprintf(ob, " %sOper *op_%s = (%sOper *)opnd_array(%d);\n", type, name, type, idx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:310:7: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(fp,is_ideal_bool ? "BoolTest::mask c%d" : "int32_t c%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1619:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRAccess access(this, decorators, base, offset, type, patch_info, load_emit_info); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1620:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1621:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _barrier_set->BarrierSetC1::load_at(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1623:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _barrier_set->load_at(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1630:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRAccess access(this, decorators, LIR_OprFact::illegalOpr, LIR_OprFact::illegalOpr, type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1631:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_resolved_addr(addr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1632:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1633:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _barrier_set->BarrierSetC1::load(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1635:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _barrier_set->load(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1643:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRAccess access(this, decorators, base, offset, type, patch_info, store_emit_info); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1644:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1645:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _barrier_set->BarrierSetC1::store_at(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1647:28: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _barrier_set->store_at(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1657:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRAccess access(this, decorators, base, offset, type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1658:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1659:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC1::atomic_cmpxchg_at(access, cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1661:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->atomic_cmpxchg_at(access, cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1671:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRAccess access(this, decorators, base, offset, type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1672:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1673:55: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC1::atomic_xchg_at(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1675:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->atomic_xchg_at(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1685:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRAccess access(this, decorators, base, offset, type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1686:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1687:54: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC1::atomic_add_at(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_LIRGenerator.cpp:1689:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->atomic_add_at(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:198:9: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(_bufptr, INTPTR_FORMAT "%n", &v, &read) != 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:846:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(string_value, JLONG_FORMAT, &value) != 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:255:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(copy, dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:299:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(copy, zip_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1853:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(orig_copy, orig); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.cpp:64:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name_copy, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2214:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf, "\tat %s.%s(", klass_name, method_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2219:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf + (int)strlen(buf), "%s@%s/", module_name, module_version); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2221:7: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf + (int)strlen(buf), "%s/", module_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2236:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf + (int)strlen(buf), "%s:%d)", source_file_name, line_number); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2239:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf + (int)strlen(buf), "%s)", source_file_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:876:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name_buffer, "%s CompilerThread%d", _compilers[1]->name(), i); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:956:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name_buffer, "%s CompilerThread%d", _compilers[1]->name(), i); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:50:4: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy((char*)_file, file_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:94:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&buf[jvm_offset], hsdis_library_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:95:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(&buf[jvm_offset], os::dll_file_extension()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:99:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&buf[lib_offset], hsdis_library_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:100:7: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(&buf[lib_offset], os::dll_file_extension()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:109:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&buf[lib_offset], hsdis_library_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:110:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(&buf[lib_offset], os::dll_file_extension()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:117:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&buf[0], hsdis_library_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:118:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(&buf[0], os::dll_file_extension()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:181:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fillp, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/gSpaceCounters.cpp:45:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp:56:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:51:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void G1BarrierSetC1::pre_barrier(LIRAccess& access, LIR_Opr addr_opr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:53:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator* gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:54:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:110:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void G1BarrierSetC1::post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:111:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator* gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:112:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:178:50: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void G1BarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:179:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:183:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator *gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:185:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BarrierSetC1::load_at_resolved(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:187:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop() && (is_weak || is_phantom || is_anonymous)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:192:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. generate_referent_check(access, Lcont_anonymous); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:194:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access, LIR_OprFact::illegalOpr /* addr_opr */, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:195:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. result /* pre_val */, access.patch_emit_info() /* info */); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:121:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void pre_barrier(LIRAccess& access, LIR_Opr addr_opr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:123:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:125:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void load_at_resolved(LIRAccess& access, LIR_Opr result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:595:50: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* G1BarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:596:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:597:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:599:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:600:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* obj = access.base(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:610:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* load = CardTableBarrierSetC2::load_at_resolved(access, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:621:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_oop() || !need_read_barrier) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.hpp:85:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGenerationCounters.cpp:46:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/spaceCounters.cpp:43:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/cSpaceCounters.cpp:43:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:41:50: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr BarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:42:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:46:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRItem& base = access.base().item(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:47:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr offset = access.offset().opr(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:48:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator *gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:52:84: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. addr_opr = LIR_OprFact::address(gen->emit_array_address(base.result(), offset, access.type())); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:58:82: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. addr_opr = LIR_OprFact::address(new LIR_Address(base.result(), PATCHED_ADDR, access.type())); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:60:88: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. addr_opr = LIR_OprFact::address(gen->generate_address(base.result(), offset, 0, 0, access.type())); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:66:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. __ leal(addr_opr, resolved_addr, lir_patch_normal, access.patch_emit_info()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:67:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.clear_decorators(C1_NEEDS_PATCHING); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:71:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return LIR_OprFact::address(new LIR_Address(resolved_addr, access.type())); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:77:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void BarrierSetC1::store_at(LIRAccess& access, LIR_Opr value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:78:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:82:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr resolved = resolve_address(access, false); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:83:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_resolved_addr(resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:84:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. store_at_resolved(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:87:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void BarrierSetC1::load_at(LIRAccess& access, LIR_Opr result) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:88:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:92:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr resolved = resolve_address(access, false); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:93:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_resolved_addr(resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:94:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. load_at_resolved(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:97:36: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void BarrierSetC1::load(LIRAccess& access, LIR_Opr result) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:98:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:101:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. load_at_resolved(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:104:52: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr BarrierSetC1::atomic_cmpxchg_at(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:105:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:109:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.load_address(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:111:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr resolved = resolve_address(access, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:112:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_resolved_addr(resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:113:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return atomic_cmpxchg_at_resolved(access, cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:116:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr BarrierSetC1::atomic_xchg_at(LIRAccess& access, LIRItem& value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:117:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:121:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.load_address(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:123:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr resolved = resolve_address(access, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:124:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_resolved_addr(resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:125:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return atomic_xchg_at_resolved(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:128:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr BarrierSetC1::atomic_add_at(LIRAccess& access, LIRItem& value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:129:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:133:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.load_address(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:135:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr resolved = resolve_address(access, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:136:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_resolved_addr(resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:137:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return atomic_add_at_resolved(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:140:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void BarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:141:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:145:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator* gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:148:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value = gen->mask_boolean(access.base().opr(), value, access.access_emit_info()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:148:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value = gen->mask_boolean(access.base().opr(), value, access.access_emit_info()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:157:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. gen->volatile_field_store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:157:80: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. gen->volatile_field_store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:159:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. __ store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info(), patch_code); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:159:63: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. __ store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info(), patch_code); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:167:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void BarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:168:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator *gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:169:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:181:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. __ move_wide(access.resolved_addr()->as_address_ptr(), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:183:30: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. gen->volatile_field_load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:183:80: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. gen->volatile_field_load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:185:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. __ load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info(), patch_code); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:185:63: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. __ load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info(), patch_code); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:202:61: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr BarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:203:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator *gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:204:30: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return gen->atomic_cmpxchg(access.type(), access.resolved_addr(), cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:204:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return gen->atomic_cmpxchg(access.type(), access.resolved_addr(), cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:207:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr BarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:208:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator *gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:209:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return gen->atomic_xchg(access.type(), access.resolved_addr(), value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:209:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return gen->atomic_xchg(access.type(), access.resolved_addr(), value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:212:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr BarrierSetC1::atomic_add_at_resolved(LIRAccess& access, LIRItem& value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:213:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator *gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:214:26: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return gen->atomic_add(access.type(), access.resolved_addr(), value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:214:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return gen->atomic_add(access.type(), access.resolved_addr(), value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:217:55: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void BarrierSetC1::generate_referent_check(LIRAccess& access, LabelObj* cont) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:238:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator *gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:240:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRItem& base = access.base().item(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:241:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr offset = access.offset().opr(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:115:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:117:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void generate_referent_check(LIRAccess& access, LabelObj* cont); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:120:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void store_at_resolved(LIRAccess& access, LIR_Opr value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:121:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void load_at_resolved(LIRAccess& access, LIR_Opr result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:123:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:125:54: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:126:53: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_add_at_resolved(LIRAccess& access, LIRItem& value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:129:36: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void store_at(LIRAccess& access, LIR_Opr value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:130:35: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void load_at(LIRAccess& access, LIR_Opr result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:131:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void load(LIRAccess& access, LIR_Opr result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:133:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_cmpxchg_at(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:135:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_xchg_at(LIRAccess& access, LIRItem& value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:136:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_add_at(LIRAccess& access, LIRItem& value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:37:53: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void CardTableBarrierSetC1::post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:38:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:39:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator* gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.hpp:32:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:35:55: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void ModRefBarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:36:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:40:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:41:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access, access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:41:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access, access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:42:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_OprFact::illegalOpr /* pre_val */, access.patch_emit_info()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:45:35: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BarrierSetC1::store_at_resolved(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:47:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:49:35: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr post_addr = precise ? access.resolved_addr() : access.base().opr(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:49:60: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr post_addr = precise ? access.resolved_addr() : access.base().opr(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:50:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(access, post_addr, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:54:67: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ModRefBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:55:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:56:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access, access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:56:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access, access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:60:61: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr result = BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:62:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:63:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(access, access.resolved_addr(), new_value.result()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:63:26: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(access, access.resolved_addr(), new_value.result()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:69:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ModRefBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:70:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:71:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access, access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:71:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access, access.resolved_addr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:75:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr result = BarrierSetC1::atomic_xchg_at_resolved(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:77:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:78:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(access, access.resolved_addr(), value.result()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:78:26: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(access, access.resolved_addr(), value.result()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:86:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ModRefBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:87:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:93:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. resolve_in_register |= !needs_patching && is_write && access.is_oop() && precise; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:94:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC1::resolve_address(access, resolve_in_register); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:36:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void pre_barrier(LIRAccess& access, LIR_Opr addr_opr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:38:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:41:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:43:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void store_at_resolved(LIRAccess& access, LIR_Opr value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:45:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:47:54: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:36:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void BarrierSetC2::resolve_address(C2Access& access) const { } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:71:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:72:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:73:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:83:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.type() == T_DOUBLE) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:88:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. MemNode::MemOrd mo = access.mem_node_mo(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:90:54: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* store = kit->store_to_memory(kit->control(), access.addr().node(), val.node(), access.type(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:90:88: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* store = kit->store_to_memory(kit->control(), access.addr().node(), val.node(), access.type(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:91:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.addr().type(), mo, requires_atomic_access, unaligned, mismatched, unsafe); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:92:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_raw_access(store); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:96:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:97:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:98:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:100:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:101:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const TypePtr* adr_type = access.addr().type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:112:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. MemNode::MemOrd mo = access.mem_node_mo(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:118:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. load = kit->make_load(control, adr, val_type, access.type(), mo); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:120:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. load = kit->make_load(control, adr, val_type, access.type(), adr_type, mo, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:124:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_raw_access(load); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:134:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AccessFence(C2Access& access) : data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:135:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _access(access), _leading_membar(NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:136:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:137:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:178:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.needs_cpu_membar()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:186:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_memory(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:235:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::store_at(C2Access& access, C2AccessValue& val) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:236:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AccessFence fence(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:237:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. resolve_address(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:238:28: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return store_at_resolved(access, val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:241:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::load_at(C2Access& access, const Type* val_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:242:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AccessFence fence(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:243:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. resolve_address(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:244:27: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return load_at_resolved(access, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:316:43: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. static void pin_atomic_op(C2AtomicAccess& access) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:317:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.needs_pinning()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:323:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:324:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* load_store = access.raw_access(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:327:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. kit->set_memory(proj, access.alias_idx()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:335:68: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:337:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:338:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. MemNode::MemOrd mo = access.mem_node_mo(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:339:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* mem = access.memory(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:341:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:342:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const TypePtr* adr_type = access.addr().type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:346:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:358:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch (access.type()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:380:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_raw_access(load_store); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:381:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pin_atomic_op(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:384:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop() && adr->bottom_type()->is_ptr_to_narrowoop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:392:69: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:394:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:395:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:396:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. MemNode::MemOrd mo = access.mem_node_mo(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:397:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* mem = access.memory(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:400:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:402:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:422:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch(access.type()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:460:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_raw_access(load_store); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:461:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pin_atomic_op(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:466:61: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* value_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:467:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:468:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* mem = access.memory(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:469:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:470:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const TypePtr* adr_type = access.addr().type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:473:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:484:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch (access.type()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:502:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_raw_access(load_store); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:503:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pin_atomic_op(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:506:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop() && adr->bottom_type()->is_ptr_to_narrowoop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:514:60: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::atomic_add_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* value_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:516:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:517:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:518:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const TypePtr* adr_type = access.addr().type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:519:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* mem = access.memory(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:521:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch(access.type()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:538:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_raw_access(load_store); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:539:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pin_atomic_op(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:544:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::atomic_cmpxchg_val_at(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:546:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AccessFence fence(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:547:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. resolve_address(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:548:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:551:60: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::atomic_cmpxchg_bool_at(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:553:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AccessFence fence(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:554:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. resolve_address(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:555:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:558:52: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::atomic_xchg_at(C2AtomicAccess& access, Node* new_val, const Type* value_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:559:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AccessFence fence(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:560:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. resolve_address(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:561:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return atomic_xchg_at_resolved(access, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:564:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* BarrierSetC2::atomic_add_at(C2AtomicAccess& access, Node* new_val, const Type* value_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:565:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AccessFence fence(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:566:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. resolve_address(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:567:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return atomic_add_at_resolved(access, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:168:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void resolve_address(C2Access& access) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:169:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:170:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:172:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:174:65: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:176:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* val_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:177:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_add_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* val_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:181:36: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* store_at(C2Access& access, C2AccessValue& val) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:182:35: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* load_at(C2Access& access, const Type* val_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:184:55: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_val_at(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:186:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_bool_at(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:188:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_xchg_at(C2AtomicAccess& access, Node* new_val, const Type* value_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:189:47: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_add_at(C2AtomicAccess& access, Node* new_val, const Type* value_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:33:55: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ModRefBarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:34:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:35:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:37:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const TypePtr* adr_type = access.addr().type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:38:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:45:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_oop() || (!in_heap && !anonymous)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:46:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC2::store_at_resolved(access, val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:52:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(kit, true /* do_load */, kit->control(), access.base(), adr, adr_idx, val.node(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:53:79: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. static_cast<const TypeOopPtr*>(val.type()), NULL /* pre_val */, access.type()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:54:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* store = BarrierSetC2::store_at_resolved(access, val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:55:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, kit->control(), access.raw_access(), access.base(), adr, adr_idx, val.node(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:55:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, kit->control(), access.raw_access(), access.base(), adr, adr_idx, val.node(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:56:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.type(), use_precise); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:61:74: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ModRefBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:63:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:65:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:66:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:73:63: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* result = BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:75:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, kit->control(), access.raw_access(), access.base(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:75:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, kit->control(), access.raw_access(), access.base(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:76:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:76:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:81:75: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ModRefBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:83:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:85:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:86:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:93:68: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* load_store = BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:108:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, ideal.ctrl(), access.raw_access(), access.base(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:108:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, ideal.ctrl(), access.raw_access(), access.base(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:109:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:109:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:117:67: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ModRefBarrierSetC2::atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* value_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:118:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:120:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* result = BarrierSetC2::atomic_xchg_at_resolved(access, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:121:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:131:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:131:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:131:73: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:132:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.alias_idx(), new_val, T_OBJECT, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:55:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:57:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:59:65: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:61:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* value_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorCounters.cpp:40:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationCounters.cpp:40:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/hSpaceCounters.cpp:45:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.cpp:714:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dup, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:179:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void ShenandoahBarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:180:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:60: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:81: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:30: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:78: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:186:35: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BarrierSetC1::store_at_resolved(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:189:60: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ShenandoahBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:193:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const bool patch_before_barrier = access.is_oop() && (access.decorators() & C1_NEEDS_PATCHING) != 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:193:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const bool patch_before_barrier = access.is_oop() && (access.decorators() & C1_NEEDS_PATCHING) != 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:194:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC1::resolve_address(access, resolve_in_register || patch_before_barrier); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:197:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void ShenandoahBarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:199:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:200:36: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BarrierSetC1::load_at_resolved(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:204:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIRGenerator* gen = access.gen(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:205:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:206:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BasicType type = access.type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:211:36: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BarrierSetC1::load_at_resolved(access, tmp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:212:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. tmp = load_reference_barrier(gen, tmp, access.resolved_addr()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:215:36: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BarrierSetC1::load_at_resolved(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:220:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:229:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. generate_referent_check(access, Lcont_anonymous); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:231:24: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_barrier(gen, access.access_emit_info(), decorators, LIR_OprFact::illegalOpr /* addr_opr */, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:217:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void store_at_resolved(LIRAccess& access, LIR_Opr value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:218:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:219:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void load_at_resolved(LIRAccess& access, LIR_Opr result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:221:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:223:54: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:497:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ShenandoahBarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:498:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:500:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const TypePtr* adr_type = access.addr().type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:501:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:506:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_oop() || (!on_heap && !anonymous)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:507:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC2::store_at_resolved(access, val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:510:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:517:77: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. shenandoah_write_barrier_pre(kit, true /* do_load */, /*kit->control(),*/ access.base(), adr, adr_idx, val.node(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:518:96: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. static_cast<const TypeOopPtr*>(val.type()), NULL /* pre_val */, access.type()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:519:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC2::store_at_resolved(access, val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:522:58: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ShenandoahBarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:524:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:525:43: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC2::load_at_resolved(access, val_type);; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:528:47: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* load = BarrierSetC2::load_at_resolved(access, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:529:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:530:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BasicType type = access.type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:535:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. load = access.kit()->gvn().transform(load); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:541:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:543:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* obj = access.base(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:558:21: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:581:43: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. static void pin_atomic_op(C2AtomicAccess& access) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:582:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.needs_pinning()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:588:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:589:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* load_store = access.raw_access(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:592:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. kit->set_memory(proj, access.alias_idx()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:595:78: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ShenandoahBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:597:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:598:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:604:26: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. MemNode::MemOrd mo = access.mem_node_mo(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:605:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* mem = access.memory(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:606:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:607:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const TypePtr* adr_type = access.addr().type(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:629:5: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_raw_access(load_store); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:630:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pin_atomic_op(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:640:55: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:643:79: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ShenandoahBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:645:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:646:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:651:31: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:652:26: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. MemNode::MemOrd mo = access.mem_node_mo(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:653:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* mem = access.memory(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:656:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:691:5: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_raw_access(load_store); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:692:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pin_atomic_op(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:695:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:698:71: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ShenandoahBarrierSetC2::atomic_xchg_at_resolved(C2AtomicAccess& access, Node* val, const Type* value_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:699:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:700:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:703:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* result = BarrierSetC2::atomic_xchg_at_resolved(access, val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:704:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_oop()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:84:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:85:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:86:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:88:65: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:90:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* val_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp:42:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name_space, cns); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:34:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. ZLoadBarrierStubC1::ZLoadBarrierStubC1(LIRAccess& access, LIR_Opr ref, address runtime_stub) : data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:35:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _decorators(access.decorators()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:36:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _ref_addr(access.resolved_addr()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:47:14: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. _tmp = access.gen()->new_pointer_register(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:126:39: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. static bool barrier_needed(LIRAccess& access) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:127:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return ZBarrierSet::barrier_needed(access.decorators(), access.type()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:127:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return ZBarrierSet::barrier_needed(access.decorators(), access.type()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:146:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define __ access.gen()->lir(__FILE__, __LINE__)-> data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:148:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. #define __ access.gen()->lir()-> data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:151:45: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void ZBarrierSetC1::load_barrier(LIRAccess& access, LIR_Opr result) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:156:81: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const address runtime_stub = load_barrier_on_oop_field_preloaded_runtime_stub(access.decorators()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:157:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. CodeStub* const stub = new ZLoadBarrierStubC1(access, result, runtime_stub); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:162:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ZBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:166:52: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const bool patch_before_barrier = barrier_needed(access) && (access.decorators() & C1_NEEDS_PATCHING) != 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:166:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. const bool patch_before_barrier = barrier_needed(access) && (access.decorators() & C1_NEEDS_PATCHING) != 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:167:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC1::resolve_address(access, resolve_in_register || patch_before_barrier); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:172:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void ZBarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:173:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. BarrierSetC1::load_at_resolved(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:175:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (barrier_needed(access)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:176:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. load_barrier(access, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:180:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. static void pre_load_barrier(LIRAccess& access) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:181:29: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. DecoratorSet decorators = access.decorators(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:190:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.gen()->access_load_at(decorators, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:191:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.type(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:192:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.base().item(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:193:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.offset().opr(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:194:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.gen()->new_register(access.type()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:194:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.gen()->new_register(access.type()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:199:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ZBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:200:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (barrier_needed(access)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:201:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_load_barrier(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:204:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC1::atomic_xchg_at_resolved(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:207:62: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. LIR_Opr ZBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:208:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (barrier_needed(access)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:209:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. pre_load_barrier(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:212:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:42:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. ZLoadBarrierStubC1(LIRAccess& access, LIR_Opr ref, address runtime_stub); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:64:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. void load_barrier(LIRAccess& access, LIR_Opr result) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:67:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:68:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual void load_at_resolved(LIRAccess& access, LIR_Opr result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:69:54: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:70:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:496:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ZBarrierSetC2::make_cas_loadbarrier(C2AtomicAccess& access) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:498:50: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. CompareAndSwapNode* cas = (CompareAndSwapNode*)access.raw_access(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:499:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. PhaseGVN& gvn = access.kit()->gvn(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:501:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:588:60: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ZBarrierSetC2::make_cmpx_loadbarrier(C2AtomicAccess& access) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:589:61: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. CompareAndExchangePNode* cmpx = (CompareAndExchangePNode*)access.raw_access(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:590:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:687:37: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. static bool barrier_needed(C2Access access) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:688:38: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return ZBarrierSet::barrier_needed(access.decorators(), access.type()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:688:59: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return ZBarrierSet::barrier_needed(access.decorators(), access.type()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:691:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ZBarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:692:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* p = BarrierSetC2::load_at_resolved(access, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:693:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!barrier_needed(access)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:697:16: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. bool weak = (access.decorators() & ON_WEAK_OOP_REF) != 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:699:19: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. GraphKit* kit = access.kit(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:701:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:702:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* heap_base_oop = access.base(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:703:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. bool unsafe = (access.decorators() & C2_UNSAFE_ACCESS) != 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:729:25: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return load_barrier(access.kit(), p, access.addr().node(), weak, true, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:729:42: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return load_barrier(access.kit(), p, access.addr().node(), weak, true, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:733:69: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ZBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:735:63: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* result = BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:736:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!barrier_needed(access)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:740:3: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_needs_pinning(false); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:741:32: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return make_cmpx_loadbarrier(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:744:70: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ZBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, Node* expected_val, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:746:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* result = BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:747:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!barrier_needed(access)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:751:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* load_store = access.raw_access(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:752:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. bool weak_cas = (access.decorators() & C2_WEAK_CMPXCHG) != 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:757:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_needs_pinning(false); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:758:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. load_store = make_cas_loadbarrier(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:760:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.set_needs_pinning(false); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:761:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. load_store = make_cas_loadbarrier(access); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:768:62: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* ZBarrierSetC2::atomic_xchg_at_resolved(C2AtomicAccess& access, Node* new_val, const Type* val_type) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:769:56: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* result = BarrierSetC2::atomic_xchg_at_resolved(access, new_val, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:770:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!barrier_needed(access)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:774:22: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* load_store = access.raw_access(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:775:15: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* adr = access.addr().node(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:777:23: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return load_barrier(access.kit(), load_store, adr, false, false, false); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:163:46: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* make_cas_loadbarrier(C2AtomicAccess& access) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:164:47: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. Node* make_cmpx_loadbarrier(C2AtomicAccess& access) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:171:44: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:172:64: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicAccess& access, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:176:65: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicAccess& access, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:180:57: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. virtual Node* atomic_xchg_at_resolved(C2AtomicAccess& access, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/include/jvm.h:1324:20: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. jint (JNICALL *vfprintf)(FILE *fp, const char *format, va_list args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1276:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system) ("Thread local allocation (native) for " SIZE_FORMAT data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1382:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system) ("%s", text); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1441:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("Allocation using C_HEAP_ARRAY for " SIZE_FORMAT data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1519:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("JfrClassAdapter: unable to create ClassFileStream"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1525:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("JfrClassAdapter: unable to create InstanceKlass"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1545:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("JfrClassAdapter: unable to create ClassFileStream"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1551:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("JfrClassAdapter: unable to create InstanceKlass"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:50:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("ERROR: JfrJvmtiAgent: " INT32_FORMAT " (%s): %s\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:114:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("%s", error_buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:146:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("GetObjectArrayElement threw an exception"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:268:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)(illegal_state_msg); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:269:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("JFR uses JVMTI RetransformClasses and requires the JVMTI state to have entered JVMTI_PHASE_LIVE."); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:270:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("Please initialize JFR in response to event JVMTI_EVENT_VM_INIT instead of JVMTI_EVENT_VM_START."); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp:530:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("%s",error_msg); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp:532:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("%s", "An irrecoverable error in Jfr. Shutting down VM..."); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.cpp:91:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("RegisterNatives for JVM class failed!"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:84:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("JfrUpcall failed"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:102:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("%s", error_buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:57:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)( data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:87:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)( data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:94:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)( data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:72:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("EdgeQueue reserved size total: " SIZE_FORMAT " [KB]", edge_queue.reserved_size() / K); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:73:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("EdgeQueue edges total: " SIZE_FORMAT, edge_queue.top()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:74:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("EdgeQueue liveset total: " SIZE_FORMAT " [KB]", edge_queue.live_set() / K); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:76:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("EdgeQueue commit reserve ratio: %f\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp:53:48: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. OldObjectRoot::System system, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp:60:21: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. _info._system = system; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:71:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Object sampling could not be started because the sampler could not be allocated"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:75:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Object sampling started"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:89:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Object sampling stopped"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp:58:48: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. static const char* system_description(System system) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp:59:13: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. switch (system) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:114:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Unable to generate network utilization events"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:153:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)( "Unable to generate requestable event CPUInformation"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:176:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)( "Unable to generate requestable event CPULoad"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:212:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)( "Unable to generate requestable event SystemProcesses"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:250:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)( "Unable to generate requestable event ThreadContextSwitchRate"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp:46:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("unable to create jfr event for DCMD %s", cmd); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp:47:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("exception type: %s", PENDING_EXCEPTION->klass()->external_name()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:208:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(hash_buf, "/" UINTX_FORMAT, hash); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:214:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(anonymous_symbol + result_len, hash_buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:149:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Starting a recording"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:152:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Exception while starting a recording"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:156:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Finished starting a recording"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:177:25: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LogTarget(Error, jfr, system) lt_error; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:416:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Recorder thread STOPPED"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:190:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_error(jfr, system)("Unable to open repository %s", _repo); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp:253:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Request to START recording"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp:259:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Recording STARTED"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp:305:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Recording STOPPED"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp:47:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Recorder thread STARTED"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp:79:24: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Request to STOP recorder"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:297:18: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Cleared 1 full buffer of " SIZE_FORMAT " bytes.", unflushed_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:398:34: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (log_is_enabled(Debug, jfr, system)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:400:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Cleared " SIZE_FORMAT " full buffer(s) of " SIZE_FORMAT" bytes.", count, amount); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:401:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Current number of full buffers " SIZE_FORMAT "", current); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:694:34: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (log_is_enabled(Debug, jfr, system)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:696:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("%s " SIZE_FORMAT " full buffer(s) of " SIZE_FORMAT" B of data%s", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:727:36: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. if (log_is_enabled(Debug, jfr, system)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:728:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Released " SIZE_FORMAT " dead buffer(s) of " SIZE_FORMAT" B of data.", count, amount); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:729:22: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_debug(jfr, system)("Current number of dead buffers " SIZE_FORMAT "", current); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:58:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Allocation: [" SIZE_FORMAT "] bytes", alloc_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:59:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Total alloc [" JLONG_FORMAT "] bytes", total_allocated); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:60:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Liveset: [" JLONG_FORMAT "] bytes", current_live_set); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:68:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Deallocation: [" SIZE_FORMAT "] bytes", dealloc_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:69:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Total dealloc [" JLONG_FORMAT "] bytes", total_deallocated); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:70:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_trace(jfr, system)("Liveset: [" JLONG_FORMAT "] bytes", current_live_set); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:82:24: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. log_warning(jfr, system)("Memory allocation failed for size [" SIZE_FORMAT "] bytes", alloc_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:50:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. JFR_LOG_TAG(jfr, system) \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:51:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. JFR_LOG_TAG(jfr, system, event) \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:52:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. JFR_LOG_TAG(jfr, system, setting) \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:53:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. JFR_LOG_TAG(jfr, system, bytecode) \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:54:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. JFR_LOG_TAG(jfr, system, parser) \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:55:20: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. JFR_LOG_TAG(jfr, system, metadata) \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:319:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name_buf, "%s::%s", vmField.typeName, vmField.fieldName); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:426:15: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int ret = sscanf(outputstr + 1, SIZE_FORMAT, &idx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:153:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(oldest_name, archive_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:426:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result + i, first); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:433:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result + i, second); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logMessageBuffer.cpp:113:28: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. written += (size_t)os::vsnprintf(current_buffer_position, remaining_buffer_length, fmt, copy) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.hpp:154:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. LOG_TAG(system) \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:121:15: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = os::vsnprintf(buf + prefix_len, sizeof(buf) - prefix_len, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:124:15: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = os::vsnprintf(buf, sizeof(buf), fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:131:15: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. ret = os::vsnprintf(newbuf + prefix_len, newbuf_len - prefix_len, fmt, saved_args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:146:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(header_version, vm_version); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:250:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name->data(), name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp:1945:9: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf("long " INT64_FORMAT, (int64_t) *(jlong *) &val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:2154:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. os::vsnprintf(msg_buffer, sizeof(msg_buffer), format, ap); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:341:33: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access ? "" : "NOT ", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:345:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return access; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2949:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return (access & (~JVM_ACC_SUPER)) & JVM_ACC_WRITTEN_FLAGS; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:660:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result + name_len, addr_buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:155:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest, klass_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:157:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&dest[klass_name_len + 1], method_name->as_C_string()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:158:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&dest[klass_name_len + 1 + method_name_len], signature->as_C_string()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2138:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, Matcher::regName[reg]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2140:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buf,"%s + #%d",OptoReg::regname(OptoReg::c_frame_pointer), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1583:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2Access access(this, decorators | C2_WRITE_ACCESS, bt, obj, addr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1584:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1585:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC2::store_at(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1587:35: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->store_at(access, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1602:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2Access access(this, decorators | C2_READ_ACCESS, bt, obj, addr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1603:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1604:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC2::load_at(access, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1606:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->load_at(access, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1619:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2Access access(this, decorators | C2_READ_ACCESS, bt, NULL, addr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1620:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1621:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC2::load_at(access, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1623:34: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->load_at(access, val_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1639:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AtomicAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1641:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1642:62: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC2::atomic_cmpxchg_val_at(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1644:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->atomic_cmpxchg_val_at(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1660:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AtomicAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1662:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1663:63: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC2::atomic_cmpxchg_bool_at(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1665:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->atomic_cmpxchg_bool_at(access, expected_val, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1680:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AtomicAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1682:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1683:55: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC2::atomic_xchg_at(access, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1685:41: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->atomic_xchg_at(access, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1700:18: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. C2AtomicAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS, bt, obj, addr, alias_idx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1701:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_raw()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1702:54: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->BarrierSetC2::atomic_add_at(access, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:1704:40: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return _barrier_set->atomic_add_at(access, new_val, value_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:540:11: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, JLONG_FORMAT, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp:2848:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(buffer, "Bytecode %d: %s", bci(), Bytecodes::name(bc())); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1547:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "min+" INT32_FORMAT, n - min_jint); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1551:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "max-" INT32_FORMAT, max_jint - n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1553:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, INT32_FORMAT, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1808:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "%s+" JLONG_FORMAT, xname, n - x); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1811:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "%s-" JLONG_FORMAT, xname, x - n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1823:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "min+" JLONG_FORMAT, n - min_jlong); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1827:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, "max-" JLONG_FORMAT, max_jlong - n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1835:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, JLONG_FORMAT, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/cdsoffsets.cpp:36:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2946:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(trial_name_str, prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2947:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(trial_name_str, name_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:2775:20: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int result = os::vsnprintf(str, count, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:2808:12: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. return vfprintf(f, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1669:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(trial_name_str, prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1670:11: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(trial_name_str, name_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:1193:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info_ptr->name, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:1440:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(info_ptr->name, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2379:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(result, class_sig); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2396:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(gen_result, gen_sig); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2445:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*source_name_ptr, sfncp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2825:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*source_debug_extension_ptr, sde); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2884:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*name_ptr, fieldName); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2893:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*signature_ptr, fieldSignature); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2905:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*generic_ptr, gen_sig); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2961:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*name_ptr, utf8_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2968:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*signature_ptr, utf8_signature); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2981:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*generic_ptr, gen_sig); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3139:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(name_buf, utf8_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3143:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sig_buf, utf8_signature); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3149:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(gen_sig_buf, utf8_gen_sign); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3695:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*tmp_value, key); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3725:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*value_ptr, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:459:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(prefix_copy, prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:1174:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dup_str, str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:114:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ext_funcs[i].id, id); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:122:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ext_funcs[i].short_description, desc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:146:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dst_params[j].name, src_params[j].name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:202:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ext_events[i].id, id); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:210:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ext_events[i].short_description, desc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:234:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dst_params[j].name, src_params[j].name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRawMonitor.cpp:59:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). _name = strcpy(NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal), name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3763:11: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(trial_name_str, prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3764:11: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(trial_name_str, name_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:128:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_value, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:148:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sp, _value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:149:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sp, os::path_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:150:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(sp, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:153:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sp, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:165:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_value, value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:200:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_key, key); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:211:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:216:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_options, options); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2329:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s/%s/%s", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.cpp:1305:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fv.description, description); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.cpp:127:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(_log_fp, UINTX_FORMAT_W(6) ",", CodeCache::capacity() / K); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.cpp:129:3: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(_log_fp, UINTX_FORMAT_W(6) "," UINTX_FORMAT_W(6) ",%6ld\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:204:53: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. def(SATB_Q_FL_lock , PaddedMutex , access, true, Monitor::_safepoint_check_never); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:205:53: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. def(SATB_Q_CBL_mon , PaddedMonitor, access, true, Monitor::_safepoint_check_never); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:208:53: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. def(DirtyCardQ_FL_lock , PaddedMutex , access, true, Monitor::_safepoint_check_never); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:209:53: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. def(DirtyCardQ_CBL_mon , PaddedMonitor, access, true, Monitor::_safepoint_check_never); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:224:53: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. def(SATB_Q_FL_lock , PaddedMutex , access, true, Monitor::_safepoint_check_never); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutexLocker.cpp:225:53: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. def(SATB_Q_CBL_mon , PaddedMonitor, access, true, Monitor::_safepoint_check_never); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp:2318:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(knobs, SyncKnobs); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:109:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int os::snprintf(char* buf, size_t len, const char* fmt, ...) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:112:20: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int result = os::vsnprintf(buf, len, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:612:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dup_str, str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1253:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(q, home); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1279:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(modified_mode, "%s" LINUX_ONLY("e") BSD_ONLY("e") WINDOWS_ONLY("N"), mode); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1347:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(inpath, path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:671:14: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. static int vsnprintf(char* buf, size_t len, const char* fmt, va_list args) ATTRIBUTE_PRINTF(3, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:672:14: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. static int snprintf(char* buf, size_t len, const char* fmt, ...) ATTRIBUTE_PRINTF(3, 4); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:93:6: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_name, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:104:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(_name, "%s.%s", prefix, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:158:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(cname, name()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:369:4: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(result, "%s.%s", ns, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:657:51: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. AccessFlags access, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:681:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access.is_public()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:698:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_protected()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:703:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_static() || // static fields are ok, see 6622385 data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:715:8: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (!access.is_private() && is_same_class_package(current_class, member_class)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:721:7: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access.is_private() && host_class == current_class) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:728:11: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.hpp:96:52: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. AccessFlags access, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:103:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, next_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:116:10: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. || sscanf(str, JLONG_FORMAT "%n", &_value, &scanned) != 1 data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:213:14: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int argc = sscanf(str, JLONG_FORMAT, &_value._time); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:313:13: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int res = sscanf(str, UINT64_FORMAT "%c", &_value._val, &_value._multiplier); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:1998:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(str, error()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2061:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(base_path, HeapDumpPath); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2075:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(base_path, os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:153:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(arg, INTX_FORMAT, &value)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:170:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(arg, UINTX_FORMAT, &value)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:187:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(arg, UINT64_FORMAT, &value)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:204:7: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. if (sscanf(arg, SIZE_FORMAT, &value)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/compilerWarnings.hpp:41:60: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define ATTRIBUTE_PRINTF(fmt,vargs) __attribute__((format(printf, fmt, vargs))) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/compilerWarnings.hpp:44:59: [4] (buffer) scanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. #define ATTRIBUTE_SCANF(fmt,vargs) __attribute__((format(scanf, fmt, vargs))) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:79:40: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. functions that do not slow down the system too much and thus can be left in optimized code. data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:120:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(err, format, ap); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:423:3: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buffer, "printnm: " INTPTR_FORMAT, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:120:3: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(_filepath, filepath); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/exceptions.cpp:249:7: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. os::vsnprintf(msg, max_msg_size, format, ap); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:102:23: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int written = os::vsnprintf(buffer, buflen, format, ap); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:447:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, force_directory); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:448:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:488:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&buf[buf_pos + first], p1st); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:492:7: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(&buf[buf_pos + second - first - 2], p2nd); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:496:3: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, tail); // append rest of name, or all of name data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:108:25: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(languageString, region); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:486:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(sProps->protocol##Port, buf); \ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:456:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(jvm_cfg, F_OK) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:461:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(libjava, F_OK) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:472:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(libjava, F_OK) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:496:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(jvm_cfg, F_OK) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:534:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(realPathToSelf, F_OK) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:506:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(libName, cname+prefixLen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:174:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(path, radical); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:175:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path, replaced); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:36:34: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JLI_ReportMessage(...) printf(__VA_ARGS__) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:878:19: [4] (buffer) sscanf: The scanf() family's %s operation, without a limit specification, permits buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a different input function. If the scanf format is influenceable by an attacker, it's exploitable. int args_read = sscanf(s, JLONG_FORMAT_SPECIFIER, &n); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:987:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(def, format, s); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1438:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(tmp, "-X%s", arg + 1); /* skip '-' */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1771:17: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(envcp, "-Denv.class.path=%s", s); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1784:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(apphome, "-Dapplication.home=%s", home); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2380:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, vl); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2393:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stdout, fmt, vl); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:108:5: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt,vl); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:76:33: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). #define JLI_StrCat(p1, p2) strcat((p1), (p2)) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:77:33: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). #define JLI_StrCpy(p1, p2) strcpy((p1), (p2)) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:103:41: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define JLI_Snprintf snprintf data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:109:12: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return access(filename, F_OK) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:643:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bucket->name, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:704:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(bucket->name, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:1570:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. int access; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:1586:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access != -1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:1596:20: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. } else if (access & JVM_ACC_PROTECTED) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2634:10: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if ((access != ACCESS_NONE) && (new_mask_count > 0)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:131:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access, /* Read and/or write permission */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:148:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access, /* Read and/or write permission */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:809:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1496:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(entryname, entry->name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:110:18: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # if !defined(vsnprintf) && !defined(NO_vsnprintf) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:112:18: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:134:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:134:20: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define snprintf _snprintf data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:240:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(state->path, path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:638:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(state->msg, state->path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:640:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(state->msg, msg); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:441:11: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. (void)vsprintf(next, format, va); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:445:11: [4] (format) vsprintf: Potential format string problem (CWE-134). Make format string constant. len = vsprintf(next, format, va); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:449:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void)vsnprintf(next, state->size, format, va); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:452:11: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = vsnprintf(next, state->size, format, va); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:535:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11, a12, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:541:11: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. len = sprintf(next, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, a10, a11, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:546:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8, a9, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:550:11: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. len = snprintf(next, state->size, format, a1, a2, a3, a4, a5, a6, a7, a8, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:266:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Trace(x) {if (z_verbose>=0) fprintf x ;} data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:267:39: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracev(x) {if (z_verbose>0) fprintf x ;} data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:268:40: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracevv(x) {if (z_verbose>1) fprintf x ;} data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:269:48: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracec(c,x) {if (z_verbose>0 && (c)) fprintf x ;} data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:270:49: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. # define Tracecv(c,x) {if (z_verbose>1 && (c)) fprintf x ;} data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:74:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(stderr, msg, arg1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:94:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. int sprintf(char *s, const char *format, ...); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:85:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, alist); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:173:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(path, ATTACH_FILE_PATTERN, pid); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:183:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(path, DOOR_FILE_PATTERN, pid); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:376:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf, PROTOCOL_VERSION); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:378:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(pos, cstr); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:400:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(buf+size, cstr); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:227:5: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(java, (char * const *) nargv); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:292:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(buf, BIN_PATH); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:263:5: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(errmsg, fmtsize, IOE_FORMAT, errnum, detail); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:282:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(tty, format, ap); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:113:12: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). return strcat(strcat(strcpy(path, dir), "/"), name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:113:26: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). return strcat(strcat(strcpy(path, dir), "/"), name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:713:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mapfilename, java_home_dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:881:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, (const char *)"GMT%c%02d:%02d", data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:918:5: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, (const char *)"GMT%c%02d:%02d", data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:170:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(path, mode) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:181:48: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. jint access, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:190:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch (access) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:259:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(r + rn, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:265:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(resolved, path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:223:9: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(file, (char **) argv); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:240:9: [4] (shell) execvp: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execvp(file, (char **) argv); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:133:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp, lc); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:159:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp, lc); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:185:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(encoding_variant, p); /* Copy the leading '.' */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:188:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(encoding_variant, p); /* Copy the leading '@' */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:203:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(temp, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:214:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(encoding_variant, p); /* Copy the leading '.' */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:217:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(encoding_variant, p); /* Copy the leading '@' */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:241:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*std_language, language); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:249:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(*std_country, country); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:448:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(os_version, name.version); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:450:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(os_version, name.release); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c:55:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(jniEntryName, sym); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c:58:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(jniEntryName, cname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:185:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, vl); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:205:5: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, vl); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:235:14: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. return ((access(buffer, X_OK) == 0) ? 1 : 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:396:17: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(new_runpath, LD_LIBRARY_PATH "=" data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:467:13: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(newexec, argv); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:470:9: [4] (shell) execv: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. execv(newexec, argv); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:513:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(libjava, F_OK) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:524:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. if (access(libjava, F_OK) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:786:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(pid_prop_str, "%s%d", substr, getpid()); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1220:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(addr6, "%s:%s:%s:%s:%s:%s:%s:%s", data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1827:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(style1dev, DEV_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1828:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(style1dev, ifname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:434:9: [4] (format) sprintf: Potential format string problem (CWE-134). Make format string constant. sprintf(buf, format, hostname, error_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:963:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. RESTARTABLE(access(path, (int)amode), err); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:973:17: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. RESTARTABLE(access(path, F_OK), err); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:988:5: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(ret, fixes[!prefix][!positive][style][pattern]); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:534:9: [4] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). wcscat(domain, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c:85:11: [4] (format) swprintf: Potential format string problem (CWE-134). Make format string constant. ? swprintf(utf16_javaMessage, MESSAGE_LENGTH, L"%s error=%d, %s", functionName, errnum, utf16_OSErrorMsg) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c:86:11: [4] (format) swprintf: Potential format string problem (CWE-134). Make format string constant. : swprintf(utf16_javaMessage, MESSAGE_LENGTH, L"%s failed, error=%d", functionName, errnum); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c:486:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access, /* Read and/or write permission */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:368:17: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(winZoneName, subKeyName); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:447:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mapFileName, java_home_dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:448:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(mapFileName, MAPPINGS_FILE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:155:25: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(p2, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:157:25: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(tmp, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:397:69: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. jobject file, jint access) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:408:13: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. switch (access) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:428:49: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. jint access, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:673:5: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(search_path, pathbuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:631:17: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(pathbuf, path ); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:635:17: [4] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). wcscat(pathbuf, path + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:639:13: [4] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). wcscat(pathbuf, path ); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:72:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirp->path, dirname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:116:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dirp->dirent.d_name, dirp->find_data.cFileName); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:140:17: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(pathbuf, path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:167:26: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(pathbuf, ps); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:193:25: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(pathbuf, ps); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:258:9: [4] (race) access: This usually indicates a security flaw. If an attacker can change anything along the path between the call to access() and the file's actual use (e.g., by moving files), the attacker can exploit the race condition (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid()) and try to open the file directly. access, /* Read and/or write permission */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:177:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(ret, elems[0]); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:183:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(ret, elems[index]); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:48:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:55:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path, name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:41:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(dest, path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:63:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(jniEntryName, cname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:64:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(jniEntryName, p); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:67:13: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(jniEntryName, sym); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:69:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(jniEntryName, cname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:72:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(jniEntryName, sym); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:486:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. rc = vsnprintf(buffer, size, format, vl); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:530:13: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(wfullname_w_prefix, ELP_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:531:13: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy(wfullname_w_prefix+elplen, wfullname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:569:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, vl); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:633:9: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vfprintf(stderr, fmt, vl); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:299:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(curr->name, dev_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:361:25: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy (nif->name, newname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:362:25: [4] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. wcscpy ((PWCHAR)nif->displayName, ptr->FriendlyName); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:71:5: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(s1, s2); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:150:13: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(key, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1986:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(errmsg, "error getting socket option: %s", tmpbuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:193:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(exc, "%s%s", JNU_JAVANETPKG, excP); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:966:9: [4] (access) SetThreadToken: If this call fails, the program could fail to drop heightened privileges (CWE-250). Make sure the return value is checked, and do not continue if a failure is reported. if (SetThreadToken(hThread, hToken) == 0) data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-death-test-internal.h:169:5: [4] (format) fprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. fprintf(\ data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2512:20: [4] (buffer) StrNCpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). inline const char* StrNCpy(char* dest, const char* src, size_t n) { data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2583:26: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define GTEST_SNPRINTF_ _snprintf data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2585:26: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define GTEST_SNPRINTF_ snprintf data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:141:10: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. # define vsnprintf _vsnprintf data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:3042:5: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:3063:3: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:3070:3: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:53:11: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. float system; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:142:31: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.25, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:148:32: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.125, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:156:32: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.125, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:172:30: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.5, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:177:28: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:184:32: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.125, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:195:31: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.25, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:202:30: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.5, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:207:28: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:214:32: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.125, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:224:28: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(1, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:229:31: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.25, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:236:32: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.125, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:247:31: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.25, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:254:28: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(1, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:259:31: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.25, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:266:32: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.125, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:281:31: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0.25, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:287:28: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:293:28: [4] (shell) system: This causes a new program to execute and is difficult to use safely (CWE-78). try using a library call that implements the same functionality if available. EXPECT_FLOAT_EQ(0, event.system); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorators.cpp:176:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(input, "%s,%s", decorator_name_array[0], decorator_name_array[3]); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:147:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(data, "%s", start_marker); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:151:3: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(data + size - strlen(end_marker) - 1, "%s", end_marker); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:311:20: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. int result = os::vsnprintf(buf, len, fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:316:13: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. TEST_VM(os, vsnprintf) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:320:13: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. TEST_VM(os, snprintf) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:321:21: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. test_snprintf(os::snprintf, true); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:241:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strbuf, "Check #C0: unexpected export of %s from base to this", pkg); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:251:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strbuf, "Check #C1: error in add export of %s from base to this", pkg); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:260:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strbuf, "Check #C2: failed to export %s from base to this", pkg); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:269:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(strbuf, "Check #C3: unexpected export of %s from base to all modules", pkg); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:99:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(fieldName, name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:100:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(fieldName, modified ? "_modify" : "_access"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c:79:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(mainThreadName, threadName); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c:61:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(threadGroupName, groupInfo.name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/setfldw003.c:149:17: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(">>> setting access watch on fld%" PRIuPTR, i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/setfldw004.c:155:17: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(">>> setting access watch on fld%" PRIuPTR, i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/setfmodw003.c:171:17: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(">>> setting modification watch on fld%" PRIuPTR, i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/setfmodw004.c:169:17: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. printf(">>> setting modification watch on fld%" PRIuPTR, i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.c:73:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s%d", prefix, eventsCount); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.c:72:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(name, "%s%d", prefix, eventsCount); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c:55:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename,"%s/%s/%s.class", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c:58:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename,"%s/%s.class", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:424:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename,"%s/%s%02d/%s.class", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:483:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chbuffer, threadName); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:513:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chbuffer, className); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:424:5: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(filename,"%s/%s/%s.class", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:483:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chbuffer, threadName); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:513:5: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(chbuffer, className); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:310:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled "); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:311:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(kind, kind0); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:310:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled "); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:311:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(kind, kind0); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:312:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled "); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:313:9: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(kind, kind0); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:51:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:52:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:54:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:56:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:80:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:55:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:56:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:58:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:60:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:84:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:52:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:53:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:55:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:57:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:80:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:51:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:52:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:54:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:56:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf(" unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:74:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c:51:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c:52:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c:74:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:51:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:52:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:54:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:56:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:74:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:51:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:52:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:54:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:56:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:80:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:51:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:52:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:54:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:56:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:80:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:73:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:74:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf(" unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:76:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:78:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf(" unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:103:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:61:68: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:62:74: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); return res;} data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:64:73: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_VOID(str,res) if ( res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:66:79: [4] (format) printf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. #define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if ( res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; } data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:80:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:90:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(fmt, args); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c:1219:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(error_msg, "JVMTIagent: getVerdict: %s event occured after VMDeath", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c:1236:9: [4] (format) vprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. vprintf(format, ar); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:111:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(classNameBuffer, className); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:126:9: [4] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). strcpy(threadNameBuffer, info.name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:247:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file,"%s/%s.class", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:510:9: [4] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. sprintf(file,"%s/%s.class", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:597:4: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. snprintf(buf, bufsize, PATH_FORMAT, DIR_NAME, redefineCnt, dir); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h:392:9: [4] (format) snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h:392:18: [4] (format) _snprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. #define snprintf _snprintf data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:152:12: [4] (format) vsnprintf: If format strings can be influenced by an attacker, they can be exploited, and note that sprintf variations do not always \0-terminate (CWE-134). Use a constant for the format specification. (void) vsnprintf(msg_buf, sizeof(msg_buf), format, ap); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:239:13: [4] (format) vfprintf: If format strings can be influenced by an attacker, they can be exploited (CWE-134). Use a constant for the format specification. int x = vfprintf(stdout,format,ap); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:285:13: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(hex, buf); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:150:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path, name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:161:17: [4] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). strcat(path, name); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:226:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tmpdir = getenv("TEMP"); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:253:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:257:7: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:371:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:377:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:382:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:394:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:420:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:483:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:488:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:501:10: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. rc = CreateProcess(NULL, data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:501:10: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. rc = CreateProcess(NULL, data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:521:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:533:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:539:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("DEBUG_FIXPATH") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libo4.cpp:61:13: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. bool libo4::realpath(const char* file_name, char* resolved_name, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libo4.hpp:80:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. static bool realpath(const char* file_name, char* resolved_name, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:582:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *v = ::getenv("LIBPATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1347:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. filename, ::getenv("LIBPATH"), ::getenv("LD_LIBRARY_PATH"), error_report); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1347:49: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. filename, ::getenv("LIBPATH"), ::getenv("LD_LIBRARY_PATH"), error_report); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1446:35: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char* const ldr_cntrl = ::getenv("LDR_CNTRL"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1450:32: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char* const extshm = ::getenv("EXTSHM"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1457:46: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char* const aixthread_guardpages = ::getenv("AIXTHREAD_GUARDPAGES"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1591:25: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char* rp = os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1610:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char* java_home_var = ::getenv("JAVA_HOME"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1622:25: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rp = os::Posix::realpath(java_home_var, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1643:27: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rp = os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:2846:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4152:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = ::getenv("EXTSHM"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4176:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = ::getenv("XPG_SUS_ENV"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4190:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = ::getenv("QIBM_MULTI_THREADED"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4194:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = ::getenv("LDR_CNTRL"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4203:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. p = ::getenv("AIXTHREAD_GUARDPAGES"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:719:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. return realpath(buffer, _exePath); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:304:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *home_dir = ::getenv("HOME"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:409:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *v = ::getenv("LD_LIBRARY_PATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:490:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *l = ::getenv("JAVA_LIBRARY_PATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:494:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *v = ::getenv("DYLD_LIBRARY_PATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1738:21: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rp = os::Posix::realpath(dli_fname, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1761:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char* java_home_var = ::getenv("JAVA_HOME"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1770:25: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rp = os::Posix::realpath(java_home_var, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1804:27: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rp = os::Posix::realpath(dli_fname, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:2691:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:470:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *v = ::getenv("LD_LIBRARY_PATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2588:21: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rp = os::Posix::realpath(dli_fname, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2610:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char* java_home_var = ::getenv("JAVA_HOME"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2622:25: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rp = os::Posix::realpath(java_home_var, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2643:27: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. rp = os::Posix::realpath(dli_fname, buf, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:4533:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:779:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. return realpath(buffer, _exePath); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1422:18: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char* os::Posix::realpath(const char* filename, char* outbuf, size_t outbuflen) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1435:15: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char* p = ::realpath(filename, NULL); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1452:13: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. p = ::realpath(filename, outbuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.hpp:109:16: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. static char* realpath(const char* filename, char* outbuf, size_t outbuflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1961:20: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1985:31: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char* java_home_var = ::getenv("JAVA_HOME"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1994:24: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (os::Posix::realpath(java_home_var, buf, buflen) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2013:26: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2441:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return ids[os::random() % r]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:195:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *alt_home_dir = ::getenv("_ALT_JAVA_HOME_DIR"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:254:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *path_str = ::getenv("PATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1363:19: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. void * result = LoadLibrary(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1883:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char* java_home_var = ::getenv("JAVA_HOME"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:2871:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int ran_num = os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3818:3: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. InitializeCriticalSection((CRITICAL_SECTION*)pcrit_sect); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3859:7: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. EnterCriticalSection(&crit_sect); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5347:15: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. BOOL rslt = CreateProcess(NULL, // executable name - use command line data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5347:15: [3] (shell) CreateProcess: This causes a new process to execute and is difficult to use safely (CWE-78). Specify the application path in the first argument, NOT as part of the second, or embedded spaces could allow an attacker to force a different program to run. BOOL rslt = CreateProcess(NULL, // executable name - use command line data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:275:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char* user = getenv("USERNAME"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:969:10: [3] (misc) AddAccessAllowedAce: This doesn't set the inheritance bits in the access control entry (ACE) header (CWE-732). Make sure that you set inheritance by hand if you wish it to inherit. if (!AddAccessAllowedAce(newACL, ACL_REVISION, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:518:9: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. ::EnterCriticalSection(&g_cs); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:531:5: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. ::InitializeCriticalSection(&g_cs); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp:95:20: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. g_dll_handle = ::LoadLibrary("DBGHELP.DLL"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp:131:9: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. ::EnterCriticalSection(&g_cs); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp:144:5: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. ::InitializeCriticalSection(&g_cs); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/altHashing.cpp:56:48: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return hc != markOopDesc::no_hash ? hc : os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/altHashing.cpp:66:28: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. (uint32_t) os::random(), // current thread isn't a java thread data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp:803:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. i = os::random() % lgrp_spaces()->length(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp:847:13: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. i = os::random() % lgrp_spaces()->length(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp:66:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (os::random() & 1) == 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp:73:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (os::random() & 1) == 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.cpp:2647:62: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (ShenandoahAllocFailureALot && !cancelled_gc() && ((os::random() % 1000) > 950)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp:281:12: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. (os::random() & 1) == 0) { // Simulate OOM every ~2nd slow-path call data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspace/metaDebug.cpp:40:63: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. 1+(long)((double)MetadataAllocationFailALotInterval*os::random()/(max_jint+1.0)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.cpp:42:31: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _identity_hash = (short)os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:4777:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. return (os::random() & RANDOMIZED_DOMAIN_MASK) < (RANDOMIZED_DOMAIN / count); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:279:18: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int seed = os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:286:23: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bool shrink = os::random() % 2L == 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:289:32: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t delta = (size_t)os::random() % magnitude; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3346:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *buffer = ::getenv(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp:133:72: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _fullgc_alot_counter = 1+(long)((double)FullGCALotInterval*os::random()/(max_jint+1.0)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp:151:78: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _scavenge_alot_counter = 1+(long)((double)ScavengeALotInterval*os::random()/(max_jint+1.0)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp:221:59: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else if (DeoptimizeRandom && (value & 0x1F) == (os::random() & 0x1F)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/interfaceSupport.cpp:267:5: [3] (random) srand: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. srand(ScavengeALotInterval * FullGCALotInterval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.cpp:280:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (x == 0) x = 1|os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:836:9: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int os::random() { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:932:24: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *envvar = ::getenv(env_list[i]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:818:14: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. static int random(); // return 32bit pseudorandom number data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.cpp:675:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. value = os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.cpp:1803:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. GVars.stwRandom = os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:274:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. _hashStateX = os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmOperations.cpp:162:20: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int tnum = os::random() & 0x3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmOperations.cpp:163:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int fnum = os::random() & 0x3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.cpp:71:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. nmt_env_value = ::getenv(nmt_env_variable); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:104:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char* s = ::getenv("HOTSPOT_FATAL_ERROR_DURING_DYNAMIC_INITIALIZATION"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:41:14: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. lc = getenv("LANG"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:228:16: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *ev = getenv("AWT_FORCE_HEADFUL"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:501:28: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char *realPathToSelf = realpath(selfInfo.dli_fname, path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:622:29: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. exec_path = realpath(dlinfo.dli_fname, resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:888:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("HACK_IGNORE_START_ON_FIRST_THREAD") != NULL) return; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/main.c:146:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv(JLDEBUG_ENV_ENTRY) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/main.c:177:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv(JLDEBUG_ENV_ENTRY)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/launcher/main.c:178:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *tmp = getenv("_JAVA_OPTIONS"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:472:17: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *env = getenv(var_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:314:23: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char* cpath = getenv("CLASSPATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:667:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *jvmtype = getenv("JDK_ALTERNATE_VM"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:865:30: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. envBuf = getenv(envName); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1071:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if ((env_in = getenv(ENV_ENTRY)) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1765:25: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *s = getenv("CLASSPATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2226:28: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *jar_name = getenv(SPLASH_JAR_ENV_ENTRY); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2227:29: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *file_name = getenv(SPLASH_FILE_ENV_ENTRY); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:116:8: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv(JLDEBUG_ENV_ENTRY) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:314:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv(JLDEBUG_ENV_ENTRY) != 0) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:466:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. debug = getenv("LIBJVMDB_DEBUG") != NULL; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:96:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. libjvm_dtrace_debug = getenv("LIBJVM_DTRACE_DEBUG") != NULL; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:199:13: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (realpath(jarfile, jarPath) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:278:9: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (realpath(path, buf) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:163:21: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char *s = getenv("PATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:801:10: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. tz = getenv("TZ"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:203:9: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (realpath(original, resolved)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:228:17: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. r = realpath(path, resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:351:42: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (strcmp(p,"US-ASCII") == 0 && getenv("LANG") == NULL && data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:352:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. getenv("LC_ALL") == NULL && getenv("LC_CTYPE") == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:352:41: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. getenv("LC_ALL") == NULL && getenv("LC_CTYPE") == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:412:9: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. v = getenv("JAVA2D_FONTPATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:461:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv("GNOME_DESKTOP_SESSION_ID") != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:95:22: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. char *path = realpath(info.dli_fname, buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:127:10: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (!realpath(name, real)) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:156:12: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. path = getenv("PATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:244:11: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. llp = getenv("LD_LIBRARY_PATH"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:246:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. dmllp = getenv("LD_LIBRARY_PATH_64"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:371:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. runpath = getenv(LD_LIBRARY_PATH); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:658:29: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. exec_path = realpath(dlinfo.dli_fname, resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/ResolverConfigurationImpl.c:58:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *cp = getenv("LOCALDOMAIN"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:944:9: [3] (buffer) realpath: This function does not protect against buffer overflows, and some implementations can overflow internally (CWE-120/CWE-785!). Ensure that the destination buffer is at least of size MAXPATHLEN, andto protect against implementation problems, the input argument should also be checked to ensure it is no larger than MAXPATHLEN. if (realpath(path, resolved) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:49:18: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. handle = LoadLibrary(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:56:22: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. handle = LoadLibrary(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp:121:5: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. EnterCriticalSection(&critical_section); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp:129:5: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. InitializeCriticalSection(&critical_section); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:215:13: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. if (getenv(JLDEBUG_ENV_ENTRY)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:216:25: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. char *tmp = getenv("_JAVA_OPTIONS"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:248:21: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. if (LoadLibrary(crtpath) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:265:21: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. if (LoadLibrary(crtpath) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:372:19: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. if ((handle = LoadLibrary(jvmpath)) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:690:22: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. hSplashLib = LoadLibrary(libraryPath); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:749:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. envValue = getenv("J2D_D3D"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:754:20: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. envValue = getenv("J2D_D3D_PRELOAD"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:884:23: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. hVerify = LoadLibrary(libraryPath); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:893:21: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. hJava = LoadLibrary(libraryPath); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:902:27: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. hPreloadAwt = LoadLibrary(libraryPath); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/gtest.h:966:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void ShuffleTests(internal::Random* random); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2551:27: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. const char* const env = getenv(name); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2554:10: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. return getenv(name); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h:308:37: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void ShuffleRange(internal::Random* random, int begin, int end, data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h:329:39: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. inline void Shuffle(internal::Random* random, std::vector<E>* v) { data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h:330:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ShuffleRange(random, 0, static_cast<int>(v->size()), v); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-internal-inl.h:796:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. internal::Random* random() { return &random_; } data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:258:5: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. ::InitializeCriticalSection(critical_section_); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:276:5: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. ::EnterCriticalSection(critical_section_); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:349:11: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. ::InitializeCriticalSection(critical_section_); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:2833:47: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. void TestCase::ShuffleTests(internal::Random* random) { data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:2834:11: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. Shuffle(random, &test_indices_); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5158:7: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. random()->Reseed(random_seed_); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5508:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ShuffleRange(random(), 0, last_death_test_case_ + 1, &test_case_indices_); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5511:16: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. ShuffleRange(random(), last_death_test_case_ + 1, data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5516:34: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. test_cases_[i]->ShuffleTests(random()); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logOutputList.cpp:79:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t output_idx = os::random() % TestOutputCount; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logOutputList.cpp:80:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t levelnum = os::random() % LogLevel::Count; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:106:50: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. const Metaspace::MetaspaceType msType = (os::random() % 100 < 10) ? data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:123:33: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. const int start_index = os::random() % metaspaces; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:174:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int r = os::random() % 1000; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:176:27: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size = (os::random() % _chunk_geometry.medium_chunk_word_size) + _chunk_geometry.medium_chunk_word_size; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:178:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size = os::random() % 64; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:218:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. allocating = os::random() % 5 < 4; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:123:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. num = os::random(); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:150:66: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bool allow_sep_change = (mods_filter & Allow_Sep_Mods) && (os::random() & 1) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:151:66: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bool allow_dot_change = (mods_filter & Allow_Dot_Path) && (os::random() & 1) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:152:73: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. bool allow_dotdot_change = (mods_filter & Allow_Dot_Dot_Path) && (os::random() & 1) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:161:36: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (allow_sep_change && (os::random() & 3) == 3) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:162:21: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. int i = os::random() % (sizeof(sep_replacements) / sizeof(sep_replacements[0])); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:169:68: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. if (allow_dotdot_change && (src > path_start + 1) && ((os::random() & 7) == 7)) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:180:72: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. } else if (allow_dot_change && (src > path_start + 1) && ((os::random() & 7) == 7)) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:187:26: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. while (is_dir && ((os::random() & 15) == 1)) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:44:15: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. len = os::random() % 10; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:46:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. len = MAX2(1, (int)(os::random() % len_lorem)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_quicksort.cpp:175:17: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. TEST(QuickSort, random) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_quicksort.cpp:177:25: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. size_t length = os::random() % 100; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_quicksort.cpp:182:29: [3] (random) random: This function is not sufficiently random for security-related functions such as key and nonce creation (CWE-327). Use a more secure technique for acquiring random values. test_array[j] = os::random() % (length * 2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c:38:38: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. "-Djava.class.path=%s", getenv("CLASSPATH")); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:233:19: [3] (buffer) getenv: Environment variables are untrustable input if they can be set by an attacker. They can have any content and length, and the same variable can be set more than once (CWE-807, CWE-20). Check environment variables carefully before using them. javaclasspath = getenv("CLASSPATH"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.c:67:17: [3] (misc) InitializeCriticalSection: Exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. InitializeCriticalSection((PCRITICAL_SECTION)mutex); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.c:74:9: [3] (misc) EnterCriticalSection: On some versions of Windows, exceptions can be thrown in low-memory situations. Use InitializeCriticalSectionAndSpinCount instead. EnterCriticalSection((PCRITICAL_SECTION)mutex); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:151:27: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. dbghelp = LoadLibrary(path); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:162:27: [3] (misc) LoadLibrary: Ensure that the full path to the library is specified, or current directory may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to find library path, if you aren't already. dbghelp = LoadLibrary(path); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:116:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*b+*u, add, addlen); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:201:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *files_to_delete[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:207:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[2048]; data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:216:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block[2048]; data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:220:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). atin = fopen(in+1, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:242:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). atout = fopen(name, "w"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.cpp:687:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1482:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1545:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1658:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:2044:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char regs[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:2074:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char regs[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:5096:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:5297:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comment[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:164:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:169:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (FILE *f = fopen("/proc/cpuinfo", "r")) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:170:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128], *p; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:245:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "0x%02x:0x%x:0x%03x:%d", _cpu, _variant, _model, _revision); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:246:16: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if (_model2) sprintf(buf+strlen(buf), "(0x%03x)", _model2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:247:27: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (auxv & HWCAP_ASIMD) strcat(buf, ", simd"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:248:27: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (auxv & HWCAP_CRC32) strcat(buf, ", crc"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:249:27: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (auxv & HWCAP_AES) strcat(buf, ", aes"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:250:27: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (auxv & HWCAP_SHA1) strcat(buf, ", sha1"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:251:27: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (auxv & HWCAP_SHA2) strcat(buf, ", sha256"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:252:29: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if (auxv & HWCAP_ATOMICS) strcat(buf, ", lse"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp:40:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_name[CPU_TYPE_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp:41:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/macroAssembler_arm.cpp:1139:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp:45:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const static unsigned char Si[256] = data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp:81:25: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const unsigned char S[256]={ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm_32.cpp:249:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_arm_64.cpp:152:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.hpp:40:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_name[CPU_TYPE_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.hpp:41:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/copy_ppc.hpp:50:18: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. default: (void)memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp:407:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_round_consts, sha256_round_consts, sizeof(sha256_round_table)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp:962:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_round_consts, sha512_round_consts, sizeof(sha512_round_table)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp:47:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_name[CPU_TYPE_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp:48:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:156:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[(num_features+1) * 16]; // Max 16 chars per feature. data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:409:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[500]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:410:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen(info_file, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:788:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char test_area[BUFFER_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/assembler_s390.hpp:1549:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pc, ((unsigned char *)&instr)+sizeof(unsigned long)-len, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/copy_s390.hpp:861:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void)memcpy(to, from, count); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.cpp:355:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[ 150 ]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/frame_s390.cpp:460:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char demangled_name[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.hpp:47:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_name[CPU_TYPE_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.hpp:48:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:304:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:315:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:636:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[buf_len]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:638:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, march, hdr_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:664:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &march[hdr_len], strlen(march)-hdr_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/copy_sparc.hpp:45:18: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. default: (void)memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1082:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[1024], b2[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1083:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(b1, "%f", val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1084:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(b2, "%f", f[last+1]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1102:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char b1[1024], b2[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1103:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(b1, "%f", val); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1104:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(b2, "%f", d[last+1]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1172:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.cpp:53:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buffer[10 * BytesPerInstWord]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.cpp:817:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/nativeInst_sparc.cpp:835:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.hpp:54:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_name[CPU_TYPE_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.hpp:55:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_sparc.cpp:219:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/assembler_x86.cpp:52:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char tuple_table[Assembler::EVEX_ETUP + 1][Assembler::AVX_512bit + 1] = { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/bytes_x86.hpp:50:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&x, p, sizeof(T)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/bytes_x86.hpp:63:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, &x, sizeof(T)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/z/zBarrierSetAssembler_x86.cpp:356:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5052:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f[9]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5089:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char c[5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5096:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f[9]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5206:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char f[8]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp:210:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char patch[4]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp:545:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char code_buffer[5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp:560:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char patch[4]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/nativeInst_x86.cpp:639:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char patch[4]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:6036:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst + 32 * ii, src + 16 * ii, 16); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:6037:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst + 32 * ii + 16, src + 16 * ii, 16); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:542:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char vendor_id[VENDOR_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:608:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cpu_type_desc[CPU_TYPE_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:621:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cpu_detailed_desc_buffer[CPU_DETAILED_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:709:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:1697:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signature[13]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/copy_zero.hpp:47:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.hpp:40:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_name[CPU_TYPE_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.hpp:41:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:66:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _path[UNIX_PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:198:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[UNIX_PATH_MAX]; // socket file data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:199:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char initial_path[UNIX_PATH_MAX]; // socket file during setup data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:265:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ver_str[8]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:266:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:278:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[max_len]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:309:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (atoi(buf) != ATTACH_PROTOCOL_VER)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:310:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:311:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:440:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:441:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%d\n", result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:485:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[UNIX_PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:534:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:537:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fn, ".attach_pid%d", os::current_process_id()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:54:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IDENTIFIER_LENGTH]; /* name of the identifier */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:96:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[IDENTIFIER_LENGTH]; /* processor description (type/official name) */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:175:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[IDENTIFIER_LENGTH]; /* processor description (type/official name) */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:259:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[IDENTIFIER_LENGTH]; /* processor description (type/official name) */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:347:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[IDENTIFIER_LENGTH]; /* processor description (type/official name) */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:468:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IDENTIFIER_LENGTH]; /* name of the logical partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:503:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IDENTIFIER_LENGTH]; /* name of the logical partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:562:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IDENTIFIER_LENGTH]; /* name of the logical partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:628:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IDENTIFIER_LENGTH]; /* name of the logical partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:691:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hardwareid[CEC_ID_LEN]; /* CEC Identifier */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:707:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IDENTIFIER_LENGTH]; /* name of the logical partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:770:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hardwareid[CEC_ID_LEN]; /* CEC Identifier */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:813:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAXCORRALNAMELEN+1]; /* name of the Workload Partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:824:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAXCORRALNAMELEN+1]; /* name of the Workload Partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:847:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char wparname[MAXCORRALNAMELEN+1]; /* WPAR NAME */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:849:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IDENTIFIER_LENGTH]; /* name of the structure element identifier */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:922:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IDENTIFIER_LENGTH]; /* name of the logical partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:940:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char description[IDENTIFIER_LENGTH]; // processor description (type/official name) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/libperfstat_aix.hpp:953:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[MAXCORRALNAMELEN+1]; /* name of the Workload Partition */ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:908:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:912:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1183:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1572:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char saved_jvm_path[MAXPATHLEN] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3352:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3717:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3746:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int os::open(const char *path, int oflag, int mode) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3954:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dummy[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4057:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4064:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4100:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int major = atoi(uts.version); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4102:23: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). const int minor = atoi(uts.release); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4105:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ver_str[20] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:241:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:243:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(procfile, "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:573:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _exeName[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:574:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _exePath[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:629:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:632:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(entry->d_name) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:650:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:654:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(buffer, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:665:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_exeName, start, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:677:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:682:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(buffer, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:715:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_perf_aix.cpp:734:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). process_info->set_pid(atoi(_entry->d_name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:101:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IREAD|S_IWRITE), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:333:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(path, oflag, mode), fd); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:335:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(path, oflag), fd); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:390:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:461:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(".", O_RDONLY), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:886:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IREAD|S_IWRITE), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:949:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(filename, oflags), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:357:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char funcname[256] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:828:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dummy[1]; // Just needed to satisfy pthread_getthrds_np. data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:65:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _path[UNIX_PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:178:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[UNIX_PATH_MAX]; // socket file data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:179:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char initial_path[UNIX_PATH_MAX]; // socket file during setup data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:244:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ver_str[8]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:245:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:257:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[max_len]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:286:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (atoi(buf) != ATTACH_PROTOCOL_VER)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:287:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:288:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:411:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:412:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%d\n", result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:455:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[UNIX_PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:504:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:459:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "/lib"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:763:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1087:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1194:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_path_storage[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1239:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localbuf[MACH_MAXSYMLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1367:26: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int file_descriptor= ::open(filename, O_RDONLY | O_NONBLOCK); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1601:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char os[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1614:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char release[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1656:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char model[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1663:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char machine[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1715:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char saved_jvm_path[MAXPATHLEN] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1731:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dli_fname[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1971:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1978:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(buf, O_CREAT | O_RDWR, S_IRWXU); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3204:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3446:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXTHREADNAMESIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3541:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3591:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int os::open(const char *path, int oflag, int mode) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3598:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = ::open(path, oflag, mode); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3659:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return ::open(path, oflags, S_IREAD | S_IWRITE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3840:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3847:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3873:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * argv[4] = {"sh", "-c", cmd, NULL}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3939:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char coreinfo[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:322:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PROC_PIDPATHINFO_MAXSIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:456:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:100:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IREAD|S_IWRITE), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:307:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:373:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(".", O_RDONLY), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:795:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IREAD|S_IWRITE), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:873:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(filename, oflags), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:66:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _path[UNIX_PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:179:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[UNIX_PATH_MAX]; // socket file data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:180:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char initial_path[UNIX_PATH_MAX]; // socket file during setup data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:244:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ver_str[8]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:245:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:257:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[max_len]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:286:16: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). (atoi(buf) != ATTACH_PROTOCOL_VER)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:287:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:288:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:411:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:412:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%d\n", result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:455:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[UNIX_PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:504:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:507:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fn, ".attach_pid%d", os::current_process_id()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/decoder_linux.cpp:61:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* file = fopen(filepath, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:63:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:161:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file[MAXPATHLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:162:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:163:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char discard[MAXPATHLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:184:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:241:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char variable[bufsize]; \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:279:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:280:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmproot[MAXPATHLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:281:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpmount[MAXPATHLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:308:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). mntinfo = fopen("/proc/self/mountinfo", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:316:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpcgroups[MAXPATHLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:379:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). cgroup = fopen("/proc/self/cgroup", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:259:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fh = fopen("/proc/stat", "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:365:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:367:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(fname, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:846:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1024:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("/proc/self/maps", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stat[2048]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1136:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen("/proc/self/stat", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1497:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1797:26: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int file_descriptor= ::open(filename, O_RDONLY | O_NONBLOCK); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2004:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(filename, O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2013:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[33]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2035:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2049:23: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((procmapsFile = fopen("/proc/self/maps", "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2051:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[PATH_MAX + 100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2056:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[sizeof(line)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2184:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2216:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen(file, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2387:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("/proc/cpuinfo", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2426:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf_level[60]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2427:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf_type[60]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2428:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf_size[60]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2429:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hbuf_coherency_line_size[80]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2490:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen("/proc/cpuinfo", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2493:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2565:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char saved_jvm_path[MAXPATHLEN] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2581:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dli_fname[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2833:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2840:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(buf, O_CREAT | O_RDWR, S_IRWXU); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3302:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char vec[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3345:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char vec[stripe + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3444:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char vec[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3626:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("/proc/self/maps", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3629:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chars[257]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3670:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen("/proc/self/coredump_filter", "r+")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3722:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen("/proc/meminfo", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3726:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3977:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5074:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5486:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [16]; // according to glibc manpage, 16 chars incl. '/0' data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5585:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5614:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int os::open(const char *path, int oflag, int mode) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5844:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stat[2048]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5846:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proc_name[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5855:8: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(proc_name, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5911:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5918:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5938:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * argv[4] = {"sh", "-c", cmd, NULL}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5943:11: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. pid = vfork(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6001:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char core_pattern[core_pattern_len] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6003:29: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int core_pattern_file = ::open("/proc/sys/kernel/core_pattern", O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6035:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6060:32: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int core_uses_pid_file = ::open("/proc/sys/kernel/core_uses_pid", O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:236:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2048]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:238:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(procfile, "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:275:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen("/proc/stat", "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:408:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[80]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:633:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _exeName[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:634:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _exePath[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:689:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:692:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(entry->d_name) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:710:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:714:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(buffer, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:725:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_exeName, start, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:737:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:742:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(buffer, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:775:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:794:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). process_info->set_pid(atoi(_entry->d_name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:980:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:984:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = os::open(buf, O_RDONLY, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:100:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(os::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IRUSR|S_IWUSR), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:161:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[TMP_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:320:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:385:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(".", O_RDONLY), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:537:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[MAXPATHLEN + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:655:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fname[24]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:659:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fp = fopen(fname, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:874:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(os::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IRUSR|S_IWUSR), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:952:19: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(os::open(filename, oflags, 0), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:86:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char core_path[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:190:12: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). int fd = mkstemp(fullname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:585:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* os::open(int fd, const char* mode) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:992:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[30]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1076:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[NUM_IMPORTANT_SIGS + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1140:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[0x100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1304:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[20]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:72:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _door_path[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:253:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(ver) != SolarisAttachListener::ATTACH_PROTOCOL_VER) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:380:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char door_path[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:381:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char initial_path[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:553:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:554:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(msg, "%d\n", res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:598:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:647:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:650:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(fn, ".attach_pid%d", os::current_process_id()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:78:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = os::open(path, O_RDONLY, 0)) < 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:515:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:520:7: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(entry->d_name) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:526:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(buffer, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:558:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psinfo_path[PATH_MAX] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:562:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(psinfo_path, "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_perf_solaris.cpp:587:25: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). process_info->set_pid(atoi(_entry->d_name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:468:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1003:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1338:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1573:26: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int file_descriptor= ::open(filename, O_RDONLY | O_NONBLOCK); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1704:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(filename, O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1709:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1753:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen("/etc/release", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1755:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1781:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open("/proc/self/map",O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1941:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char saved_jvm_path[MAXPATHLEN] = { 0 }; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2629:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3075:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ClassInfo.pc_clname, "TS"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3084:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ClassInfo.pc_clname, "IA"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3093:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ClassInfo.pc_clname, "RT"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3102:3: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ClassInfo.pc_clname, "FX"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3563:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3894:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4187:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open("/dev/zero", O_RDWR); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4364:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int os::open(const char *path, int oflag, int mode) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4577:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4584:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4774:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char proc_name[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4780:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(proc_name, "/proc/%d/lwp/%d/lwpusage", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4783:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = ::open(proc_name, O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:5307:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * argv[4]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:103:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IREAD|S_IWRITE), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:310:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:376:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(".", O_RDONLY), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:617:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char psinfo_name[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:622:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(psinfo_name, O_RDONLY), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:843:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IREAD|S_IWRITE), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:899:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(::open(filename, oflags), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:135:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pipe[pipe_name_max + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:327:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/include/jvm_md.h:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char d_name[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:359:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char counter[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:878:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char instanceIndexBuffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:995:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _exePath[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:1419:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:194:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char home_dir[MAX_PATH + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:253:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:283:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(library_path, ";."); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:291:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:292:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2 * MAX_PATH + 2 * sizeof(EXT_DIR) + sizeof(PACKAGE_DIR) + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:655:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1113:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_dirname[4] = { 0, 0, 0, 0 }; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1158:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(dirp->path, "*.*"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1160:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(dirp->path, "\\*.*"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1212:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char path_buf[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1390:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(name, O_RDONLY | O_BINARY, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1486:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char filename[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1597:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1618:3: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR kernel32_path[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1823:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1825:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(tmp, "EXCEPTION_??"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1861:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char saved_jvm_path[MAX_PATH] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3223:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3403:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:3769:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4253:26: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). int unicode_path_len = MultiByteToWideChar(CP_ACP, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4263:16: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). int result = MultiByteToWideChar(CP_ACP, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4494:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int os::open(const char *path, int oflag, int mode) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4512:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* os::open(int fd, const char* mode) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4530:5: [2] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Risk is low because the source is a constant string. wcscat(wide_path, L"\\*"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4561:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return ::open(path, oflags, _S_IREAD | _S_IWRITE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5031:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5038:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5378:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:276:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[UNLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:543:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char root_path[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:544:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fs_type[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:185:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr(), other.ptr(), other._num * sizeof(HMODULE)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/windbghelp.cpp:113:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&g_version, p, sizeof(API_VERSION)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/copy_bsd_x86.inline.hpp:86:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void)memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp:914:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kern_osrelease[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp:919:13: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). if (atoi(kern_osrelease) >= OS_X_10_9_0_KERNEL_MAJOR_VERSION) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp:248:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/copy_linux_aarch64.inline.hpp:113:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to, from, count * sizeof(HeapWord)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:38:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[CPUINFO_LINE_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:39:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen("/proc/cpuinfo", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:72:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char* match_field(char line[CPUINFO_LINE_SIZE], const char* field); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:83:34: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char* CPUinfo::match_field(char line[CPUINFO_LINE_SIZE], const char* field) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/copy_linux_x86.inline.hpp:86:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void)memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:159:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:194:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). const int fd_anon = os::open(path.get(), O_TMPFILE|O_EXCL|O_RDWR|O_CLOEXEC, S_IRUSR|S_IWUSR); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:216:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingFile_linux_x86.cpp:220:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). const int fd = os::open(filename, O_CREAT|O_EXCL|O_RDWR|O_CLOEXEC, S_IRUSR|S_IWUSR); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zBackingPath_linux_x86.cpp:72:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fd = fopen(PROC_SELF_MOUNTINFO, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/gc/z/zPhysicalMemoryBacking_linux_x86.cpp:68:22: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* const file = fopen(filename, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp:260:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp:262:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "caught unhandled signal %d", sig); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/os_solaris_sparc.cpp:102:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sp,reg_win,sizeof(struct rwindow)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/copy_solaris_x86.inline.hpp:34:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void)memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/copy_solaris_x86.inline.hpp:47:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void)memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp:45:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void)memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp:49:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void)memcpy(to, from, count * HeapWordSize); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp:157:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ExceptionHandlerInstr[16]; // jmp HandleExceptionFromCodeCache data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp:397:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4589:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4592:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "[...]"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4789:14: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). result = atoi(start); // Convert the string to an integer data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5299:12: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). intval = atoi(token); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:977:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ident = (char *)NodeClassNames[i]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:982:20: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *ident = (char *)NodeClassNames[j]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/arena.cpp:138:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( new_ptr, c_old, old_size ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:627:77: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. if( debug_output1 ) { fprintf(fp, "// top level chain rules for: %s \n", (char *)NodeClassNames[i]); } // %%%%% Explanation data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:629:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. chain_rule(fp, " ", (char *)NodeClassNames[i], zeroCost, "Invalid", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.cpp:36:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char shft[MAXID + 1] = {1,2,3,4,5,6,7,1,2,3,4,5,6,7,1,2,3,4,5,6,7}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.cpp:142:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( _bin, d._bin, sizeof(bucket)*_size ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dict2.cpp:146:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( _bin[i]._keyvals, d._bin[i]._keyvals,_bin[i]._cnt*2*sizeof(void*)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/forms.hpp:549:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char string_buffer[STRING_BUFFER_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/forms.hpp:550:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char external_buffer[STRING_BUFFER_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1511:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[buflen], *s=buf; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1534:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s," && "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1542:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(s," == "); s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3431:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if( !cnt ) strcpy( buf, "_kids[0]->" ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3436:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if( !cnt ) strcpy( buf, "_kids[1]->" ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3443:16: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. if( !cnt ) strcpy(buf,"_leaf"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:359:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). (ADF._fp = fopen(ADF._name, action)) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:342:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:347:15: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. templen = sprintf(temp, "%d", res_cycles[i]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:529:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(args, "0x%0*x, 0x%0*x, %*d", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1075:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(inst_prefix, "inst%d_", inst_position); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1077:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(receiver, "inst%d->", inst_position); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1173:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(left_reg_index,",inst%d_idx%d", (int)left_index, left_op_index); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1182:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char right_reg_index[18] = ",instXXXX_idxXXXX"; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1186:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(right_reg_index,",inst%d_idx%d", (int)right_index, right_op_index); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2513:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char idxbuf[buflen]; char *ib = idxbuf; idxbuf[0] = '\0'; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2514:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nbuf [buflen]; char *nb = nbuf; nbuf[0] = '\0'; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:2515:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char opbuf [buflen]; char *ob = opbuf; opbuf[0] = '\0'; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:404:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(full_name, "AOT ", 4); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:405:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(full_name+4, stub_name, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:638:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(meta_name, klass_name, klass_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:640:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&meta_name[klass_len + 1], method_name, method_name_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:641:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&meta_name[klass_len + 1 + method_name_len], signature_name, signature_name_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:959:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * const descriptors[2] = {descriptor1, descriptor2}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:969:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:1059:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp:146:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cp, AOTLibrary, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp:164:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char library[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp:255:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_CFGPrinter.cpp:65:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_name[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compilation.cpp:698:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fileStream stream(fopen("c1_compile_only", "wt")); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Compilation.cpp:714:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fileStream stream(fopen(".hotspot_compiler", "at")); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:650:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[2 * jintAsStringSize + len]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:651:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(message, "Index %d out of bounds for length %d", index, a->length()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:658:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:659:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(message, "%d", index); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1253:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1256:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = os::open(buffer, O_RDWR | O_CREAT | O_TRUNC, 0666); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1258:36: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* replay_data_file = os::open(fd, "w"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1271:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1274:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = os::open(buffer, O_RDWR | O_CREAT | O_TRUNC, 0666); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciEnv.cpp:1276:36: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* inline_data_file = os::open(fd, "w"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethod.cpp:201:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_code, me->code_base(), code_size()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciMethodData.cpp:105:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dp_dst, dp_src, entry_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:123:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _stream = fopen(filename, "rt"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:149:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(_buffer, "1 2 foo 4 bar 0x9 \"this is it\""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:830:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int value = atoi(string_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:833:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int value = atoi(string_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:836:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int value = atoi(string_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:839:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int value = atoi(string_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:842:21: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). int value = atoi(string_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciTypeFlow.cpp:834:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:2875:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(m->compressed_linenumber_table(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5275:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[fixed_buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5315:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[fixed_buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5350:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[fixed_buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5390:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[fixed_buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5420:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[fixed_buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5549:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.cpp:51:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_buffer_start, _buffer_start, length()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:50:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _file = fopen(file, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.hpp:77:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _line[_line_buf_size]; // The buffer that holds the current line. Some characters in data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:164:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char version_string[10] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:271:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int file_handle = os::open(path, 0, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:321:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:357:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). version = atoi(verstr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:986:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char canonical_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1155:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1156:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1193:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1194:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1738:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modules_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:2040:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[2048]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderHierarchyDCmd.cpp:83:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _branches[max_depth]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.cpp:314:13: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _fd = os::open(filename, O_RDONLY | O_BINARY, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.cpp:341:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char info[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp:48:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(deopt_segm_path, deopt_path, tmp_end - deopt_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2228:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "Redefined)"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2232:7: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(buf, "Native Method)"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2242:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf + (int)strlen(buf), "Unknown Source)"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2246:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf + (int)strlen(buf), "(nmethod " INTPTR_FORMAT ")", (intptr_t)nm); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/klassFactory.cpp:261:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->data, bytes, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/loaderConstraints.cpp:349:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_loaders, p->loaders(), sizeof(ClassLoaderData*) * p->num_loaders()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:72:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_cur_ptr, ptr, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:78:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, _cur_ptr, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:339:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack_buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:391:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack_buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:407:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack_buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.cpp:180:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stub_id[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp:769:23: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)&TopSizeArray[used_topSizeBlocks], (void*)&TopSizeArray[i], sizeof(TopSizeBlk)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp:811:27: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)&TopSizeArray[j], (void*)&TopSizeArray[i], sizeof(TopSizeBlk)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.cpp:88:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_new_buffer, _buffer, _position); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencies.cpp:816:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char xn[12]; sprintf(xn, "x%d", j); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/dependencies.cpp:816:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. char xn[12]; sprintf(xn, "x%d", j); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nmethod.cpp:1746:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(scopes_pcs_begin(), pcs, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/nmethod.cpp:1765:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(scopes_data_begin(), buffer, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:555:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[2000]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:868:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buffer[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:897:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name_buffer, "C1 CompilerThread%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:955:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name_buffer[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:1903:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file_name[4*K]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:1917:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(file_name, "wt"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2350:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char current_method[CompilerCounters::cmname_buffer_length]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.hpp:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _current_method[cmname_buffer_length]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.hpp:178:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _last_method_compiled[name_buffer_length]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:210:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int partial_fd = open(partial_file, O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:304:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.hpp:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _context_buffer[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:433:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(set->_modified, src->_modified, sizeof(src->_modified)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:381:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char command[33]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:451:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flag[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:510:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:527:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[2][256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:531:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[512] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:610:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char option[256]; // stores flag for Type (1) and type of Type (2) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:634:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errorbuf[1024] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:702:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* stream = fopen(cc_file(), "rt"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:705:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:725:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:745:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fileStream stream(fopen(cc_file(), "at")); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:756:21: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fileStream stream(fopen(cc_file(), "at")); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:793:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:93:27: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int file_handle = os::open(filename, 0, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:67:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:74:3: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(p, "/lib/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:160:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _option_buf[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:279:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[32] = { 0, }; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:542:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:249:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char class_name[256] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:250:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char method_name[256] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:251:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sig[1024] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/oopMap.cpp:116:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addr, write_stream()->buffer(), write_stream()->position()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/oopMap.cpp:179:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_data,om_data(),om_size() * sizeof(OopMap*)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3030:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad_front[64]; // padding to ... data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3032:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad_back[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepThread.hpp:61:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _pad_1[64 - sizeof(jint)]; // prevent cache-line sharing data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepThread.hpp:63:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _pad_2[64 - sizeof(jint)]; // prevent cache-line sharing data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.cpp:340:85: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). G1ArchiveAllocator* G1ArchiveAllocator::create_allocator(G1CollectedHeap* g1h, bool open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.cpp:343:61: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). G1ArchiveAllocator* result = new G1ArchiveAllocator(g1h, open); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:223:49: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). G1ArchiveAllocator(G1CollectedHeap* g1h, bool open) : data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:233:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _open(open) { } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:239:74: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). static G1ArchiveAllocator* create_allocator(G1CollectedHeap* g1h, bool open); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:266:62: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). static inline void set_range_archive(MemRegion range, bool open); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.hpp:267:64: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). static inline void clear_range_archive(MemRegion range, bool open); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:110:73: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inline void G1ArchiveAllocator::set_range_archive(MemRegion range, bool open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:113:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open ? "open" : "closed", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:116:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:124:75: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). inline void G1ArchiveAllocator::clear_range_archive(MemRegion range, bool open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:127:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open ? "open" : "closed", data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:130:7: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:518:54: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). void G1CollectedHeap::begin_archive_alloc_range(bool open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:521:69: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _archive_allocator = G1ArchiveAllocator::create_allocator(this, open); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:567:50: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bool open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:641:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:664:55: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). G1ArchiveAllocator::set_range_archive(curr_range, open); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1CollectedHeap.hpp:690:67: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bool alloc_archive_regions(MemRegion* range, size_t count, bool open); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp:1002:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BufLen]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:155:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad0[DEFAULT_CACHE_LINE_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:157:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad1[DEFAULT_CACHE_LINE_SIZE - sizeof(TaskQueueEntryChunk*)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:160:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad2[DEFAULT_CACHE_LINE_SIZE - sizeof(TaskQueueEntryChunk*) - sizeof(size_t)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:163:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad4[DEFAULT_CACHE_LINE_SIZE - sizeof(size_t)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HotCardCache.hpp:75:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad_before[DEFAULT_CACHE_LINE_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1HotCardCache.hpp:81:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad_after[DEFAULT_CACHE_LINE_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1RemSetSummary.cpp:125:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_rs_threads_vtimes, other->_rs_threads_vtimes, sizeof(double) * _num_vtimes); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/satbMarkQueue.cpp:298:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SATB_PRINTER_BUFFER_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/sparsePRT.cpp:76:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cards, _cards, cards_num() * sizeof(card_elem_t)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/ageTable.cpp:52:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char age_name[10]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.hpp:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char head[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/plab.hpp:48:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tail[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.cpp:70:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dashes[max_width + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/taskqueue.hpp:88:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const _names[last_stat_id]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahSATBMarkQueue.cpp:290:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[SATB_PRINTER_BUFFER_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zArray.inline.hpp:64:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_array, _array, sizeof(T) * _capacity); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.cpp:39:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_pages, group0, ngroup0 * sizeof(ZPage*)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zRelocationSet.cpp:42:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_pages + ngroup0, group1, ngroup1 * sizeof(ZPage*)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/z/zStat.cpp:894:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _buffer[_buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.cpp:1644:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[jintAsStringSize]; \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.cpp:1647:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(message, "%d", index); \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeInterpreter.cpp:2554:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeTracer.cpp:196:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodeTracer.cpp:210:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreterRuntime.cpp:670:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/interpreterRuntime.cpp:1352:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(handler, buffer->insts_begin(), insts_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:738:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:843:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:904:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:993:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[200]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:1258:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[500]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/linkResolver.cpp:1454:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/oopMapCache.cpp:405:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)_bit_mask, (void *)from->_bit_mask, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/oopMapCache.cpp:420:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*) _bit_mask[0], (void*) from->_bit_mask[0], data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1118:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_buffer, orig_stream->buffer(), orig_stream_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1446:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->data, new_stream->buffer(), stream_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:110:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_buffer[ERROR_MSG_BUFFER_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJniMethod.cpp:86:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pid_buf[32] = { 0 }; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:75:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(old_byte_array->byte_at_addr(0), class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:99:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_buffer[ERROR_MSG_BUFFER_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:141:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_bytes, new_byte_array->byte_at_addr(0), (size_t)new_bytes_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:177:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_bytes, new_byte_array->byte_at_addr(0), (size_t)new_bytes_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:43:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[20]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.hpp:36:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _buffer[OBJECT_SAMPLE_DESCRIPTION_BUFFER_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:206:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pid_buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:207:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash_buf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp:51:29: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return path != NULL ? os::open(path, O_CREAT | O_RDWR, S_IREAD | S_IWRITE) : invalid_fd; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp:54:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bool JfrChunkWriter::open() { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.hpp:43:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bool open(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:50:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return os::open(path, O_CREAT | O_RDWR, S_IREAD | S_IWRITE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:297:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char date_time_buffer[32] = { 0 }; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:163:24: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return _chunkwriter->open(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.cpp:38:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*lhs_frames, rhs_frames, length * sizeof(JfrStackFrame)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrBuffer.cpp:167:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to->pos(), current_top, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrBuffer.cpp:179:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(to->pos(), current_top, actual_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.inline.hpp:449:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_buffer->pos(), old->pos(), used); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:504:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cur->pos(), (void*)cur_pos, used); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:541:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(shelved->pos(), (void*)cur_pos, (size_t)used); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:576:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer->pos(), (void*)cur_pos, used); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.cpp:529:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(const_cast<u1*>(_reserved_low), low, block_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBlob.cpp:34:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(const_cast<u1*>(_data), checkpoint, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoders.hpp:98:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoders.hpp:120:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, src, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.inline.hpp:33:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest, buf, len); // no encoding data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrStorageAdapter.hpp:207:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_storage, _start, previous_pos_offset + used); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.cpp:821:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_constants->start(), data_section()->base(T_BYTE), _constants_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.cpp:827:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_instructions->start(), code()->base(T_BYTE), _code_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCodeInstaller.hpp:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _static_buffer[stack_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompiler.cpp:121:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:197:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(reconstituted_code->byte_at_addr(bci + 1), s.bcp()+1, len-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:735:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(pcArrayOop->byte_at_addr(0), code_metadata.get_pc_desc(), sizeof(PcDesc) * code_metadata.get_nr_pc_desc()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:741:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(scopesArrayOop->byte_at_addr(0), code_metadata.get_scopes_desc(), code_metadata.get_scopes_size()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:748:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(relocArrayOop->byte_at_addr(0), reloc_buffer->begin(), reloc_buffer->size()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:358:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:409:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:469:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:549:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.cpp:38:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char shft[MAXID] = {1,2,3,4,5,6,7,1,2,3,4,5,6,7,1,2,3,4,5,6}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.cpp:166:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( (void*)_bin, (void*)d._bin, sizeof(bucket)*_size ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/dict.cpp:170:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( _bin[i]._keyvals, d._bin[i]._keyvals,_bin[i]._cnt*2*sizeof(void*)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:84:24: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if( lo != hi ) sprintf(s,"%d-%d,",lo,hi); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:85:14: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s,"%d,",lo); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:98:20: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. if( lo != hi ) sprintf(s,"%d-%d}",lo,hi); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:99:10: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. else sprintf(s,"%d}",lo); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/vectset.cpp:85:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data, s.data, size*sizeof(uint32_t) ); // Fill the array data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/vectset.cpp:158:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&data[cnt], u2, (s.size - cnt)*sizeof(uint32_t)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:374:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorations.cpp:41:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorations.hpp:35:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _decorations_buffer[DecorationsBufferSize]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:263:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _stream = os::fopen(_file_name, FileOpenMode); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:352:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _stream = os::fopen(_file_name, FileOpenMode); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.hpp:47:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _pid_str[PidBufferSize]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.hpp:48:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _vm_start_time_str[StartTimeBufferSize]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileStreamOutput.cpp:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stdoutmem[sizeof(LogStdoutOutput)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileStreamOutput.cpp:38:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stderrmem[sizeof(LogStderrOutput)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp:136:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result[*result_size], subset, sizeof(*subset) * LogTag::MaxTags); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp:233:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelection.cpp:347:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logSelectionList.cpp:46:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.cpp:69:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newbuf, _buf, _pos + 1); // ..including trailing zero data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.cpp:94:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_buf + _pos, s, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logStream.hpp:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _smallbuf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:114:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[vwrite_buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:146:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TagSetBufferSize]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTagSet.cpp:162:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[TagSetBufferSize]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/allocation.inline.hpp:143:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_addr, old_addr, MIN2(old_length, new_length) * sizeof(E)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/arena.cpp:385:16: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. if (n > 0) memcpy(copy, old_ptr, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/arena.cpp:413:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( new_ptr, c_old, old_size ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:157:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(&header_version[JVM_IDENT_MAX-9], "%08x", hash); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:464:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, manifest, manifest_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:548:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char header_version[JVM_IDENT_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:601:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = os::open(_full_path, O_RDONLY | O_BINARY, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:636:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = os::open(_full_path, O_RDWR | O_CREAT | O_TRUNC | O_BINARY, 0444); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.hpp:117:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _jvm_ident[JVM_IDENT_MAX]; // identifier for jvm data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/guardedMemory.cpp:36:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(innerp, ptr, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:576:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(q->data, p->data, p->length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:697:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dstvtable, srcvtable, sizeof(intptr_t) * n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:1118:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, obj, bytes); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:1661:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char class_list_path_str[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.hpp:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad_buf_[PADDING_SIZE(T, alignment)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.hpp:55:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad_buf_[PADDING_SIZE(T, alignment)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/padded.hpp:62:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad_buf[pad_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.cpp:78:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)_stackmap_data->adr_at(0), (void*)sd, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.cpp:376:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)a->adr_at(0), (void*)from->adr_at(0), length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constMethod.hpp:487:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(code_base(), code, code_size()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp:1921:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:648:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_state, bb->_state, _state_len*sizeof(CellTypeState)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:2153:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buffer[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:2156:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buffer2[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:235:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[200]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2580:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hash_buf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:653:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr_buf[20]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/metadata.cpp:45:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1399:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)newm(), (void*)m(), sizeof(Method)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1402:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newcm, m->constMethod(), sizeof(ConstMethod)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1416:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newm->code_base(), new_code, new_code_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1419:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newm->compressed_linenumber_table(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1425:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newm->method_parameters_start(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1431:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newm->checked_exceptions_start(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1437:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newm->exception_table_start(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1443:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newm->localvariable_table_start(), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:1452:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)stackmap_data->adr_at(0), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.cpp:102:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/methodData.cpp:132:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/objArrayKlass.cpp:114:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&new_str[idx], name_str, len * sizeof(char)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/oop.cpp:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp:1351:8: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). case open: data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp:1502:32: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (e->state() != CFGEdge::open) continue; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp:1545:32: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (e->state() != CFGEdge::open) continue; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.cpp:1599:39: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). } else if (e->state() == CFGEdge::open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.hpp:751:5: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open, // initial edge state; unprocessed data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/block.hpp:758:50: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _from_pct(from_pct), _to_pct(to_pct), _state(open) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/buildOopMap.cpp:187:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( _callees, flow->_callees, sizeof(short)*max_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/buildOopMap.cpp:188:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( _defs , flow->_defs , sizeof(Node*)*max_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp:360:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[50]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp:523:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[500]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp:1036:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.hpp:104:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const names[TypeFunc::Parms+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2136:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "<OptoReg::%d>", (int)reg); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2149:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf,"N%d",n->_idx); // Then use Node index data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2156:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf,"L%d",lidx); // No register binding yet data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2158:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buf,"Special"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2164:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf,"L%d",lidx); // No register binding yet data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2171:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf,"L%d",lidx); // No register binding yet data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:225:53: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if ((flags & Compile::_intrinsic_worked) != 0) strcat(buf, ",worked"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:226:53: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if ((flags & Compile::_intrinsic_failed) != 0) strcat(buf, ",failed"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:227:53: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if ((flags & Compile::_intrinsic_disabled) != 0) strcat(buf, ",disabled"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:228:53: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if ((flags & Compile::_intrinsic_virtual) != 0) strcat(buf, ",virtual"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:229:53: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. if ((flags & Compile::_intrinsic_both) != 0) strcat(buf, ",nonvirtual"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:236:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char flagsbuf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:2068:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/graphKit.cpp:2078:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:469:40: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. print_prop("idealOpcode", (const char *)NodeClassNames[node->as_Mach()->ideal_Opcode()]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:510:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "P%d", index); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:526:11: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "%d", value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.hpp:94:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/indexSet.cpp:301:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_block->words(), block->words(), sizeof(uint32_t) * words_per_block); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/library_call.cpp:392:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/library_call.cpp:462:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/machnode.cpp:767:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/output.cpp:1725:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_bundle_use_elements, Pipeline_Use::elaborated_elements, sizeof(Pipeline_Use::elaborated_elements)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/output.cpp:1775:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_bundle_use_elements, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp:1338:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prob_str_buf[30]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp:1340:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(prob_str_buf, "%g", prob); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/parse2.cpp:2847:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/phaseX.cpp:401:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)this, (void*)&nh, sizeof(*this)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.cpp:3500:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char blanks[101]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1558:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40], buf2[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.cpp:1840:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[80], buf2[80]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/type.hpp:809:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char * const ptr_msg[lastPTR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp:424:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(orig_result, carray, sz); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp:485:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:379:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char as_chars[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:2454:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(code, method->code_base(), method->code_size()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:3439:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:3446:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:350:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(writeable_address(length), annos->adr_at(0), length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:575:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy( data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:899:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p+1, bcp+1, len-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:190:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cur_oop->obj_field_addr_raw<HeapWord>(fd->offset()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:817:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*name_ptr, name, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3541:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*function_table,(JavaThread::current())->get_jni_functions(),sizeof(jniNativeInterface)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:490:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&_event_callbacks, callbacks, byte_cnt); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:1254:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(si, &(sin->info), sizeof(jvmtiStackInfo)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:1258:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fi, sin->info.frame_buffer, frames_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp:965:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p->data, _curr_data, _curr_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp:990:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*_data_ptr, _curr_data, _curr_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp:2650:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.cpp:2651:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.hpp:420:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:166:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ext_funcs[i].errors, _ext_functions->at(i)->errors, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.hpp:335:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp:421:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dll_name[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp:424:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/unsafe.cpp:627:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[VALUE_MAXLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:177:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "<null>"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:375:32: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). _sun_java_launcher_pid = atoi(tail); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:426:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[bufsz]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:980:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1002:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tagset_buffer[max_tagset_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1040:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[BUFLEN+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1116:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[BUFLEN + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1117:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value2[BUFLEN + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1268:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stripped_argname[BUFLEN+1]; // +1 for '\0' data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1272:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1297:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char locked_message_buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1341:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* stream = fopen(file_name, "rb"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1352:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1981:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2341:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(module_name, patch_mod_tail, module_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2481:28: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. options = (char*)memcpy(NEW_C_HEAP_ARRAY(char, len2, mtArguments), pos+1, len2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2541:11: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(name, tail, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2714:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char version[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3110:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char from[3] = {separator, separator, '\0'}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char to [2] = {separator, '\0'}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3124:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3369:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(file_name, O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3533:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jvm_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:4318:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ext_path_str[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:4342:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = ::open(ext_path_str, O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:1620:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2214:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[20]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2215:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "reason%d", reason); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2224:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[20]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2225:3: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "action%d", action); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/deoptimization.cpp:2325:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[1*K]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/flagSetting.hpp:62:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char _value[SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/flagSetting.hpp:65:51: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. FlagGuard(void* flag_addr) : _addr(flag_addr) { memcpy(_value, _addr, SIZE); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/flagSetting.hpp:66:51: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. ~FlagGuard() { memcpy(_addr, _value, SIZE); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:656:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kind[buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/memprofiler.cpp:75:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _log_fp = fopen(log_name , "w+"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.cpp:1156:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(m->_name, "UNKNOWN"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.hpp:136:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name[MONITOR_NAME_LEN]; // Name of mutex data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.hpp:266:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _padding[PADDING_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.hpp:316:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _padding[PADDING_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:410:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char klass_name[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:411:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp_sig_name[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:512:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:513:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:762:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ptr, memblock, MIN2(size, memblock_size)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1276:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* os::fopen(const char* path, const char* mode) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1277:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char modified_mode[20]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1280:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* file = ::fopen(path, modified_mode); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:569:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). static int open(const char *path, int oflag, int mode); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:570:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). static FILE* open(int fd, const char* mode); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:571:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). static FILE* fopen(const char* path, const char* mode); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:375:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char intbuf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:381:4: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char intbuf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:463:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst_addr, src_addr, where); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:464:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dst_addr + where + hole_sz, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:584:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_code_array, code_array(), code_length()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:587:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_code_array, method()->code_base(), code_length()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/relocator.cpp:619:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_overwrite, addr_at(bci + ilen + delta), -delta); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:2711:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char blob_id[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:2764:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_saved_code, buffer, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/synchronizer.cpp:569:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _pad_prefix[DEFAULT_CACHE_LINE_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:1108:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char java_runtime_name[128] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:1109:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char java_runtime_version[128] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:1110:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char java_runtime_vendor_version[128] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:1111:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char java_runtime_vendor_vm_bug_url[128] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:2784:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[8]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4044:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4045:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4629:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframeArray.hpp:154:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char _valid[RegisterMap::reg_count]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp:320:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp:328:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[500]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp:329:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen(filename, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:117:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _name[name_length_max+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:118:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _arg[arg_count_max][arg_length_max+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:127:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_name, name, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:145:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(_arg[i], arg, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:229:7: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(_value._unit, "ns"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:274:5: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(_value._unit, "ns"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.hpp:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _unit[3]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:801:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char comma[2] = {0,0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:207:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[buflen]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:208:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char argbuf[argbuflen]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:237:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[buflen]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:542:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer() + position(), s, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2034:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char base_path[JVM_MAXPATHLEN] = {'\0'}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.cpp:176:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(support, &_optional_support, sizeof(jmmOptionalSupport)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.cpp:63:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nmt_env_variable[buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memTracker.cpp:68:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char value[buffer_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:309:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest->before_gc_usage_array(), _last_gc_stat->before_gc_usage_array(), len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:310:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(dest->after_gc_usage_array(), _last_gc_stat->after_gc_usage_array(), len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/runtimeService.cpp:74:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char capabilities[65]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:67:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[TEMP_BUF_SIZE] = {'\0'}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/bitMap.cpp:689:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, _map, size_in_bytes()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/copy.cpp:152:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&tmp, cur_src, sizeof(T)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/copy.cpp:162:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(cur_dst, &tmp, sizeof(T)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:199:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:216:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:422:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:661:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:678:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:736:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&g_stored_assertion_context, context, sizeof(ucontext_t)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.hpp:202:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. typedef char PASTE_TOKENS(STATIC_ASSERT_DUMMY_TYPE_, __LINE__)[ \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:58:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void*)&_section_hdr, (const void*)&shdr, sizeof(shdr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:171:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _file = fopen(filepath, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/exceptions.cpp:248:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[max_msg_size]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/formatBuffer.hpp:66:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _buffer[bufsz]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions.cpp:180:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char type2char_tab[T_CONFLICT+1]={ 0, 0, 0, 0, 'Z', 'C', 'F', 'D', 'B', 'S', 'I', 'J', 'L', '[', 'V', 0, 0, 0, 0, 0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions.hpp:659:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char type2char_tab[T_CONFLICT+1]; // Map a BasicType to a jchar data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp:115:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define open _open data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.cpp:228:37: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. *p = (BasicHashtableEntry<F>*)memcpy(top, (void*)*p, entry_size()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/hashtable.cpp:383:35: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. _buckets = (HashtableBucket<F>*)memcpy(top, (void*)_buckets, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/nativeCallStack.cpp:104:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:114:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, result, result_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:124:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:220:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:245:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[buffer_length]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:348:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + buffer_pos, s, write_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:406:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char pid_text[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:505:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char timestr[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:512:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _file = fopen(file_name, "w"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:522:11: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). _file = fopen(file_name, opentype); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:951:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[4096]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:1021:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer + buffer_pos, s, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:1099:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&server.sin_addr, host->h_addr_list[0], host->h_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp:223:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(p, "\\u%04x", c); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp:278:15: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char utf8_buffer[4]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp:524:7: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(p, "\\u%04x", c); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.cpp:39:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char host_information[300]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.cpp:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char extended_resource_info_at_startup[600]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/virtualizationSupport.cpp:46:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ebuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:159:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signame_buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:239:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:423:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1052:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1208:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fd = open(buf, O_RDWR | O_CREAT | O_EXCL, 0666); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1309:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1396:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msgbuf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1438:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char signal_name[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1537:38: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* replay_data_file = os::open(fd, "w"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1626:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buffer[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.hpp:44:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _detail_msg[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.hpp:76:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char coredump_message[O_BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:136:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:168:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_ptr, old_ptr, old_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:176:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(push_ptr, tag, tag_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:351:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[200]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libjli/java_md_aix.c:30:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char dladdr_buffer[0x8000]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/ch/AixPollPort.c:164:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:89:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stack_buf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:77:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[2048]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:91:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(fn, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:140:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:156:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(fn, O_RDONLY)) < 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:215:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(args, cmdline, cmdlen + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:254:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen("/proc/stat", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:94:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:117:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:142:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:320:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:552:29: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:610:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:663:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:678:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[BUFLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char languageString[LOCALEIDLENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localeString[LOCALEIDLENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:179:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpScript[4]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:182:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpScript, scriptRegion + 1, 4); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:184:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(atMark + 1, tmpScript, 4); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:357:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dst[16]; // big enough for INET6 data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:425:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; /* Used for %d of an int - 16 is plenty */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:200:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jrePath[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:218:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jvmPath[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:449:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char libjava[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:454:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jvm_cfg[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:484:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jvm_cfg[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:690:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jrePath[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:696:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char splashPath[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:795:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char envVar[80]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:858:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char envVar[80]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:894:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char envVar[80]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:197:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uri, cproto, protoLen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:198:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uri + protoLen, "://", 3); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:199:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uri + protoLen + 3, chost, hostLen + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:257:37: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostNameBuffer[BUFFER_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/MacOSXNativeDispatcher.c:50:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chars_buf[(PATH_MAX + 1) * 2]; // utf16 + zero padding data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/include/jvmticmlr.h:112:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char message[50]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Class.c:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:89:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:91:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceBuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:164:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:166:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sourceBuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:379:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Module.c:121:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Module.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/Module.c:163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c:129:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c:168:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/check_version.c:36:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/check_version.c:37:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "JVM interface version mismatch: expecting %d, got %d.", data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.c:78:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stackBuf[BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.c:150:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char stackBuf[BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/io_util.c:207:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:160:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:186:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:183:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed, decompressed_resource, (size_t) uncompressed_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:219:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed_resource, data, header_size + 2); //+ cp count data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:238:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed_resource, string, str_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:279:33: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(fullpkg, pkg, str_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:282:33: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed_resource, pkg_base, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:292:29: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed_resource, clazz, clazz_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:301:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed_resource, desc_string, desc_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:314:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed_resource, data, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:331:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed_resource, data, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:344:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uncompressed_resource, data, (size_t) remain); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:285:35: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ImageFileReader* ImageFileReader::open(const char* name, bool big_endian) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:293:36: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (reader == NULL || !reader->open()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:375:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bool ImageFileReader::open() { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.hpp:453:29: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). static ImageFileReader* open(const char* name, bool big_endian = Endian::is_big_endian()); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.hpp:468:10: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bool open(); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:62:47: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). ImageFileReader* jfile = ImageFileReader::open(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:116:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullpath[IMAGE_MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:131:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fullpath[index], module_name, moduleNameLen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:134:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&fullpath[index], name, nameLen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:51:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(rv, begin, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:307:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4096]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:376:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fptr = fopen(arg, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:239:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jvmpath[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:240:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jrepath[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:241:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jvmcfg[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:929:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp, options, numOptions * sizeof(JavaVMOption)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1048:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char env_entry[MAXNAMELEN + 24] = ENV_ENTRY "="; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1669:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, arg, optLen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1670:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p + optLen, value, valueLen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1728:33: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. *nargv++ = (char *) JLI_WildcardExpandClasspath(argv[i+1]); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:1760:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char home[MAXPATHLEN]; /* application home */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2070:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[MAXPATHLEN+20]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2083:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). jvmCfg = fopen(jvmCfgName, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/java.c:2186:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(newKnownVMs, knownVMs, knownVMsLimit * sizeof(struct vmdesc)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:180:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(str, beg, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:200:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, sl->elements[i], len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.c:223:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, sl->elements[i], len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:104:41: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define JLI_Open open data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/manifest_info.h:65:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define CH(b, n) (((unsigned char *)(b))[n]) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:290:20: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. (void) memcpy(eb, cp, ENDHDR); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:240:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(filename, wildcard, wildlen-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:241:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(filename+wildlen-1, basename, baselen+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2042:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[257]; /* for holding manufactured argument lists */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2612:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_registers, registers, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2707:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[5], *p; /* actually [2] is big enough */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3478:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result[i].modifies, masks[i].modifies, bitmask_size * sizeof(int)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3494:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(result[i].modifies, masks[i].modifies, bitmask_size * sizeof(int)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3515:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char space[CCSegSize]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3821:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer_space[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:3836:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, p, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:159:12: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return open(fname, flags, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:313:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[4]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:331:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[READBLOCKSZ]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:363:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(endbuf, buf + i, ENDHDR); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:408:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loc64[ZIP64_LOCHDR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:511:7: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(zip->metanames[i], name, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:581:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char endbuf[ENDHDR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:601:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char end64buf[ZIP64_ENDHDR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:791:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:844:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errbuf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1047:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ze->name, cen + CENHDR, nlen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1057:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ze->extra+2, extra, elen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1097:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ze->comment, cen + CENHDR + nlen + elen, clen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1316:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char loc[LOCHDR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1407:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1489:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.h:68:30: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. #define CH(b, n) (((unsigned char *)(b))[n]) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:71:11: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define open _open data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:60:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:89:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "unknown win32 error (%ld)", error); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:269:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). open((const char *)path, oflag, 0666)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:322:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(path, "<fd:%d>", fd); /* for debugging */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:639:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(state->msg, ": "); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:185:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->x.next, strm->next_in, strm->avail_in); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:349:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, state->x.next, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:475:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:615:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, state->x.next, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:237:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->in + have, buf, copy); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:333:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:468:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->in, state->in + state->size, left); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:567:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(state->in, state->in + state->size, left); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inflate.c:664:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char hbuf[4]; /* buffer for gzip header crc calculation */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/inflate.c:1429:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[4]; /* to restore bit buffer to byte string */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/trees.c:352:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *header = fopen("trees.h", "w"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zcrc32.c:167:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). out = fopen("crc32.h", "w"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.c:38:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. z_const char * const z_errmsg[10] = { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:73:16: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern z_const char * const z_errmsg[10]; /* indexed by 2-zlib_error */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:133:6: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fopen((name), (mode), "mbc=60", "ctx=stm", "rfm=fix", "mrs=512") data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:226:30: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). # define F_OPEN(name, mode) fopen((name), (mode)) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/zutil.h:250:21: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. # define zmemcpy memcpy data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:222:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:795:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1330:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. (void) sprintf(name, "Wrong inlinedMethod%1d()", vframe_no); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1533:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAX_SYM_SIZE + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:120:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(open(path, flag), ret); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:180:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:202:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:217:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:358:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res_buffer[RES_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:461:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ch, buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:473:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). return atoi(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:490:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:534:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d", probe_type); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/ch/DevPollArrayWrapper.c:44:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int wfd = open("/dev/poll", O_RDWR); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:157:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char java[PATH_MAX + 1]; /* path to java binary */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:197:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jarPath[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:317:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(path, O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:319:18: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char buf[CHUNK_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:576:38: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). pid_t childpid = (pid_t) atoi(ptr->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:631:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:638:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(fn, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:680:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fn[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:681:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char exePath[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:682:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char prargs[PRARGSZ + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:190:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, path, pathsize); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:249:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:279:17: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *tty = fopen("/dev/tty", "w"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:335:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(p, *a, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:362:17: [2] (race) vfork: On some old systems, vfork() permits race conditions, and it's very difficult to use correctly (CWE-362). Use fork() instead. resultPid = vfork(); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:396:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *buf, buf1[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:397:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *hlpargs[2]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:454:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf+offset, c->pdir, sp.dirlen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:61:25: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define fileopen fopen data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:224:21: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(open(pathname, O_RDONLY), fd); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:269:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(ETC_TIMEZONE_FILE, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:270:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:304:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char linkbuf[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:326:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(open(DEFAULT_ZONEINFO_FILE, O_RDONLY), fd); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:401:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(fname, fmode)) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:408:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(open(fname, O_RDONLY), fd); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:502:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:641:17: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). RESTARTABLE(open(DEFAULT_ZONEINFO_FILE, O_RDONLY), fd); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:669:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:672:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(ETC_ENVIRONMENT_FILE, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:692:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mapfilename[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:693:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:705:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tz_buf, tz, tz_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:714:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(mapfilename, "/lib/tzmappings"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:715:19: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((tzmapf = fopen(mapfilename, "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:863:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sign, buf[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:892:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sign, buf[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/UnixFileSystem_md.c:102:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char canonicalPath[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:212:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char aix_fd_dir[32]; /* the pid has at most 19 digits */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:253:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expanded_file[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:264:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(expanded_file, dir, dirlen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:267:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(expanded_file + dirlen, file, filelen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.c:153:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int devnull = open("/dev/null", O_WRONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.h:78:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define open64 open data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:381:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char tmp_path[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:418:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char list[258]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:555:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjimage/osSupport_unix.cpp:41:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return ::open(path, 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:121:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[PATH_MAX + 2], *real; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:138:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwdbuf[PATH_MAX+2]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:151:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX+2]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:169:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dir[2*PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_common.c:229:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:173:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:234:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jpath[PATH_MAX + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:507:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char libjava[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:559:12: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(jvmpath, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:583:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[257]; /* recommended buffer size from sysinfo man data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:668:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:695:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char jrePath[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjli/java_md_solinux.c:696:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char splashPath[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:265:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *tmpbuf[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:378:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uri, cproto, protoLen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:379:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uri + protoLen, "://", 3); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:380:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(uri + protoLen + 3, chost, hostLen + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:61:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[NI_MAXHOST + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:65:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(hostname, "localhost"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:167:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(next, iterator, sizeof(struct addrinfo)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:232:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[NI_MAXHOST + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:359:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sendbuf[1500], recvbuf[1500]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet4AddressImpl.c:399:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(icmp->icmp_data, &tv, sizeof(tv)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:62:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[NI_MAXHOST + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:66:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(hostname, "localhost"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char myhostname[NI_MAXHOST + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:319:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(next, iterator, sizeof(struct addrinfo)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:427:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[NI_MAXHOST + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:447:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:563:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char sendbuf[1500], recvbuf[1500]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:611:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(sendbuf + sizeof(struct icmp6_hdr), &tv, sizeof(tv)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:702:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/Inet6AddressImpl.c:717:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&inf.sa6.sin6_addr, caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:223:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char searchName[IFNAMESIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:534:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char mac[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:879:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[IFNAMESIZE], vname[IFNAMESIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:902:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addrP->addr, ifr_addrP, addr_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:912:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(addrP->brdcast, ifr_broadaddrP, addr_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:994:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpaddr, addrP, sizeof(netaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:998:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpaddr->addr, addrP->addr, addr_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1004:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmpaddr->brdcast, addrP->brdcast, addr_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1161:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&addr, &(ifreqP->ifr_addr), sizeof(struct sockaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1168:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1171:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&broadaddr, &(ifreqP->ifr_broadaddr), data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1178:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1208:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devname[21], addr6p[8][5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1211:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(_PATH_PROCNET_IFINET6, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1217:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr6[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1285:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &ifr.ifr_hwaddr.sa_data, IFHWADDRLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1400:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&addr, &(ifreqP->ifr_addr), sizeof(struct sockaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1407:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1410:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&broadaddr, &(ifreqP->ifr_broadaddr), data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1417:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1488:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(if6.ifr_Addr), &(ifreqP->ifr_addr), data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1565:13: [2] (buffer) bcopy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. bcopy(nddp->ndd_addr, buf, 6); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1701:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&addr, &(ifreqP->lifr_addr), sizeof(struct sockaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1708:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&(ifreqP->lifr_addr), &addr, sizeof(struct sockaddr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1818:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char style1dev[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1823:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1829:15: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fd = open(style1dev, O_RDWR)) < 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1864:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(retbuf, &buf[dlpaack->dl_addr_offset], dlpaack->dl_addr_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1892:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &sp->sdl_data[0], sp->sdl_alen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1911:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&ipAddr.sin_addr, addr, sizeof(struct in_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1912:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(&arpreq.arp_pa, &ipAddr, sizeof(struct sockaddr_in)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1920:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, &arpreq.arp_ha.sa_data[0], len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:2117:25: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buf, (sadl->sdl_data + sadl->sdl_nlen), ETHER_ADDR_LEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:344:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:473:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:548:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:719:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:903:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:1589:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[255]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:1590:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(errmsg, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:2136:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&(mname6.ipv6mr_multiaddr), caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/PlainSocketImpl.c:909:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullMsg[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/ResolverConfigurationImpl.c:76:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[MAXDNAME]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketInputStream.c:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/SocketOutputStream.c:62:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:148:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf [64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:152:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). s = open (driver, O_RDWR); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:164:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). value = atoi(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:255:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullMsg[512]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:325:20: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *fP = fopen("/proc/net/if_inet6", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:326:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[255]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:499:43: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c1 = ((unsigned char *)target_addr)[byte_count]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:514:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcp[8][5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:515:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hopp[8][5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:518:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest_str[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:520:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:534:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen("/proc/net/ipv6_route", "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:595:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (&loRoutes[nRoutes].addr,&dest_addr,sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:605:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devname[21]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:606:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr6p[8][5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:609:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen("/proc/net/if_inet6", "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:636:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char localaddr [16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:647:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char staddr [16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:648:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ifname [33]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:653:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen("/proc/net/if_inet6", "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:690:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy (lif->localaddr, staddr, 16); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:800:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&sa->sa6.sin6_addr, caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1022:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char srcp[8][5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1023:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hopp[8][5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1026:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dest_str[40]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1028:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char device[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1035:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen("/proc/net/ipv6_route", "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1098:47: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char c1 = ((unsigned char *)target_addr)[byte_count]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1120:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char devname[21]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1121:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char addr6p[8][5]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1124:18: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen("/proc/net/if_inet6", "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/portconfig.c:55:13: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). f = fopen("/proc/sys/net/ipv4/ip_local_port_range", "r"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c:117:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/InheritedChannel.c:142:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = open(str, oflag_actual); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/Net.c:135:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). major = atoi(uts.version); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/Net.c:136:17: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). minor = atoi(uts.release); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixCopyFile.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[8192]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:71:16: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). #define open64 open data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:315:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:334:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:368:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). fp = fopen(path, mode); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:913:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char target[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:940:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char resolved[PATH_MAX+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Console_md.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Console_md.c:59:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "ms%d", cp); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/Console_md.c:61:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "cp%d", cp); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:499:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char token_buf[TOKEN_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessImpl_md.c:81:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char utf8_javaMessage[MESSAGE_LENGTH*2]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:91:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char val[MAX_ZONE_CHAR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:103:35: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. ret = RegQueryValueExA(hKey, (char *) keyNames[keyIndex + 1], NULL, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:112:11: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). len = MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:136:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buffer, "GMT%c%02d:%02d", data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:141:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(buffer, "GMT"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:229:9: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR subKeyName[MAX_ZONE_CHAR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:230:9: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR szValue[MAX_ZONE_CHAR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:436:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char *items[TZ_NITEMS]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:438:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lineBuffer[MAX_ZONE_CHAR * 4]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:450:15: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((fp = fopen(mapFileName, "r")) == NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:537:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char winZoneName[MAX_ZONE_CHAR]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:538:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char winMapID[MAX_MAPID_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:568:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char zonename[32]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:699:9: [2] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Risk is low because the source is a constant string. wcscat(search_path, L"\\*"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:240:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[1024]; /* Working copy of path */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:634:17: [2] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. Risk is low because the source is a constant string. wcscpy(pathbuf, L"\\\\?\\UNC\0"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:638:13: [2] (buffer) wcscpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using a function version that stops copying at the end of the buffer. Risk is low because the source is a constant string. wcscpy(pathbuf, L"\\\\?\\\0"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char alt_dirname[4] = { 0, 0, 0, 0 }; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:92:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(dirp->path, "*.*"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:94:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(dirp->path, "\\*.*"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:77:20: [2] (integer) atoi: Unless checked, the resulting number can exceed the expected range (CWE-190). If source untrusted, check both minimum and maximum, even if the input had no minus sign (large numbers can roll over into negative number; consider saving to an unsigned value if that is intended). codepage = atoi(ret+2); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:82:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ret, "UTF-8"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:93:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ret, "GBK"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:96:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ret, "GB18030"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:109:9: [2] (buffer) TCHAR: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. TCHAR mbChar[2] = {(char)0xfa, (char)0x41}; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:111:9: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(CP_ACP, 0, mbChar, 2, &unicodeChar, 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:113:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ret, "MS950_HKSCS_XP"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:121:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char systemPath[MAX_PATH + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:126:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(systemPath, "\\FONTS\\SimSun18030.ttc"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:127:26: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if ((f = fopen(systemPath, "r")) != NULL) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:129:21: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(ret, "GB18030"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:147:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "ms%d", cp); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:149:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "cp%d", cp); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:164:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * elems[5]; // lang, script, ctry, variant, encoding data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:285:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[SNAMESIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:319:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(*language, "en"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:320:13: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(*country, "US"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:332:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(*language, "no"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:333:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(*country , "NO"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:335:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(*language, "no"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:336:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(*country , "NO"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:337:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(*variant, "NY"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:386:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:573:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, "%d.%d", majorVersion, minorVersion); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp:42:14: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return ::open(path, O_BINARY | O_NOINHERIT, O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:227:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char crtpath[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:284:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char javadll[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:679:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char libraryPath[MAXPATHLEN]; /* some extra space for JLI_StrCat'ing SPLASHSCREEN_SO */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:854:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char libraryPath[MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:39:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:259:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:422:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:43:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:46:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(hostname, "localhost"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:120:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(next, iterator, sizeof(struct addrinfo)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:185:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[NI_MAXHOST + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet4AddressImpl.c:311:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char SendData[32] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hostname[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:47:9: [2] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant string. strcpy(hostname, "localhost"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:146:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(next, iterator, sizeof(struct addrinfo)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:254:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char host[NI_MAXHOST + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:274:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:389:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char SendData[32] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:470:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/Inet6AddressImpl.c:481:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&inf.sa6.sin6_addr, caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:146:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret, ifrowP, sizeof(MIB_IFROW)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:217:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char dev_name[8]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:268:20: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). wlen = MultiByteToWideChar(CP_OEMCP, 0, ifrowP->bDescr, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:307:17: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). if (MultiByteToWideChar(CP_OEMCP, 0, ifrowP->bDescr, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:123:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg_buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:192:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg_buf[100]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:225:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(ret, ptr, sizeof(IP_ADAPTER_ADDRESSES)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:327:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char newname [128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:350:33: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (newname, "tun%d", tun); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:353:33: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf (newname, "net%d", net); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char result[MAX_STR_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:148:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char key[MAX_STR_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:256:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char searchlist[MAX_STR_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:257:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char nameservers[MAX_STR_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketInputStream.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/SocketOutputStream.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:425:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:569:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:675:6: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:952:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char BUF[MAX_BUFFER_LEN]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1866:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[255]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1867:17: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(errmsg, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1982:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmpbuf[255]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1984:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char errmsg[255 + 31]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:142:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char exc[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:143:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fullMsg[256]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:176:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. excP = (char *)winsock_errors[i].exc; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:178:23: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (char *)winsock_errors[i].errString, msg); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.c:831:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((void *)&sa->sa6.sin6_addr, caddr, sizeof(struct in6_addr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.h:73:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((DST), (SRC), sizeof (struct sockaddr_in6)); \ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/net_util_md.h:75:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy ((DST), (SRC), sizeof (struct sockaddr_in)); \ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramChannelImpl.c:82:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:105:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. bufs[i].buf = (char *)iovp[i].iov_base; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:196:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. bufs[i].buf = (char *)iovp[i].iov_base; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c:161:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[128]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:105:24: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. bufs[i].buf = (char *)iovp[i].iov_base; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:218:26: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char* ptr = (char *)iovp[next_index].iov_base; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c:215:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char bytes[WAKEUP_SOCKET_BUF_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c:242:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[8]; data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2524:10: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). return fopen(path, mode); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-death-test.cc:341:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-death-test.cc:762:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char executable_path[_MAX_PATH + 1]; // NOLINT data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-death-test.cc:1243:22: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). const int cwd_fd = open(".", O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-filepath.cc:103:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[GTEST_PATH_MAX_ + 1] = { '\0' }; data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-filepath.cc:106:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char cwd[GTEST_PATH_MAX_ + 1] = { '\0' }; data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:135:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). const int fd = open("/proc/self/as", O_RDONLY); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:922:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(buffer, regex, len); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:996:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_dir_path[MAX_PATH + 1] = { '\0' }; // NOLINT data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:997:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char temp_file_path[MAX_PATH + 1] = { '\0' }; // NOLINT data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:1034:29: [2] (tmpfile) mkstemp: Potential for temporary file vulnerability in some circumstances. Some older Unix-like systems create temp files with permission to write by all by default, so be sure to set the umask to override this. Also, some older Unix systems might fail to use O_EXCL when opening the file, so make sure that O_EXCL is used by the library (CWE-377). const int captured_fd = mkstemp(name_template); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-printers.cc:65:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char text[5] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:909:7: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(CP_ACP, 0, ansi, length, data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:912:3: [2] (buffer) MultiByteToWideChar: Requires maximum length in CHARACTERS, not bytes (CWE-120). MultiByteToWideChar(CP_ACP, 0, ansi, length, data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:1728:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_text[kBufSize] = { '\0' }; data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:1812:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char str[5]; // Big enough for the largest valid code point. data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:4346:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char tmp[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:4352:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char line[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char block[block_size]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:41:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char clear_block[block_size]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:42:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char set_block[block_size]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gc/shared/test_oopStorage.cpp:649:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char _states[_max_workers][_max_entries]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestFixture.hpp:34:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char _filename[2 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestUtils.inline.hpp:114:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen(filename, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_log.cpp:53:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char big_msg[4096] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_log.cpp:62:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen(TestLogFileName, "r"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:40:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char _all_decorators[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:88:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:170:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char other_file_name[2 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:221:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:262:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:290:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:393:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp:77:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_tags[1 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorators.cpp:149:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char decstr[1 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorators.cpp:175:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char input[64]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logFileOutput.cpp:49:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_filename[1 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logFileOutput.cpp:97:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:51:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:111:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:172:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected_lines_data[lines][line_length]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:44:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:100:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:131:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:202:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelection.cpp:210:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logSelectionList.cpp:40:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTag.cpp:69:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[LogTag::Count * 16] = {0}; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:35:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:114:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ts_name[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:167:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char other_name[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected[1 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:52:14: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE* fp = fopen(filename, "w+"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char expected[1 * K]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_oop.cpp:29:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char memory[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/oops/test_typeArrayOop.cpp:33:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char mem[100]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_arguments.cpp:47:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ullong_max[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_arguments.cpp:161:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char buff[100]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:157:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:198:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:252:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[2 * (sizeof(expected) + padding_size)]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os.cpp:253:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char check_buffer[sizeof(buffer)]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:61:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t abs_path[JVM_MAXPATHLEN]; \ data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:62:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t cwd[JVM_MAXPATHLEN]; \ data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:200:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:216:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:222:18: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = os::open(buf, O_RDONLY, 0); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:231:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:239:20: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). int fd = os::open(buf, O_RDONLY, 0); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:252:5: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t tmp[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:263:5: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t tmp[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:274:5: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t tmp[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:282:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:292:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:367:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:368:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t abs[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:387:3: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. wchar_t buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:402:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t cwd[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:403:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t nearly_long_rel_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:404:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t long_rel_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:405:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t empty_dir_rel_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:406:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t not_empty_dir_rel_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:407:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t file_rel_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:408:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t nearly_long_file_rel_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:409:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t nearly_long_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:410:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t empty_dir_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:411:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t not_empty_dir_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:412:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t nearly_long_file_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:413:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t file_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:414:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t nearly_long_unc_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:415:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t empty_dir_unc_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:416:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t not_empty_dir_unc_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:417:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t nearly_long_file_unc_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:418:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t file_unc_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:419:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t root_dir_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:420:10: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t root_rel_dir_path[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:436:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(nearly_long_rel_path, dir_prefix, sizeof(wchar_t) * dir_prefix_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:505:14: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t top_buf[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:511:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(top_buf, cwd + 3, top_len * 2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:591:14: [2] (buffer) wchar_t: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static wchar_t tmp[JVM_MAXPATHLEN]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:87:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[128 + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:97:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[100 + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:36:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[100]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:72:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[100]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:85:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[100]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:29:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char res[60]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNICritical.c:32:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bb, aa, len * sizeof(jint)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c:36:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classpath[4096]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:71:10: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char altstack[SIGSTKSZ]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:228:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char javaclasspathopt[4096]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/ThreadSignalMask/exeThreadSignalMask.c:38:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/ThreadSignalMask/exeThreadSignalMask.c:68:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char lib[PATH_MAX]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:122:77: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). jboolean is_exported(JNIEnv *env, jobject module, const char* pkg, jboolean open) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:129:28: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). const char* name = open ? "isOpen" : "isExported"; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:140:34: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). jboolean open) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:147:28: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). const char* name = open ? "isOpen" : "isExported"; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:158:40: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). jboolean open) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:160:9: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). if (open) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:173:40: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). jboolean open) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:174:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char strbuf[128] = { '\0' }; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:176:23: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). const char* pkg = open ? "jdk.internal.math" data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:179:28: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). const char* jvmti_fn = open ? "AddModuleOpens" data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:185:53: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). err = add_module_exports(NULL, pkg, thisModule, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:194:60: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). err = add_module_exports(baseModule, NULL, thisModule, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:203:53: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). err = add_module_exports(baseModule, pkg, NULL, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:212:63: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). err = add_module_exports(baseModule, bad_pkg, thisModule, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:221:61: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). err = add_module_exports((jobject)cls, pkg, thisModule, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:230:61: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). err = add_module_exports(baseModule, pkg, (jobject)cls, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:239:65: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). exported = is_exported_to(env, baseModule, pkg, thisModule, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:248:59: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). err = add_module_exports(baseModule, pkg, thisModule, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:258:65: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). exported = is_exported_to(env, baseModule, pkg, thisModule, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:267:50: [2] (misc) open: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). exported = is_exported(env, baseModule, pkg, open); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.c:439:3: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(new_objects, storage->live_objects, current_count * sizeof(*new_objects)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.c:459:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(allocated_frames, frames, count * sizeof(*allocated_frames)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:79:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(d, TO, n); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.c:96:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.c:123:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/attach002aAgent00.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.c:76:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c:58:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char mainThreadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char loadedClassName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/attach014Agent00.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent00.c:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent01.c:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/attach022Agent00.c:129:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.c:75:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.c:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.c:72:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.c:86:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.c:115:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.c:62:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char startedThreadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.c:75:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadGroupName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c:71:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.c:107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char startedThreadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.c:51:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char startedThreadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.c:77:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent00.c:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent01.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent02.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/attach046Agent00.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char className[MAX_STRING_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.c:67:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.c:67:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/curthrcputime001.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], buf2[64], buf3[64]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/curthrtimerinfo001.c:66:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], buf2[64]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/frameloc002.c:99:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/thrcputime001.c:71:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], buf2[64], buf3[64]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/thrcputime002.c:74:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], buf2[64], buf3[64]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/thrtimerinfo001.c:66:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[64], buf2[64]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/gettime001.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32], buf2[32], buf3[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/timerinfo001.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[32], buf2[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/mentry001.c:77:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/mexit001.c:78:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/mexit002.c:78:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.c:164:22: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. meth.name = (char *) METHODS[1][0]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.c:165:27: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. meth.signature = (char *) METHODS[1][1]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/objfree001.c:57:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[MEM_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/objfree002.c:54:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[MEM_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c:67:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c:150:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.c:159:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c:67:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c:163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.c:172:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c:67:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.c:185:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c:58:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c:67:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.c:185:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c:59:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c:68:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c:177:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.c:186:9: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(name, "RawMonitor-%d", i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.c:143:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.c:302:59: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (*jvmti_env)->Deallocate(jvmti_env, (unsigned char *)(table[j].name)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.c:303:59: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. (*jvmti_env)->Deallocate(jvmti_env, (unsigned char *)(table[j].signature)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/retransform004.c:98:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*new_class_data, class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/setenvstor001.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[STORAGE_DATA_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/setenvstor002.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[STORAGE_DATA_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/setenvstor003.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[STORAGE_DATA_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.c:57:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char enbl_scale[SCALE_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.c:58:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static unsigned char ev_scale[SCALE_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/setthrdstor001.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[STORAGE_DATA_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/setthrdstor002.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[STORAGE_DATA_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/setthrdstor003.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[STORAGE_DATA_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/ap10t001.c:55:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char data[MAX_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c:49:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.c:64:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bytecode = fopen(filename, "rb"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/cm01t008.c:530:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(klass_bytes, class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/cm02t001.c:267:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/cm03t001.c:104:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(klass_bytes, class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.c:64:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.c:105:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.c:256:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.c:60:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.c:61:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodSig[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.c:66:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.c:67:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodSig[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.c:53:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char name[NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/gf01t001.c:45:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *expected_props[PROP_NUM] = { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/gf06t001.c:68:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char data[STORAGE_DATA_SIZE]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/hs103t002.c:52:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/hs104t001.c:48:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/hs104t002.c:79:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:55:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chbuffer[255]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:413:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:430:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bytecode = fopen(filename, "rb"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:55:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char chbuffer[255]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:413:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char filename[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:430:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bytecode = fopen(filename, "rb"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/hs202t002.c:71:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/hs203t001.c:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/hs203t002.c:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/hs203t003.c:95:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/hs203t004.c:109:17: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.c:70:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.c:95:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.c:103:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/hs204t003.c:112:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/hs204t004.c:96:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/hs301t001.c:86:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/hs301t002.c:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/hs301t003.c:47:11: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/hs301t004.c:49:13: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/hs301t005.c:45:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/hs302t001.c:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/hs302t002.c:46:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/hs302t003.c:45:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/hs302t004.c:44:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/hs302t005.c:46:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/hs302t006.c:45:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/hs302t007.c:42:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/hs302t008.c:45:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/hs302t009.c:46:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/hs302t010.c:45:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/hs302t011.c:45:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/hs302t012.c:47:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char fileName[512]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001.c:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001a.c:85:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002a.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32], buffer2[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003a.c:52:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32], buffer2[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001.c:74:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(klass_bytes, class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001a.c:74:17: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(klass_bytes, class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001.c:81:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(klass_bytes, class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001a.c:81:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(klass_bytes, class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004a.c:54:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/sp02t001.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.c:49:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.c:50:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodSig[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.c:48:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.c:49:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.c:50:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodSig[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodSig[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.c:299:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kind[256] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodSig[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.c:298:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kind[256] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:55:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char threadName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:56:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodName[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:57:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodSig[MAX_NAME_LENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.c:299:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char kind[256] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.c:133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.c:163:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.c:171:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.c:190:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.c:71:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *sig_exp [METHCNT] = { "(I)D", "(I)F" }; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.c:72:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *name_exp[METHCNT] = { "countDownDouble", "countDownFloat" }; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.c:74:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *sign_exp[METHCNT] = { "(I)Z", "(I)B", "(I)C", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.c:76:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static const char *name_exp[METHCNT] = { "countDownBoolean", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c:139:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sz[128]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c:141:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sz, "Raw-monitor"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:206:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sz[128]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:208:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sz, "Rawmonitor-%d",i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:138:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sz[128]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:140:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sz, "Rawmonitor-%d",i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/JvmtiTest.c:102:13: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(*new_class_data, class_data, class_data_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:70:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char segment[3000] = "."; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:253:5: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(segment, "/newclass"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:148:83: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. res = JVMTI_ENV_PTR(jvmti)->GetSystemProperty(JVMTI_ENV_ARG(jvmti, (const char *)properties[i]), &value); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:152:83: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. res = JVMTI_ENV_PTR(jvmti)->SetSystemProperty(JVMTI_ENV_ARG(jvmti, (const char *)properties[i]), value); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:125:83: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. res = JVMTI_ENV_PTR(jvmti)->GetSystemProperty(JVMTI_ENV_ARG(jvmti, (const char *)properties[i]), &value); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:130:83: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. res = JVMTI_ENV_PTR(jvmti)->SetSystemProperty(JVMTI_ENV_ARG(jvmti, (const char *)properties[i]), value); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:176:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sz[128]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:178:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sz, "Rawmonitor-%d",i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:314:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char sz[128]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:316:5: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(sz, "Rawmonitor-%d",i); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:97:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:193:3: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:234:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c:1178:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[1000]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.c:1216:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char error_msg[80]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.c:107:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.c:133:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buffer[32]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c:39:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char segment1[3000] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char segment2[3000] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c:39:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char segment1[3000] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c:40:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char segment2[3000] = ""; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c:170:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(genPos, inputPos, count); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c:180:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(bytes, inputPos, count); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c:185:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(genPos, bytes, count); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:33:12: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. static char str[15 * 20]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:41:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " ALIVE"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:45:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " TERMINATED"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:49:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " RUNNABLE"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:53:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " WAITING"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:57:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " WAITING_INDEFINITELY"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:61:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " WAITING_WITH_TIMEOUT"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:65:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " SLEEPING"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:69:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " IN_OBJECT_WAIT"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:73:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " PARKED"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:77:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " BLOCKED_ON_MONITOR_ENTER"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:81:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " SUSPENDED"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:85:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " INTERRUPTED"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.c:89:9: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(str, " IN_NATIVE"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:245:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file [1024]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.c:258:24: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bytecode = fopen(file, "rb"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c:113:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(names[classCount], name, name_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c:120:9: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy((unsigned char*) old_class_def[classCount].class_bytes, data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.c:41:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. const char * const g_refKindStr[28] = { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.c:66:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char * g_szTagInfo[MAX_TAG]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.c:67:1: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char g_tagFlags[MAX_TAG]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:43:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern const char * const g_refKindStr[28]; /* JVMTI_HEAP_REFERENCE_xxx */ data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:52:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char * g_szTagInfo[MAX_TAG]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:53:8: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. extern char g_tagFlags[MAX_TAG]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:508:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char file [1024]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:521:24: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). bytecode = fopen(file, "rb"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:135:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buf[1024]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:157:7: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char msg_buf2[sizeof(msg_buf)]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:264:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char hex[MAX_HEX_COLUMNS * 3 + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:265:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char ascii[MAX_HEX_COLUMNS + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:266:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char buf[16]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:284:13: [2] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source has a constant maximum length. sprintf(buf, " %02X", b); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:292:17: [2] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant string. strcat(hex, " "); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:51:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[DIGESTLENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:85:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(element->checkstr[allocs],digest,DIGESTLENGTH); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:144:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[DIGESTLENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:182:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(javachars->checkstr[index++],digest,DIGESTLENGTH); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:35:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[DIGESTLENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:69:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp,digest,DIGESTLENGTH); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:82:14: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. unsigned char digest[DIGESTLENGTH]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:126:5: [2] (buffer) memcpy: Does not check for buffer overflows when copying to destination (CWE-120). Make sure destination can always hold the source data. memcpy(tmp,digest,DIGESTLENGTH); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:46:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:114:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:179:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:245:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:309:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:374:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:440:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:505:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:570:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:637:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:703:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:769:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:834:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:900:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:965:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1031:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1098:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1164:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1229:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1295:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1361:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1427:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1493:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1559:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1624:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1690:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1757:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1823:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1889:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:1955:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2021:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2087:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2153:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2219:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2284:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2351:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2418:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2484:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2551:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2618:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2684:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2751:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2817:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2883:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:2949:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3016:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3083:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3149:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3215:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3282:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3349:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.c:3416:16: [2] (misc) fopen: Check when opening files - can an attacker redirect it (via symlinks), force the opening of special file type (e.g., device files), move things around to create a race condition, control its ancestors, or change its contents? (CWE-362). FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c:80:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char r[600]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h:32:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char methodName[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h:33:5: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char classSig[256]; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:134:9: [2] (buffer) char: Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length. char path[MAX_PATH]; data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:86:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(in); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:126:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int in_len = strlen(in); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:127:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int sub_len = strlen(sub); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:128:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int rep_len = strlen(rep); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:138:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(out, in, p - in); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:155:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msys_path_list_end = &msys_path_list[strlen(msys_path_list)]; data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:186:90: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (prefix = msys_path_list; prefix < msys_path_list_end && prefix != NULL; prefix += strlen(prefix)+1) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:236:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rc = _mktemp_s(name, strlen(name)+1); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:260:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fwrite(fixed, strlen(fixed), 1, atout); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:265:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). files_to_delete[num_files_to_delete] = (char*) malloc(strlen(name)+1); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:268:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). atname = (char*) malloc(strlen(name)+2); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:283:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(in_arg) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:427:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int msg_len = 80 + var_len + strlen(val); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:464:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). line += (ptrdiff_t) strlen(argv[i]); data/openjdk-11-jre-dcevm-11.0.9+1/make/src/native/fixpath.c:474:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ptrdiff_t len = strlen(argv[i]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/frame_aarch64.inline.hpp:126:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline bool frame::equal(frame other) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/sharedRuntime_aarch64.cpp:1316:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(at) == 2) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:130:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::equal : return Assembler::NE; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:1977:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (cc == equal) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:2009:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (cc == equal) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:246:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (_model2) sprintf(buf+strlen(buf), "(0x%03x)", _model2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp:78:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp:88:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/frame_arm.inline.hpp:111:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline bool frame::equal(frame other) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp:168:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::equal : return ne; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp:2512:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (cc == equal) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp:2545:16: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. assert(cc == equal || cc == not_equal, "invalid condition"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/templateTable_arm.cpp:2549:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (cc == equal) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.cpp:82:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/arm/vm_version_ext_arm.cpp:92:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:453:100: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::beq(ConditionRegister crx, Label& L) { Assembler::bc(bcondCRbiIs1, bi0(crx, equal), L); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:457:100: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::bne(ConditionRegister crx, Label& L) { Assembler::bc(bcondCRbiIs0, bi0(crx, equal), L); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:463:123: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::beq_predict_taken (ConditionRegister crx, Label& L) { bc(bcondCRbiIs1_bhintIsTaken, bi0(crx, equal), L); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:467:123: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::bne_predict_taken (ConditionRegister crx, Label& L) { bc(bcondCRbiIs0_bhintIsTaken, bi0(crx, equal), L); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:471:123: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::beq_predict_not_taken(ConditionRegister crx, Label& L) { bc(bcondCRbiIs1_bhintIsNotTaken, bi0(crx, equal), L); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:475:123: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::bne_predict_not_taken(ConditionRegister crx, Label& L) { bc(bcondCRbiIs0_bhintIsNotTaken, bi0(crx, equal), L); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:484:102: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::beql(ConditionRegister crx, Label& L) { Assembler::bcl(bcondCRbiIs1, bi0(crx, equal), L); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:488:102: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::bnel(ConditionRegister crx, Label& L) { Assembler::bcl(bcondCRbiIs0, bi0(crx, equal), L); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:505:123: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::beqctr( ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctr( bcondCRbiIs1, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:506:123: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::beqctrl(ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctrl(bcondCRbiIs1, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:507:123: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::bnectr( ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctr( bcondCRbiIs0, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:508:123: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void Assembler::bnectrl(ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctrl(bcondCRbiIs0, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:463:44: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. Assembler::Condition cond = Assembler::equal; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:465:71: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: positive = true ; cond = Assembler::equal ; is_unordered = false; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:466:71: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_notEqual: positive = false; cond = Assembler::equal ; is_unordered = false; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1564:42: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. Assembler::Condition cond = Assembler::equal; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1566:69: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: positive = true ; cond = Assembler::equal ; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1567:69: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_notEqual: positive = false; cond = Assembler::equal ; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1920:44: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(combined_check, Assembler::equal, tmp_check, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1920:73: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(combined_check, Assembler::equal, tmp_check, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1927:44: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crandc(combined_check, Assembler::equal, combined_check, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1927:78: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crandc(combined_check, Assembler::equal, combined_check, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1934:42: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1940:42: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1946:42: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:2295:74: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ bc_far_optimized(Assembler::bcondCRbiIs0, __ bi0(CCR0, Assembler::equal), *op->stub()->entry()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:3151:35: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:3151:59: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.cpp:415:68: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bc_far_optimized(Assembler::bcondCRbiIs1, bi0(CCR0, Assembler::equal), *Lnull); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:379:68: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ bclr(Assembler::bcondCRbiIs1, Assembler::bi0(CCR0, Assembler::equal), Assembler::bhintbhBCLRisReturn); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:484:74: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ bclr(Assembler::bcondCRbiIs1, Assembler::bi0(CCR0, Assembler::equal), Assembler::bhintbhBCLRisReturn); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:596:36: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crandc(CCR0, Assembler::equal, CCR0, Assembler::equal); // failed: CR0.ne data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:596:60: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crandc(CCR0, Assembler::equal, CCR0, Assembler::equal); // failed: CR0.ne data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp:368:72: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ bc_far_optimized(Assembler::bcondCRbiIs1, __ bi0(CCR0, Assembler::equal), *stub->continuation()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp:389:72: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ bc_far_optimized(Assembler::bcondCRbiIs1, __ bi0(CCR0, Assembler::equal), *stub->continuation()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1785:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1785:50: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1903:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cror(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1903:53: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cror(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1905:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cror(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1905:53: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cror(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.cpp:3597:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cror(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.cpp:3597:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cror(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:241:132: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void MacroAssembler::beq_far(ConditionRegister crx, Label& L, int optimize) { MacroAssembler::bc_far(bcondCRbiIs1, bi0(crx, equal), L, optimize); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:245:132: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline void MacroAssembler::bne_far(ConditionRegister crx, Label& L, int optimize) { MacroAssembler::bc_far(bcondCRbiIs0, bi0(crx, equal), L, optimize); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:398:34: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. isel_0(d, CCR0, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:445:32: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. isel_0(d, CCR0, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/sharedRuntime_ppc.cpp:1915:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(at) == 2) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2376:30: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(CCR1, Assembler::equal, CCR0, Assembler::less); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2378:30: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(CCR5, Assembler::equal, CCR0, Assembler::less); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2380:30: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(CCR1, Assembler::equal, CCR5, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2380:54: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(CCR1, Assembler::equal, CCR5, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2381:30: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(CCR1, Assembler::equal, CCR0, Assembler::less); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2410:32: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crnand(CCR5, Assembler::equal, CCR6, Assembler::less); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2459:82: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. const int bo = Assembler::bcondCRbiIs1, bi = Assembler::bi0(CCR0, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:265:28: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:265:52: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cror(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:269:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal); // Neither resolved class nor unresolved case from above? data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:269:53: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal); // Neither resolved class nor unresolved case from above? data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:322:41: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ isel_0(R17_tos, CCR0, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1636:42: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. Assembler::Condition cond = Assembler::equal; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1638:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::equal: positive = true ; cond = Assembler::equal ; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1638:76: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::equal: positive = true ; cond = Assembler::equal ; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1639:76: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::not_equal: positive = false; cond = Assembler::equal ; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:2738:37: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:2738:61: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:3765:32: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crnand(CCR0, Assembler::equal, CCR1, Assembler::equal); // slow path bit set or not fully initialized? data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:3765:56: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ crnand(CCR0, Assembler::equal, CCR1, Assembler::equal); // slow path bit set or not fully initialized? data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp:75:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp:85:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:419:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(line, system_type, strlen(system_type)) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/ppc/vm_version_ppc.cpp:426:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(line, num_lpars, strlen(num_lpars)) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_MacroAssembler_s390.cpp:110:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cond_inc32(Assembler::equal, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/c1_Runtime1_s390.cpp:725:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, return_min_jlong); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/sharedRuntime_s390.cpp:1625:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(at) == 2) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/templateTable_s390.cpp:176:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::equal : data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.cpp:74:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_ext_s390.cpp:84:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:305:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(_features_string) + 4 + 3*4 + 1 < sizeof(buf), "increase buffer size"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:316:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(_features_string) + 4 + 2 + 2*4 + 6 + 1 < sizeof(buf), "increase buffer size"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:637:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(march) >= hdr_len) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:660:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(march) > hdr_len) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:662:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(march)-hdr_len) >= buf_len) err = true; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:664:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memcpy(buf, &march[hdr_len], strlen(march)-hdr_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:665:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf[strlen(march)-hdr_len] = '\00'; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/s390/vm_version_s390.cpp:666:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (size_t i = 0; !err && (i < strlen(buf)); i++) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/args.cc:292:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:578:54: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: acond = Assembler::equal; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:1584:52: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: acond = Assembler::equal; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:1920:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pn, *stub->entry()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:1926:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pn, *stub->entry()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2107:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, *stub->entry()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2137:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(tmp, tmp2, Assembler::equal, Assembler::pn, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2140:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2142:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pn, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2151:52: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(tmp, tmp2, Assembler::equal, Assembler::pn, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2154:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pn, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2156:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pn, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2466:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, *failure_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2561:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, *failure_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:2909:50: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(tmp1, tmp2, Assembler::equal, Assembler::pt, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_LIRAssembler_sparc.cpp:3277:54: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: acond = Assembler::equal; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp:46:50: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_brx_short(temp_reg, iCache, Assembler::equal, Assembler::pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp:111:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp:251:59: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_brx_short(t1, var_size_in_bytes, Assembler::equal, Assembler::pt, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_MacroAssembler_sparc.cpp:253:59: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_brx_short(t1, con_size_in_bytes, Assembler::equal, Assembler::pt, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/c1_Runtime1_sparc.cpp:509:55: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(G3_t1, tag, Assembler::equal, Assembler::pt, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/frame_sparc.inline.hpp:47:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline bool frame::equal(frame other) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:60:45: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(tmp, G0, Assembler::equal, Assembler::pt, filtered); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:141:43: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(L0, G0, Assembler::equal, Assembler::pn, refill); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:225:43: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(tmp, G0, Assembler::equal, Assembler::pt, filtered); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:247:48: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(pre_val, G0, Assembler::equal, Assembler::pt, filtered); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:290:72: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(O2, G1CardTable::g1_young_card_val(), Assembler::equal, Assembler::pt, young_card); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:322:43: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(L0, G0, Assembler::equal, Assembler::pn, refill); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:375:44: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(tmp, G0, Assembler::equal, Assembler::pt, filtered); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:526:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pn, *stub->continuation()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:549:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pn, *stub->continuation()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:593:44: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(tmp, G0, Assembler::equal, Assembler::pn, refill); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:641:73: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(tmp, G1CardTable::g1_young_card_val(), Assembler::equal, Assembler::pt, young_card); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/g1/g1BarrierSetAssembler_sparc.cpp:680:45: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(tmp3, G0, Assembler::equal, Assembler::pn, refill); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/gc/shared/cardTableBarrierSetAssembler_sparc.cpp:52:44: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_done); // zero count - nothing to do data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:1093:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. br(Assembler::equal, true, pn, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:1223:54: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_brx_short(mark_reg, temp_reg, Assembler::equal, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:1300:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, true, Assembler::pn, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:1360:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, verify_continue); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:2085:57: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_br_short(tmp1, Bytecodes::_invokedynamic, equal, pn, do_profile); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:2087:10: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. br(equal, false, pn, do_profile); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:2589:35: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_br_short(temp_reg, 0, equal, pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/interp_masm_sparc.cpp:2638:35: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_br_short(temp_reg, 0, equal, pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1521:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case Assembler::equal: return Assembler::rc_z; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1631:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. Assembler::cbcond(equal, icc, G0, G0, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1657:6: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. br(equal, true, pt, check_low_parts); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1677:9: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. movcc(equal, false, icc, 0, Rresult); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:1877:9: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. movcc(equal, false, xcc, 0, Rresult); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2141:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, L_found_method); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2282:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pn, *L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2314:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pn, *L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2318:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, *L_slow_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2328:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, *L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2338:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, *L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2398:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. br(Assembler::equal, false, Assembler::pn, *L_failure); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2482:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cond_inc(Assembler::equal, (address) counters->biased_lock_entry_count_addr(), mark_reg, temp_reg); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2486:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, true, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2608:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, allow_delay_slot_filling, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2684:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2724:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2790:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cond_inc(Assembler::equal, (address) counters->fast_path_entry_count_addr(), Rmark, Rscratch); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:2818:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cond_inc(Assembler::equal, (address) counters->fast_path_entry_count_addr(), Rmark, Rscratch); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:3899:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. br(Assembler::equal, true, Assembler::pn, Ldone); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:3931:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, true, Assembler::pn, Ldone); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4005:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, true, Assembler::pn, Ldone); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4070:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, false, Assembler::pt, target(Lloop)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4082:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. brx(Assembler::equal, true, Assembler::pt, target(Ldone)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4090:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. movcc(Assembler::equal, false, xcc, 1, result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4568:39: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_brx_short(G4, 0, Assembler::equal, Assembler::pt, L_crc32c_aligned); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4582:39: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_br_short(len, 0, Assembler::equal, Assembler::pn, L_crc32c_return); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4667:39: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_br_short(len, 0, Assembler::equal, Assembler::pt, L_crc32c_done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/macroAssembler_sparc.cpp:4705:39: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmp_and_br_short(len, 0, Assembler::equal, Assembler::pt, L_crc32c_return); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:94:56: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(temp_reg, temp2_reg, Assembler::equal, Assembler::pt, L_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:99:56: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(temp_reg, temp2_reg, Assembler::equal, Assembler::pt, L_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:114:50: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(temp, ref_kind, Assembler::equal, Assembler::pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:201:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(temp2, recv, Assembler::equal, Assembler::pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/methodHandles_sparc.cpp:243:59: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(O1_scratch, (int) iid, Assembler::equal, Assembler::pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:838:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, no_alternative_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:908:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pt, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1558:33: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_zero_and_br(Assembler::equal, G3_scratch, cont); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1620:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx(Assembler::equal, false, Assembler::pt, is_null); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1800:68: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(temp_reg, G5_inline_cache_reg, Assembler::equal, Assembler::pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1852:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, slowCase); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:1912:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(at) == 2) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:2266:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:2392:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(G3_scratch, 0, Assembler::equal, Assembler::pt, no_block); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:2461:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:3027:78: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(O1, Deoptimization::Unpack_uncommon_trap, Assembler::equal, Assembler::pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/sharedRuntime_sparc.cpp:3144:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ movcc(Assembler::equal, false, Assembler::ptr_cc, L1, saved_O7); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:247:60: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp(type, T_OBJECT); __ br(Assembler::equal, false, Assembler::pn, is_object); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:248:60: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ delayed()->cmp(type, T_FLOAT); __ br(Assembler::equal, false, Assembler::pn, is_float); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:249:60: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ delayed()->cmp(type, T_DOUBLE); __ br(Assembler::equal, false, Assembler::pn, is_double); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:250:60: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ delayed()->cmp(type, T_LONG); __ br(Assembler::equal, false, Assembler::pn, is_long); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1157:48: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1265:48: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1368:48: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1706:48: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1841:48: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:1973:48: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(count, 0, Assembler::equal, Assembler::pt, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2738:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, L_objArray); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2802:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, true, Assembler::pt, entry_jbyte_arraycopy); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2806:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, true, Assembler::pt, entry_jshort_arraycopy); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2810:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, true, Assembler::pt, entry_jint_arraycopy); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:2814:66: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(G3_elsize, LogBytesPerLong, Assembler::equal, Assembler::pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3104:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 44, Assembler::equal, Assembler::pt, L_doLast128bit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3115:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pt, L_storeOutput); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3229:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 60, Assembler::equal, Assembler::pn, L_expand256bit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3232:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pn, L_expand192bit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3412:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 44, Assembler::equal, Assembler::pt, L_cbcenc128); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3419:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pt, L_cbcenc192); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3749:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 60, Assembler::equal, Assembler::pn, L_expand256bit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3752:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pn, L_expand192bit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3848:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 44, Assembler::equal, Assembler::pn, L_dec_first_block128); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3851:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pn, L_dec_first_block192); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3917:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, L_cbcdec_end); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3921:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 60, Assembler::equal, Assembler::pn, L_dec_next2_blocks256); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:3924:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(keylen, 52, Assembler::equal, Assembler::pn, L_dec_next2_blocks192); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:5004:50: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. Assembler::Condition cf = (iseq ? Assembler::equal : Assembler::notEqual); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/stubGenerator_sparc.cpp:5038:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cbcond(Assembler::equal, Assembler::icc, G0, G0, next); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:127:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, LoadFloatArg); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:131:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, LoadDoubleArg); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:326:47: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(Gtemp, G0, Assembler::equal, Assembler::pn, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:338:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(Gtemp, G0, Assembler::equal, Assembler::pn, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:859:46: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(Otos_i, 0, Assembler::equal, Assembler::pn, slow_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:1342:65: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(G3_scratch, _thread_in_Java, Assembler::equal, Assembler::pt, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:1392:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(G3_scratch, 0, Assembler::equal, Assembler::pt, no_block); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateInterpreterGenerator_sparc.cpp:1972:33: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ breakpoint_trap(Assembler::equal, Assembler::icc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:97:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::equal : return Assembler::notEqual; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:98:58: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::not_equal : return Assembler::equal; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:145:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(temp_reg, 0, Assembler::equal, Assembler::pn, L_patch_done); // don't patch data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:170:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, L_okay); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:172:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, L_okay); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:277:69: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(O2, JVM_CONSTANT_UnresolvedClass, Assembler::equal, Assembler::pt, call_ldc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:280:76: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_brx_short(O2, JVM_CONSTANT_UnresolvedClassInError, Assembler::equal, Assembler::pn, call_ldc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:551:72: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(G3_scratch, (int)Bytecodes::_iload, Assembler::equal, Assembler::pn, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:554:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:558:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:803:75: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(G3_scratch, (int)Bytecodes::_getfield, Assembler::equal, Assembler::pn, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:808:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:814:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:820:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pn, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:1266:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, true, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:1866:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, true, Assembler::pn, found); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2104:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2194:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(G1_scratch, 0, Assembler::equal, Assembler::pt, Label1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2493:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(G4_scratch, 0, Assembler::equal, Assembler::pt, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2571:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, two_word); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2573:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, false, Assembler::pt, two_word); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2627:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(Lscratch, 0, Assembler::equal, Assembler::pt, notVolatile); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2853:51: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(Lscratch, 0, Assembler::equal, Assembler::pt, notVolatile); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:2883:49: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmp_and_br_short(Lscratch, 0, Assembler::equal, Assembler::pt, exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:3591:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, true, Assembler::pt, quicked); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:3649:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ br(Assembler::equal, true, Assembler::pt, quicked); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:3760:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx( Assembler::equal, false, Assembler::pn, exit ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/templateTable_sparc.cpp:3817:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ brx( Assembler::equal, true, Assembler::pt, found ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp:105:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(src_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp:120:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(src_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp:181:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_ext_sparc.cpp:193:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/sparc/vm_version_sparc.cpp:274:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(buf) >= 2, "must be"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1420:56: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: acond = Assembler::equal; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1430:56: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: acond = Assembler::equal; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1526:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *op->stub()->entry()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1690:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *obj_is_null); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1737:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *success_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1744:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *success_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1757:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *failure_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1771:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *failure_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1836:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1855:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *failure_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1976:52: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: acond = Assembler::equal; ncond = Assembler::notEqual; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1977:85: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_notEqual: acond = Assembler::notEqual; ncond = Assembler::equal; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1984:52: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. default: acond = Assembler::equal; ncond = Assembler::notEqual; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3135:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *stub->continuation()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3423:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3427:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3429:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, known_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3636:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3661:30: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, none); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3663:30: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, none); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3704:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3706:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3925:54: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case lir_cond_equal: acond = Assembler::equal; break; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp:72:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cond_inc32(Assembler::equal, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp:75:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:93:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:108:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:437:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:535:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:721:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, oop_empty); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:727:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, pc_empty); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:796:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, oop_empty); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:802:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, pc_empty); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:888:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:903:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:907:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jump_cc(Assembler::equal, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:927:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, oop_empty); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:933:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, pc_empty); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:963:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, cont); // no data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:1128:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:1530:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, return_min_jlong); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/frame_x86.inline.hpp:122:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. inline bool frame::equal(frame other) const { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:67:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, filtered); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:178:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:187:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:195:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, runtime); // If yes, goto runtime data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:286:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:291:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:306:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:310:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:319:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, runtime); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:432:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *stub->continuation()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:446:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *stub->continuation()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:483:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:555:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:559:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.cpp:126:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_already_dirty); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:168:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:176:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, runtime); // If yes, goto runtime data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:567:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:677:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_success); // fastpath, peeking into Step 5, no need to jump data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:757:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, is_null); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:821:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, is_null); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:909:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, is_null); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:940:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, is_null); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:981:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, *stub->continuation()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:73:19: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, none); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:75:19: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, none); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:187:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, do_profile); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:189:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, do_profile); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:268:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:300:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:906:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:1112:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, no_reserved_zone_enabling); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/interp_masm_x86.cpp:1365:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, verify_continue); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:187:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:604:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, special_case); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1173:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1312:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1330:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, check_abort); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1360:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, L_done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1519:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, DONE_LABEL); // all done if unlocked data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1617:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, DONE_LABEL) ; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1782:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cond_inc32(Assembler::equal, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1785:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, DONE_LABEL); // Success data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1795:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cond_inc32(Assembler::equal, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2537:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2566:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2723:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal , L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2730:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal , L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2745:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal , L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2752:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal , L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2885:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, special_case); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3034:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal , L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3041:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal , L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4590:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, found_method); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4689:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. local_jcc(Assembler::equal, *L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4712:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. local_jcc(Assembler::equal, *L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4715:28: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. local_jcc(Assembler::equal, *L_slow_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4723:28: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. local_jcc(Assembler::equal, *L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4731:28: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. local_jcc(Assembler::equal, *L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5506:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5528:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. cmovq(Assembler::equal, r, r12_heapbase); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5590:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5894:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6453:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, CHECK_NEXT); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6574:19: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, FOUND_SEQ_CHAR); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6667:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, LENGTH_DIFF_LABEL); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6672:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, LENGTH_DIFF_LABEL); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:7226:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, TRUE_LABEL); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8318:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, VECTOR8_LOOP); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8324:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, VECTOR16_LOOP); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8341:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, SAME_TILL_END); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8355:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, SAME_TILL_END); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8373:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, SAME_TILL_END); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8388:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, SAME_TILL_END); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8401:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, SAME_TILL_END); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:8512:19: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jccb(Assembler::equal, L_first_loop_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86.cpp:10062:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. _masm->jcc(Assembler::equal, _label); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:120:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, KEY_256); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:132:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, NO_PARTS); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:140:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, REMAINDER); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:214:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, END); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:331:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, KEY_256); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:342:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, NO_PARTS); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:350:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, REMAINDER); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:425:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, END); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:750:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, SAVE_STATE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:956:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, END); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:1239:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, STORE_CTR); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:304:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_2_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:414:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_7_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:560:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_10_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:865:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_3_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:302:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_4_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:309:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_5_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:590:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_4_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:310:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_7_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:336:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_7_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:595:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_8_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:626:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_8_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:322:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_7_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:352:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_7_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:622:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_8_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:653:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_8_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:981:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_6_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:993:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_9_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1039:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_9_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1158:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_13_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1160:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_14_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1171:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_15_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1178:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_16_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1202:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_19_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1235:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_26_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1253:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_24_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1282:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_24_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1290:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_29_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1318:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_31_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1333:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_35_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1338:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_35_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1347:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_9_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1356:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_37_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1359:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_28_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1378:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_35_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1505:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_39_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1509:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_42_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1525:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_41_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1541:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_22_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1561:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_45_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1585:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_48_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1721:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_45_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1790:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_13_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1792:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_14_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1818:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_54_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1828:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_47_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1839:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_55_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2698:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_8_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2710:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_7_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2718:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_11_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2764:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_7_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2772:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_11_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2893:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_16_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2895:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_17_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2910:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_19_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2918:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_20_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2941:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_23_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2974:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_30_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2992:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_28_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2998:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_18_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3020:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_28_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3028:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_33_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3068:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_38_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3073:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_38_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3082:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_11_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3091:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_40_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3094:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_32_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3113:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_38_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3245:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_42_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3249:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_45_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3265:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_44_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3281:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_26_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3301:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_48_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3330:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_51_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3467:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_48_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3536:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_16_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3538:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_17_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3570:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_58_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3593:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_50_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:800:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, done_hash); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:811:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, only_one_block); //je only_one_block data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:1359:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, done_hash); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:520:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_3_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:631:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_8_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:777:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_11_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1724:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_42); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1805:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_43); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1901:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_22); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1915:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_21); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1942:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_24); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1958:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_33); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1966:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_30); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2004:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_29); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2054:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_32); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2070:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_41); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2078:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_38); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2116:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_37); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2166:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_40); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2426:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_4_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:652:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_2_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:689:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_4_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:799:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_9_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:988:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_12_0_1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1140:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_39); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1222:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_40); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1336:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_20); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1386:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_23); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1405:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_31); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1412:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_27); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1510:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_30); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1528:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_38); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1535:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_34); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1633:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, B1_37); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:2119:18: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. jcc(Assembler::equal, L_2TAG_PACKET_4_0_2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:85:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:89:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:105:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:191:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/methodHandles_x86.cpp:236:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:174:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:525:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:974:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, skip_fixup); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1076:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, nil); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1098:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, skip); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1327:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, cont); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1401:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, is_null); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1612:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(at) == 2) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1766:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, hit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2053:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, lock_done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2181:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, Continue); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2221:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, reguard); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2247:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2362:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2399:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2887:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:3085:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, noException); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:533:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:822:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, no_alternative_target); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:961:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, ok); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:969:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, skip_fixup); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1172:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmovptr(Assembler::equal, rHandle, Address(rbp, reg2offset_in(src.first()))); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1208:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmovptr(Assembler::equal, rHandle, Address(rsp, offset)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1458:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, cont); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1536:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, is_null); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1925:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(at) == 2) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2074:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, hit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2126:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2411:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, lock_done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2522:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, Continue); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2563:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, reguard); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2585:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2691:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2731:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2976:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:3223:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:3419:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, noException); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:164:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, skip_ldmx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:177:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:235:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_skip); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:239:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_skip); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:253:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, is_long); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:255:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, is_float); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:257:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, is_double); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:336:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:484:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, ok_ret); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:523:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, ok_ret); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1325:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. LOCAL_JCC(Assembler::equal, L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1332:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. LOCAL_JCC(Assembler::equal, L_success); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1730:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L1); // this would be broken also data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1749:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_objArray); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1818:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jump_cc(Assembler::equal, RuntimeAddress(entry_jbyte_arraycopy)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1820:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jump_cc(Assembler::equal, RuntimeAddress(entry_jshort_arraycopy)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1822:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jump_cc(Assembler::equal, RuntimeAddress(entry_jint_arraycopy)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2198:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_doLast); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2207:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_doLast); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2296:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_doLast); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2305:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_doLast); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2574:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_multiBlock_loopTop[1]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2576:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_multiBlock_loopTop[2]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2640:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2791:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_key192_top); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2793:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_key256_top); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2866:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:287:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, skip_ldmx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:302:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:342:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, is_long); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:344:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, is_long); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:346:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, is_float); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:348:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, is_double); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:363:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:368:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:372:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L3); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:453:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:458:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:462:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L3); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:785:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, ok_ret); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:1151:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2375:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2677:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L1); // this would be broken also data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2695:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_objArray); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2780:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3075:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_doLast); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3084:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_doLast); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3167:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_doLast); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3176:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, L_doLast); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3471:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_multiBlock_loopTopHead[1]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3473:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_multiBlock_loopTopHead[2]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3586:25: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4100:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_multiBlock_loopTop[1]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4102:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_multiBlock_loopTop[2]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4964:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_processdata); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:900:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1031:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1072:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, push_double); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1125:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, Continue); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1474:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:133:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::equal : return Assembler::notEqual; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:134:56: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. case TemplateTable::not_equal : return Assembler::equal; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:231:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_okay); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:233:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_okay); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:374:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, call_ldc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:379:22: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, call_ldc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:637:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:642:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:647:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:946:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:952:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:958:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:964:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, rewrite); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:2119:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, done); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:2497:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, found); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:2740:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:3068:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmovptr(Assembler::equal, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:3071:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmovptr(Assembler::equal, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:3075:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, two_word); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:3077:26: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, two_word); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4184:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, quicked); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4247:21: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, quicked); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4388:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ cmovptr(Assembler::equal, rmon, rtop); // cmov => cmovptr data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4392:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, exit); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/templateTable_x86.cpp:4481:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, found); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:181:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, cpu486); // if cpuid doesn't support an input data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:503:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((_cpuid_info.std_cpuid1_edx.value & flag) && strlen(_feature_edx_id[fi]) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:509:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((_cpuid_info.std_cpuid1_ecx.value & flag) && strlen(_feature_ecx_id[fi]) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:515:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((_cpuid_info.ext_cpuid1_ecx.value & flag) && strlen(_feature_extended_ecx_id[fi]) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:521:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((_cpuid_info.ext_cpuid1_edx.value & flag) && strlen(_feature_extended_edx_id[fi]) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:616:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, cpu_type_desc, cpu_desc_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:632:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, cpu_detailed_desc_buffer, cpu_detailed_desc_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:140:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, cpu486); // if cpuid doesn't support an input data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:173:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, std_cpuid4); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:189:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, std_cpuid4); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:211:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, std_cpuid1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:354:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jccb(Assembler::equal, start_simd_check); // return if AVX is not supported data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:390:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, legacy_setup); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:480:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, legacy_save_restore); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:559:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_wrapup); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vm_version_x86.cpp:561:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L_wrapup); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp:129:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp:241:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp:120:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp:237:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. __ jcc(Assembler::equal, L2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:224:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(fieldbuf, "next_frame", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:228:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(fieldbuf, "frame_type", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:230:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(valuebuf, "ENTRY_FRAME", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:232:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(valuebuf, "INTERPRETER_FRAME", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:234:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(valuebuf, "FAKE_STUB_FRAME", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:260:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(fieldbuf, "call_wrapper", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:290:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). field[strlen(field) - 1] == ')' ? "(": "", field); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/frame_zero.cpp:293:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(fieldbuf, "(vtable for istate)", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.cpp:78:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/cpu/zero/vm_version_ext_zero.cpp:88:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:78:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_path, path, UNIX_PATH_MAX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:291:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = read(s, buf+off, left); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:308:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(buf) != strlen(ver_str)) || data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:308:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(buf) != strlen(ver_str)) || data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:312:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_fully(s, msg, strlen(msg)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:334:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || strlen(name) > AttachOperation::name_length_max) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:345:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg) > AttachOperation::arg_length_max) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/attachListener_aix.cpp:442:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int rc = AixAttachListener::write_fully(this->socket(), msg, strlen(msg)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/loadlib_aix.cpp:249:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ldi->ldinfo_filename + strlen(ldi->ldinfo_filename) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:588:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *ld_library_path = (char *)NEW_C_HEAP_ARRAY(char, strlen(v) + 1 + sizeof(DEFAULT_LIBPATH) + 1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1213:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = ::strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1217:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(buf, s, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1326:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!filename || strlen(filename) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1327:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. ::strncpy(ebuf, "dll_load: empty filename specified", ebuflen - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1503:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Power PC 9", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1506:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Power PC 8", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1509:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Power PC 7", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1512:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Power PC 6 DD1.x", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1515:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Power PC 6", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1518:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Power PC 5", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1521:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Power PC 5_2", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1524:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Power PC 5_3", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1527:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "PV_5_Compat", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1530:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "PV_6_Compat", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1533:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "PV_7_Compat", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1536:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "PV_8_Compat", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1539:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "PV_9_Compat", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1542:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "unknown", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1602:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *p = buf + strlen(buf) - 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1629:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1639:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:1652:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(saved_jvm_path, buf, sizeof(saved_jvm_path)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:2499:13: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. ::usleep(1000); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:2616:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t os::read(int fd, void *buf, unsigned int nBytes) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:2617:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return ::read(fd, buf, nBytes); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3250:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3719:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:3748:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) > MAX_PATH - 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4092:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(uts.sysname, "?"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4329:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.cpp:4339:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/os_aix.inline.hpp:107:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE( (size_t) ::read(fd, buf, (size_t) nBytes), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:159:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:159:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:159:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:574:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:624:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:629:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:629:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:631:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(usrdir_name, "/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:663:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:663:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:666:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(filename, "/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:689:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:721:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(dirname) + UINT_CHARS + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:1161:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (user == NULL || strlen(user) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/perfMemory_aix.cpp:1193:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:246:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(p_name, demangled_name, namelen-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:253:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(p_name, "<nameless function>", namelen-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/aix/porting_aix.cpp:274:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(p_name, lm.shortname, namelen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:75:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_path, path, UNIX_PATH_MAX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:268:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(s, buf+off, left), n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:285:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(buf) != strlen(ver_str)) || data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:285:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(buf) != strlen(ver_str)) || data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:289:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_fully(s, msg, strlen(msg)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:311:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || strlen(name) > AttachOperation::name_length_max) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:322:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg) > AttachOperation::arg_length_max) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/attachListener_bsd.cpp:413:64: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int rc = BsdAttachListener::write_fully(this->socket(), msg, strlen(msg)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/decoder_machO.cpp:101:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, symname, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:414:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(v) + 1 + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:415:94: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sizeof(SYS_EXT_DIR) + sizeof("/lib/") + strlen(cpu_arch) + sizeof(DEFAULT_LIBPATH) + 1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:435:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t system_ext_size = strlen(user_home_dir) + sizeof(SYS_EXTENSIONS_DIR) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:507:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(v) + 1 + strlen(l) + 1 + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:507:70: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(v) + 1 + strlen(l) + 1 + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1118:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = ::strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1122:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(buf, s, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1321:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(ebuf, error_report, ebuflen-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1352:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(ebuf, error_report, ebuflen-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1358:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int diag_msg_max_length=ebuflen-strlen(ebuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1359:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* diag_msg_buf=ebuf+strlen(ebuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1376:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (::read(file_descriptor, &elf_head,sizeof(elf_head)))); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1606:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(os, "Darwin", sizeof(os)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1608:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(os, "OpenBSD", sizeof(os)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1610:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(os, "BSD", sizeof(os)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1619:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(release, "", sizeof(release)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1660:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(model, cpu_arch, sizeof(model)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1667:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant character. strncpy(machine, "", sizeof(machine)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1753:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *p = buf + strlen(buf) - 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1777:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1788:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1800:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:1813:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(saved_jvm_path, buf, MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:2383:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t os::read(int fd, void *buf, unsigned int nBytes) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:2384:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE_RETURN_INT(::read(fd, buf, nBytes)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3101:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3543:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3592:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) > MAX_PATH - 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.cpp:3971:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_bsd.inline.hpp:109:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE( (size_t) ::read(fd, buf, (size_t) nBytes), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:325:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/os_perf_bsd.cpp:458:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name_buf, sockaddr->sdl_data, name_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:490:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:542:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:547:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:547:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:549:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(usrdir_name, "/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:569:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:569:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:572:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(filename, "/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:595:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:627:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(dirname) + UINT_CHARS + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:1073:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (user == NULL || strlen(user) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/bsd/perfMemory_bsd.cpp:1105:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:76:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_path, path, UNIX_PATH_MAX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:268:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(s, buf+off, left), n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:285:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(buf) != strlen(ver_str)) || data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:285:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(buf) != strlen(ver_str)) || data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:289:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write_fully(s, msg, strlen(msg)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:311:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || strlen(name) > AttachOperation::name_length_max) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:322:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg) > AttachOperation::arg_length_max) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/attachListener_linux.cpp:413:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int rc = LinuxAttachListener::write_fully(this->socket(), msg, strlen(msg)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:67:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, _mount_point, MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:70:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buflen = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:71:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((buflen + strlen(cgroup_path)) > (MAXPATHLEN-1)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:74:13: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(buf, cgroup_path, MAXPATHLEN-buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:80:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, _mount_point, MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:86:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cgroup_path) > strlen(_root)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:86:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cgroup_path) > strlen(_root)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:88:17: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, _mount_point, MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:90:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buflen = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:91:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((buflen + strlen(cgroup_path) - strlen(_root)) > (MAXPATHLEN-1)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:91:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((buflen + strlen(cgroup_path) - strlen(_root)) > (MAXPATHLEN-1)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:94:17: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(buf, cgroup_path + strlen(_root), MAXPATHLEN-buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:94:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(buf, cgroup_path + strlen(_root), MAXPATHLEN-buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:175:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(file, c->subsystem_path(), MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:177:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int filelen = strlen(file); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:178:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((filelen + strlen(filename)) > (MAXPATHLEN-1)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/osContainer_linux.cpp:182:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(file, filename, MAXPATHLEN-filelen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:238:9: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = fgetc(f); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:475:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(v) + 1 + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1037:18: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int ch = fgetc(fp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1528:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = ::strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1532:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(buf, s, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1553:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (filename == NULL || strlen(filename) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1788:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int diag_msg_max_length=ebuflen-strlen(ebuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1789:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* diag_msg_buf=ebuf+strlen(ebuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1806:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (::read(file_descriptor, &elf_head,sizeof(elf_head)))); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:1953:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(ebuf, error_report, ebuflen-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2016:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((bytes = ::read(fd, buf, sizeof(buf)-1)) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2193:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(distro, ptr, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2199:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(distro, ptr, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2205:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(distro, buf, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2212:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(distro, buf, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2238:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Debian ", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2243:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Linux", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2497:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *ptr = start + strlen(search_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2498:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *end = buf + strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2510:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cpuinfo, ptr, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2522:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "AArch64", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2524:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "x86_64", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2526:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "ARM", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2528:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "x86_32", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2530:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "IA64", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2532:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "PPC64", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2534:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "S390", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2536:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "sparcv9", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2538:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cpuinfo, ZERO_LIBARCH, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2540:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(cpuinfo, "unknown", length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2602:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *p = buf + strlen(buf) - 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2629:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2639:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:2652:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(saved_jvm_path, buf, MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:3735:20: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int ch = fgetc(fp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:4281:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t os::read(int fd, void *buf, unsigned int nBytes) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:4282:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return ::read(fd, buf, nBytes); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:4970:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5587:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:5615:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) > MAX_PATH - 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6008:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t ret = ::read(core_pattern_file, core_pattern, core_pattern_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6064:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t ret = ::read(core_uses_pid_file, &core_uses_pid, 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6074:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.cpp:6078:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_linux.inline.hpp:101:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE( (size_t) ::read(fd, buf, (size_t) nBytes), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/os_perf_linux.cpp:989:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t num_bytes = read(fd, buf, sizeof(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:163:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(tmpdir) == 4, "No longer using /tmp - update buffer size"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:171:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:171:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:171:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:503:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:540:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(tmpdirname) == 4, "No longer using /tmp - update buffer size"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:568:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:573:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:573:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:575:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(usrdir_name, "/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:607:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:607:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:610:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(filename, "/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:633:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:674:18: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int ch = fgetc(fp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:708:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(dirname) + UINT_CHARS + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:1155:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (user == NULL || strlen(user) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/linux/perfMemory_linux.cpp:1187:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:171:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fullname_len = strlen(dir) + strlen(name_template); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:171:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fullname_len = strlen(dir) + strlen(name_template); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:501:19: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). mode_t umsk = ::umask(0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:502:5: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). ::umask(umsk); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:626:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefix_len = strlen(JNI_LIB_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:627:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t suffix_len = strlen(JNI_LIB_SUFFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:631:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = strlen(lib_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:637:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(lib_name) <= (prefix_len + suffix_len)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:641:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = strlen(lib_name) - suffix_len; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:644:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (lib_name != NULL ? name_len : 0) + strlen(sym_name) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:651:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(agent_entry_name, "_"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:652:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(agent_entry_name, lib_name, name_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:985:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(out, ret, outlen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1095:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buffer, "none", size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1127:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(p); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/posix/os_posix.cpp:1437:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(p) < outbuflen) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:82:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_door_path, path, PATH_MAX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:260:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || strlen(name) > AttachOperation::name_length_max) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:271:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg) > AttachOperation::arg_length_max) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/attachListener_solaris.cpp:555:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int rc = write_fully(this->socket(), msg, strlen(msg)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:648:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t library_path_size = info->dls_size + strlen(common_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:675:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). library_path[strlen(library_path)-1] = '\0'; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1557:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(ebuf, error_report, ebuflen-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1564:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int diag_msg_max_length=ebuflen-strlen(ebuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1565:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* diag_msg_buf=ebuf+strlen(ebuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1582:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (::read(file_descriptor, &elf_head,sizeof(elf_head)))); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1711:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((bytes = ::read(fd, buf, sizeof(buf))) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1752:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "Solaris", buflen); // default to plain solaris data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1764:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, ptr, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1789:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((ret = ::read(fd, mbuff, read_chunk*sizeof(prmap_t))) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1871:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1977:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *p = buf + strlen(buf) - 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:1999:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2009:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2021:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(saved_jvm_path, buf, MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2042:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = ::strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2046:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(buf, s, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2907:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t os::read(int fd, void *buf, unsigned int nBytes) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2912:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(::read(fd, buf, (size_t) nBytes), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2929:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(::read(fd, buf, (size_t) nBytes), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:2938:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep((ms * 1000)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:3565:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:4365:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) > MAX_PATH - 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:5456:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/os_solaris.cpp:5466:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:161:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:161:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:161:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:478:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:530:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:535:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:535:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:537:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(usrdir_name, "/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:569:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:569:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:572:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(filename, "/"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:595:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:632:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(::read(fd, addr, remaining), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:675:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(dirname) + UINT_CHARS + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:1100:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (user == NULL || strlen(user) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/solaris/perfMemory_solaris.cpp:1132:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:139:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(pipe) <= pipe_name_max, "exceeds maximum length of pipe name"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:193:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(cmd) > AttachOperation::name_length_max) return ATTACH_ERROR_ILLEGALARG; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:194:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg0) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:195:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg1) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:196:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg2) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:197:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(pipename) > Win32AttachOperation::pipe_name_max) return ATTACH_ERROR_ILLEGALARG; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/attachListener_windows.cpp:331:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fSuccess = write_pipe(hPipe, msg, (int)strlen(msg)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:364:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(counter) < sizeof(counter), "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:478:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t full_counter_path_len = strlen(object_name) + strlen(counter_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:478:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t full_counter_path_len = strlen(object_name) + strlen(counter_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:491:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_counter_path_len += strlen(image_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:500:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_counter_path_len += strlen(instance); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:521:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). full_counter_path_len += strlen(instance); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:605:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:610:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(cheap_allocated_string, string, len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:691:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t pdh_IDProcess_counter_fmt_len = strlen(process_image_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:692:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pdh_IDProcess_counter_fmt_len += strlen(pdh_localized_process_object); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:693:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pdh_IDProcess_counter_fmt_len += strlen(pdh_localized_IDProcess_counter); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:768:80: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (count = 0, tmp = const_cast<char*>(instances); *tmp != '\0'; tmp = &tmp[strlen(tmp) + 1], count++); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:819:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t counter_len = strlen(processor); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:820:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). counter_len += strlen(counter_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:826:80: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (index = 0, tmp = const_cast<char*>(instances); *tmp != '\0'; tmp = &tmp[strlen(tmp) + 1], index++) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_perf_windows.cpp:827:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t tmp_len = strlen(tmp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:198:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(home_dir, alt_home_dir, MAX_PATH + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:215:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). home_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + 1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:223:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dll_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + strlen(bin) + 1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:223:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dll_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + strlen(bin) + 1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:257:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sizeof(BIN_DIR) + (path_str ? strlen(path_str) : 0) + 10, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:266:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(library_path, ";"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:271:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(library_path, ";"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:275:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(library_path, ";"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:279:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(library_path, ";"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1132:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirp->path = (char *)malloc(strlen(dirname) + 5, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1380:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(ebuf, "Can't find dependent libraries", ebuflen - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1403:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (os::read(fd, (void*)&signature_offset, sizeof(signature_offset)))) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1412:32: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). (sizeof(lib_arch) != (os::read(fd, (void*)&lib_arch, sizeof(lib_arch)))) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1634:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MAX_PATH - (UINT)strlen("\\kernel32.dll") - 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1640:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(kernel32_path, "\\kernel32.dll", MAX_PATH - ret); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1754:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "## __CPU__", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1759:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(buf, "## __CPU__", buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1885:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(java_home_var) < (size_t)buflen) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1886:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, java_home_var, buflen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1890:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1896:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1904:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(saved_jvm_path, buf, MAX_PATH); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1951:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:1953:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, s, n); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:2992:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fullname_len = strlen(dir) + strlen(name_template); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:2992:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fullname_len = strlen(dir) + strlen(name_template); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4020:5: [1] (buffer) fgetc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). fgetc(stdin); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4321:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t buf_len = 1 + MAX2((size_t)3, strlen(path)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4323:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, path, buf_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4347:25: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefix_len = wcslen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4348:51: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t result_len = prefix_len - prefix_off + wcslen(converted_path) + additional_space + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4353:18: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result_len = wcslen(result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4527:17: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (wide_path[wcslen(wide_path) - 1] == L'\\') { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:4528:5: [1] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Risk is low because the source is a constant character. wcscat(wide_path, L"*"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5329:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(cmd) + strlen(cmd_prefix) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5329:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(cmd) + strlen(cmd_prefix) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5381:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(buf) < sizeof(buf) - 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5522:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5566:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefix_len = strlen(JNI_LIB_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5567:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t suffix_len = strlen(JNI_LIB_SUFFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5571:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = name_len = strlen(lib_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5586:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = strlen(lib_name) - suffix_len; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5589:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (lib_name != NULL ? name_len : 0) + strlen(sym_name) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5598:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(agent_entry_name, sym_name, (p - sym_name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5601:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(agent_entry_name, "_"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5602:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(agent_entry_name, lib_name, name_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5607:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(agent_entry_name, "_"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.cpp:5608:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(agent_entry_name, lib_name, name_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.inline.hpp:77:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline size_t os::read(int fd, void *buf, unsigned int nBytes) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.inline.hpp:78:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return ::read(fd, buf, nBytes); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/os_windows.inline.hpp:82:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return ::read(fd, buf, nBytes); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:162:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:162:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:162:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:278:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (user == NULL || strlen(user) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:287:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* user_name = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:325:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:330:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:330:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:332:5: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(usrdir_name, "\\"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:362:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:362:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:365:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(filename, "\\"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:398:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). latest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:448:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nbytes = (int)strlen(PERFDATA_NAME) + (int)strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:448:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int nbytes = (int)strlen(PERFDATA_NAME) + (int)strlen(user) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:469:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(dirname) + UINT_CHARS + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:486:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(dirname) + strlen(filename) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:486:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nbytes = strlen(dirname) + strlen(filename) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:490:3: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(path, "\\"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:563:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(root_path, path, len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:568:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(root_path) >= 3, "device specifier too short"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1096:39: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). DWORD umask, DWORD emask, DWORD amask) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1102:18: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). aces[0].mask = umask; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1172:50: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). return make_user_everybody_admin_security_attr(umask, emask, amask); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1193:50: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). return make_user_everybody_admin_security_attr(umask, emask, amask); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1214:50: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). return make_user_everybody_admin_security_attr(umask, emask, amask); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1607:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (user == NULL || strlen(user) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1640:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/perfMemory_windows.cpp:1641:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* robjectname = NEW_RESOURCE_ARRAY(char, strlen(objectname) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:212:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(directory); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:237:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(directory); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:242:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len_now = strlen(p); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:465:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(buf, pSymbol->Name, buflen - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os/windows/symbolengine.cpp:605:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). ::strncpy(buf, p, buflen - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/aix_ppc/prefetch_aix_ppc.inline.hpp:32:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read(void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_x86/prefetch_bsd_x86.inline.hpp:31:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read (void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/bsd_zero/prefetch_bsd_zero.inline.hpp:31:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read(void* loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_aarch64/prefetch_linux_aarch64.inline.hpp:32:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read (void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_arm/prefetch_linux_arm.inline.hpp:30:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read (void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_ppc/prefetch_linux_ppc.inline.hpp:32:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read(void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_s390/prefetch_linux_s390.inline.hpp:31:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read(void* loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/prefetch_linux_sparc.inline.hpp:30:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read(void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:43:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(line) < sizeof(line) - 1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_sparc/vm_version_linux_sparc.cpp:341:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_x86/prefetch_linux_x86.inline.hpp:31:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read (void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/linux_zero/prefetch_linux_zero.inline.hpp:31:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read(void* loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_sparc/prefetch_solaris_sparc.inline.hpp:35:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read(void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/solaris_x86/prefetch_solaris_x86.inline.hpp:35:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read (void *loc, intx interval) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/os_cpu/windows_x86/prefetch_windows_x86.inline.hpp:30:23: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline void Prefetch::read (void *loc, intx interval) {} data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:213:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* buf = (char*) malloc(strlen(instr->_ident) + 4); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:2861:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* ec_name = (char*) malloc(strlen(inst._ident) + strlen(prefix) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:2861:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* ec_name = (char*) malloc(strlen(inst._ident) + strlen(prefix) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:2956:69: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3065:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3234:73: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3332:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* ec_name = (char*) malloc(strlen(inst._ident) + strlen(prefix) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3332:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* ec_name = (char*) malloc(strlen(inst._ident) + strlen(prefix) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3665:9: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. char *equal; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:3736:40: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. Interface *inter = new CondInterface(equal, equal_format, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4465:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* result = (char *)malloc(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4465:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* result = (char *)malloc(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4465:75: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* result = (char *)malloc(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4528:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (pre_skip_ptr+strlen(pre_skip_ptr) != _ptr+strlen(_ptr)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4528:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (pre_skip_ptr+strlen(pre_skip_ptr) != _ptr+strlen(_ptr)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4554:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* result = (char *)malloc(strlen(location) + strlen(token2) + strlen(end_loc) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4554:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* result = (char *)malloc(strlen(location) + strlen(token2) + strlen(end_loc) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4554:71: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* result = (char *)malloc(strlen(location) + strlen(token2) + strlen(end_loc) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4588:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(start) > 24) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4590:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, start, 20); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:4652:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* buf = (char*) malloc(strlen(param) + 3); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5062:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( _ptr >= _curline && _ptr < _curline+strlen(_curline), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5260:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* location = (char *)malloc(strlen(file) + 100); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5314:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (eol == NULL) eol = cp + strlen(cp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/adlparse.cpp:5366:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* end = token + strlen(token); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:36:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *upper = new char[strlen(str)+1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:38:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char *end = str + strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:811:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = (int)strlen(rc_name) + (int)strlen(mask) + 5; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:811:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = (int)strlen(rc_name) + (int)strlen(mask) + 5; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:904:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = (int)strlen(stack_or) + (int)strlen(reg_mask_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/archDesc.cpp:904:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = (int)strlen(stack_or) + (int)strlen(reg_mask_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:561:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(shared_pred_loc, shared_pred_var, strlen(shared_pred_var)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:561:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(shared_pred_loc, shared_pred_var, strlen(shared_pred_var)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/dfa.cpp:754:5: [1] (buffer) sprintf: Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or vsnprintf. Risk is low because the source is a constant character. sprintf( string_buffer, "0"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1522:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, "("); s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1522:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(s, "("); s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1523:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, _predicate->_pred, buflen - strlen(s) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1523:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncpy(s, _predicate->_pred, buflen - strlen(s) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1524:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1525:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s, ")"); s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1525:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(s, ")"); s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1535:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1539:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1541:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1542:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(s," == "); s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1544:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1545:7: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(s,")"); s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1545:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strcpy(s,")"); s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:1550:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert( strlen(buf) < sizeof(buf), "String buffer overflow" ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:2793:42: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. CondInterface::CondInterface(const char* equal, const char* equal_format, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:2802:12: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. _equal(equal), _equal_format(equal_format), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3432:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cnt = _lChild->build_instr_pred( buf+strlen(buf), name, cnt ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3437:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cnt = _rChild->build_instr_pred( buf+strlen(buf), name, cnt ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3457:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(_opType) + 4; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3462:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += (int)strlen(lstr) + (int)strlen(rstr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3462:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += (int)strlen(lstr) + (int)strlen(rstr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.cpp:3880:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* buf = (char*) malloc(strlen(instr_ident) + 4); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/formssel.hpp:820:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. CondInterface(const char* equal, const char* equal_format, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:96:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:100:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AD._HPP_file._name = s; s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:103:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AD._VM_file._name = s; s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:108:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:119:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:129:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:446:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ep = fname + strlen(fname) - 1; // start at last character and look for '.' data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:457:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(base) + (int)strlen(suffix) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/main.cpp:457:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(base) + (int)strlen(suffix) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:188:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). templen += 10 + (int)strlen(tmppipeopnd->_stage); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:270:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int stagelen = (int)strlen(pipeline->_stages.name(res_stages[i]-1)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:275:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). commentlen += (int)strlen(pipeline->_reslist.name(i)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:289:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). resname, max_stage - (int)strlen(resname) + 1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:350:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). commentlen += (int)strlen(pipeline->_reslist.name(i)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:430:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)(strlen(pipeline_use_cycle_mask) + (int)strlen(pipeline_use_element) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:430:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)(strlen(pipeline_use_cycle_mask) + (int)strlen(pipeline_use_element) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:523:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(resource_mask) > 0) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:764:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). resourcenamelen += (int)strlen(resourcename)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:890:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(pipeline_res_masks.name(pipeline_res_mask_index)) > 0) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1175:11: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(left_reg_index, ""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:1188:13: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(right_reg_index, ""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:3283:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int ident_len = (int)strlen(instr->_ident); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_c.cpp:3932:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp("MachCall", inst->mach_base_class(_globalNames), strlen("MachCall"))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:89:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (int j = 0; j < 20-(int)strlen(reg_def->_regname); j++) fprintf(fp_hpp, " "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:140:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(reg_def->_regname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:151:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (size_t i = strlen(reg_def->_regname); i < maxlen; i++) fprintf(fp_hpp, " "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:1361:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if( equal != NULL ) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:1362:67: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. define_oper_interface(fp, *oper, _globalNames, "equal", equal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:2220:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int stagelen = (int)strlen("undefined"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:2226:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(stage); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/adlc/output_h.cpp:2257:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(resource); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotCodeHeap.cpp:636:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int klass_len = (int)strlen(klass_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/aot/aotLoader.cpp:143:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int len = (int)strlen(AOTLibrary); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/c1/c1_Runtime1.cpp:649:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(len < strlen("Index %d out of bounds for length %d"), "Must allocate more space for message."); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciInstanceKlass.hpp:252:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return is_in_package(packagename, (int) strlen(packagename)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArrayKlass.cpp:126:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name+pos, (char*)element_name->base(), element_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciObjArrayKlass.cpp:139:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name+pos, (char*)element_name->base(), element_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:182:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int read; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:183:38: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (sscanf(_bufptr, "%i%n", &v, &read) != 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:186:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). _bufptr += read; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:197:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int read; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:198:50: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (sscanf(_bufptr, INTPTR_FORMAT "%n", &v, &read) != 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:201:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). _bufptr += read; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:308:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* sym = SymbolTable::lookup(str, (int)strlen(str), CHECK_NULL); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:317:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* klass_name = SymbolTable::lookup(str, (int)strlen(str), CHECK_NULL); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:343:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* klass_name = SymbolTable::lookup(klass, (int)strlen(klass), CHECK_NULL); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:372:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(_stream); // get next char data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:379:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(_stream); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:392:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = getc(_stream); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:471:13: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = getc(_stream); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:772:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* name = SymbolTable::lookup(field_name, (int)strlen(field_name), CHECK); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/ci/ciReplay.cpp:773:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* sig = SymbolTable::lookup(field_signature, (int)strlen(field_signature), CHECK); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:312:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). utf8_length = (u2) strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5238:11: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(sig, signature, newlen); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileParser.cpp:5835:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int host_pkg_len = (int)strlen(host_pkg_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.cpp:59:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t source_len = strlen(src); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classFileStream.cpp:61:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(source_copy, src, source_len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:74:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _line_len = (int)strlen(_line); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:91:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(_line); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classListParser.cpp:194:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(option_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:155:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t str_len = strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:156:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t str_to_find_len = strlen(str_to_find); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:173:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t str_len = strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:174:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t str_to_find_len = strlen(str_to_find); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:234:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pkg_name, class_name_ptr, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:254:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* copy = NEW_C_HEAP_ARRAY(char, strlen(dir)+1, mtClass); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:263:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:263:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:263:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:275:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t num_read = os::read(file_handle, (char*) buffer, st.st_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:298:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *copy = NEW_C_HEAP_ARRAY(char, strlen(zip_name)+1, mtClass); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:376:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t entry_name_len = strlen(version_entry) + 10 + strlen(name) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:376:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t entry_name_len = strlen(version_entry) + 10 + strlen(name) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:465:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:467:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((char *)_name, name, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:628:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) < 256) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:680:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(class_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:691:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, &class_path[start], end - start); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:764:70: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* const module_sym = SymbolTable::lookup(module_name, (int)strlen(module_name), CHECK); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:769:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(class_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:779:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, &class_path[start], end - start); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:822:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(class_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:842:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, &class_path[start], end - start); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:892:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(home) + strlen(module_name) + 10; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:892:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(home) + strlen(module_name) + 10; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:953:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msg = NEW_RESOURCE_ARRAY_IN_THREAD(thread, char, strlen(path) + 128); ; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:954:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jio_snprintf(msg, strlen(path) + 127, "error in opening JAR file %s", path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:956:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)(strlen(path) + strlen(error_msg) + 128); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:956:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)(strlen(path) + strlen(error_msg) + 128); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1261:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol package_sym = SymbolTable::new_symbol(name, (int)strlen(name), CHECK_NULL); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1324:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert((int)strlen(class_name) == class_name_len, "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1332:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(file_name, class_name, class_name_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1333:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&file_name[class_name_len], class_suffix, sizeof(class_suffix)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1852:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* orig_copy = NEW_RESOURCE_ARRAY_IN_THREAD(THREAD, char, strlen(orig)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:1859:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(out, orig, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:2039:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoader.cpp:2042:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, name, sizeof(buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:129:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *manifest_size = (jint)strlen(manifest); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:135:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int tag_len = (int)strlen(tag); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:184:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (cp_attr != NULL && strlen(cp_attr) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:199:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* end = file_start + strlen(file_start); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/classLoaderExt.cpp:210:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t name_len = strlen(file_start); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/compactHashtable.cpp:376:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(ver); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp:40:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* const end = deopt_path + strlen(deopt_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp:58:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s[0] == '-' && strncmp(s+1, ik->external_name(), strlen(s+1)) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/dcevmDeoptExclude.cpp:61:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(s, ik->external_name(), strlen(s)) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.cpp:62:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaAssertions.cpp:165:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(classname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:151:61: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol name = SymbolTable::probe(name_string, (int)strlen(name_string)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:562:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(result_length == (int)strlen(result) + 1, "must match"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:1438:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int siglen = (int) strlen(sigstr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2187:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int buf_len = (int)strlen(klass_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2190:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_len += (int)strlen(method_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2196:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_len += (int)strlen(source_file_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2203:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_len += (int)strlen(module_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2206:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_len += (int)strlen(module_version); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2219:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf + (int)strlen(buf), "%s@%s/", module_name, module_version); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2221:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf + (int)strlen(buf), "%s/", module_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2236:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf + (int)strlen(buf), "%s:%d)", source_file_name, line_number); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2239:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf + (int)strlen(buf), "%s)", source_file_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2242:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf + (int)strlen(buf), "Unknown Source)"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/javaClasses.cpp:2246:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(buf + (int)strlen(buf), "(nmethod " INTPTR_FORMAT ")", (intptr_t)nm); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:54:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(module_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:60:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(package_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:337:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t pkg_len = strlen(package_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:339:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(pkg_name, package_name, pkg_len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:343:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:343:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:343:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/modules.cpp:659:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(package_name) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:54:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). write(path, strlen(path) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:76:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bool SharedPathsMiscInfo::read(void* ptr, size_t size) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:125:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _cur_ptr += strlen(path) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:156:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t path_sep_len = strlen(os::path_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:160:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t image_name_len = strlen(MODULES_IMAGE_NAME); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:206:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t dp_len = strlen(dp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:207:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t rp_len = strlen(rp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:243:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.cpp:246:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t appcp_len = strlen(appcp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp:66:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bool read(void* ptr, size_t size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp:155:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(ptr, sizeof(jint)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp:158:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(ptr, sizeof(long)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/sharedPathsMiscInfo.hpp:161:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(ptr, sizeof(time_t)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:443:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* result = SymbolTable::lookup_only((char*)name, (int)strlen(name), hash); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.cpp:452:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return table->basic_add(index, (u1*)name, (int)strlen(name), hash, false, THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.hpp:224:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return new_symbol(name, (int)strlen(name), THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/symbolTable.hpp:256:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). static void read(const char* filename, TRAPS); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.cpp:592:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). create_temporary_symbol(sig, (int)strlen(sig), THREAD)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.cpp:2979:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (int)strlen(component_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/verifier.cpp:2993:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = (int)strlen(component_name) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:65:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t skiplen = strlen(string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:88:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string += strlen(string); // skip string body data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:178:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string += strlen(string); // skip string body data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:304:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* symbol = SymbolTable::probe(symbol_name, (int) strlen(symbol_name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/classfile/vmSymbols.cpp:877:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). string += strlen(string); // skip string body data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.cpp:181:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(name1) + strlen(name2) < sizeof(stub_id), ""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeBlob.cpp:181:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(name1) + strlen(name2) < sizeof(stub_id), ""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp:2231:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLen += (unsigned int)strlen(text1); // text1 is much shorter than MAX_INT chars. data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/codeHeapState.cpp:2234:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lineLen += (unsigned int)strlen(text2); // text2 is much shorter than MAX_INT chars. data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp:67:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline u_char read() { return _buffer[_position++]; } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp:108:60: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). jboolean read_bool() { return (jboolean) read(); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp:109:60: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). jbyte read_byte() { return (jbyte ) read(); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/code/compressedStream.hpp:112:54: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). jint read_int() { jint b0 = read(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:89:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) comp_name, strlen(comp_name), \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:101:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) comp_name, strlen(comp_name), \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2011:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). remaining_log = remaining_log + strlen(remaining_log); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2348:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_last_method_compiled, method_name, CompileBroker::name_buffer_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2356:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t s1len = strlen(class_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.cpp:2357:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t s2len = strlen(method_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileBroker.hpp:63:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_current_method, method, (size_t)cmname_buffer_length-1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:49:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _file = NEW_C_HEAP_ARRAY(char, strlen(file_name)+1, mtCompiler); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:228:22: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bytes_read = read(partial_fd, buf, (int)nr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compileLog.cpp:238:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((bytes_read = read(partial_fd, buf, buflen-1)) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:190:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* canonicalized_list = NEW_C_HEAP_ARRAY(char, strlen(option_value) + 1, mtCompiler); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:408:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(DisableIntrinsicOption); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:410:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(local_list, DisableIntrinsicOption, length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:448:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(src->DisableIntrinsicOption) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerDirectives.cpp:450:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, src->DisableIntrinsicOption, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:479:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* value = NEW_RESOURCE_ARRAY(char, strlen(line) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:490:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* value = NEW_RESOURCE_ARRAY(char, strlen(line) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:707:12: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = getc(stream); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:716:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(stream); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/compilerOracle.cpp:820:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(newName, name, i); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:97:29: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t num_read = os::read(file_handle, (char*) buffer, st.st_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:194:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, str, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:317:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, v->str.start, v->str.length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:378:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, v->str.start, v->str.length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/directivesParser.cpp:398:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, v->str.start, v->str.length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:75:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). lib_offset = jvm_offset = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:168:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t taglen = strlen(tag); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:177:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t opt_so_far = strlen(_option_buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:178:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (opt_so_far + 1 + strlen(p) + 1 > sizeof(_option_buf)) return; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:281:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen((const char*)arg) > sizeof(buffer) - 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:283:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buffer, (const char*)arg, sizeof(buffer) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/disassembler.cpp:414:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t flen = strlen(format); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:189:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t clen = strlen(candidate_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:190:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t mlen = strlen(match_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:205:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) == 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:209:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(name, name + 1, strlen(name + 1) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:212:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/compiler/methodMatcher.cpp:218:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3187:20: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). HeapWord* cur = read; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3188:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while (f > read) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3189:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). cur = read; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/concurrentMarkSweepGeneration.cpp:3191:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (cur == read) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/cms/gSpaceCounters.cpp:44:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp:55:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.cpp:42:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(VerifyGCType) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.cpp:44:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(VerifyGCType); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1Arguments.cpp:46:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(type_list, VerifyGCType, length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp:896:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read(curr, interval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/g1/g1OopClosures.inline.hpp:50:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read(obj->mark_addr_raw(), (HeapWordSize*2)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psGenerationCounters.cpp:45:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/psMarkSweepDecorator.cpp:368:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read(q, scan_interval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/parallel/spaceCounters.cpp:42:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/serial/cSpaceCounters.cpp:42:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/collectorCounters.cpp:39:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/generationCounters.cpp:39:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/hSpaceCounters.cpp:44:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.cpp:713:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* dup = NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/oopStorage.cpp:850:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). total_size += strlen(name()) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shared/space.inline.hpp:352:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read(cur_obj, scan_interval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp:478:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strlen(call->_name) > 5 && data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp:479:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). !strcmp(call->_name + strlen(call->_name) - 5, "_fill")) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp:435:19: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read(cb, oopDesc::mark_offset_in_bytes()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp:41:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodes.cpp:159:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (format != NULL ? (int) strlen(format) : 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/bytecodes.cpp:160:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int wlen = (wide_format != NULL ? (int) strlen(wide_format) : 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp:414:96: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. def(Bytecodes::_ifeq , ubcp|____|clvm|____, itos, vtos, if_0cmp , equal ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp:420:96: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. def(Bytecodes::_if_icmpeq , ubcp|____|clvm|____, itos, vtos, if_icmp , equal ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp:426:96: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. def(Bytecodes::_if_acmpeq , ubcp|____|clvm|____, atos, vtos, if_acmp , equal ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.cpp:459:96: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. def(Bytecodes::_ifnull , ubcp|____|clvm|____, atos, vtos, if_nullcmp , equal ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/interpreter/templateTable.hpp:84:20: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. enum Condition { equal, not_equal, less, less_equal, greater, greater_equal }; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:190:35: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int nof_members = JfrBigEndian::read<u2>(buffer + index - 2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:234:40: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int nof_values = JfrBigEndian::read<u2>(buffer + index - 2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:265:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return JfrBigEndian::read<u2>(_buffer + _current + value_relative_offset); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:294:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return JfrBigEndian::read<u2>(_buffer + number_of_elements_offset); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:299:54: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return _ik->constants()->symbol_at(JfrBigEndian::read<u2>(_buffer + _current)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:303:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return JfrBigEndian::read<u1>(_buffer + _current + value_type_relative_offset); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:354:54: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return _ik->constants()->symbol_at(JfrBigEndian::read<u2>(_buffer + _current)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1485:76: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strncmp(ik->name()->as_C_string(), new_ik->name()->as_C_string(), strlen(ik->name()->as_C_string())) == 0, "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:129:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(jvmti_error_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/jni/jfrJavaCall.cpp:43:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return SymbolTable::lookup(str, (int)strlen(str), THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:81:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(_buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:84:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(copy, _buffer, len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:68:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t length = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:70:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(entry.name, name, length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/periodic/jfrOSInterface.cpp:256:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(key, variable, key_length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.cpp:222:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return JfrBigEndian::read<Return>(data); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:230:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JfrCHeapObj::free(_thread_group_name, strlen(_thread_group_name) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:240:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(tgname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:242:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_thread_group_name, tgname, len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:108:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t length = strlen(resource_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:111:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(c_string, resource_str, length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:127:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t length = strlen(query); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:140:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JfrCHeapObj::free(const_cast<char*>(entry->literal()), strlen(entry->literal() + 1)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:209:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t hash_len = strlen(hash_buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:213:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(anonymous_symbol) == result_len, "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:215:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(anonymous_symbol) == result_len + hash_len, "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:55:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static const size_t length = strlen("FlightRecorder"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:116:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CmdLine cmdline(options, strlen(options), true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp:50:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JfrCHeapObj::free(_path, strlen(_path) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp:101:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t path_len = strlen(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp:103:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(new_path, path, path_len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrChunkState.cpp:110:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JfrCHeapObj::free(_path, strlen(_path) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:78:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(iso8601_str) == iso8601_len, "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:96:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(buffer) >= iso8601_len + 1, "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:132:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t entry_len = strlen(entry); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:133:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t file_separator_length = strlen(file_separator); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:145:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(file_path_entry) == (size_t)position, "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:154:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t entry_len = strlen(entry); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:163:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(entry_name, entry, entry_len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:186:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(_repo) == _repository_len, "invariant"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:260:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t pos = strlen(cwd); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:276:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (Arguments::copy_expand_pid(filename_fmt, strlen(filename_fmt), &buffer[pos], JVM_MAXPATHLEN - pos)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:277:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t emergency_filename_length = strlen(buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:282:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(emergency_dump_path, buffer, emergency_filename_length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:295:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t repository_path_len = strlen(repository_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:299:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t date_time_len = strlen(date_time_buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:303:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). + strlen(chunk_file_jfr_ext) // .jfr data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:331:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). RepositoryIterator iterator(repository_path, strlen(repository_path)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:64:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JfrCHeapObj::free(_path, strlen(_path) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:99:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JfrCHeapObj::free(_path, strlen(_path) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:101:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t path_len = strlen(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:106:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_path, path, path_len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:276:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t length = strlen((const char*)FlightRecorderOptions); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:283:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t option_length = strlen(option.name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:339:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(repo); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:344:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(repo_copy, repo, len + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:701:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t value_length = strlen(value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:708:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(startup_value, value, value_length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp:52:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). static T read(const void* location); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp:114:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). inline T JfrBigEndian::read(const void* location) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrEncoding.hpp:100:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MIN2<u2>(max_jushort, (jushort)strlen(value)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp:98:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const jint len = MIN2<jint>(max_jint, (jint)strlen(value)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp:309:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MIN2<u2>(max_jushort, (u2)strlen(value)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:145:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag* flag = JVMFlag::find_flag(cstring, strlen(cstring), /* allow_locked */ true, /* return_flag */ true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:317:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t name_buf_len = strlen(vmField.typeName) + strlen(vmField.fieldName) + 2 /* "::" */; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:317:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t name_buf_len = strlen(vmField.typeName) + strlen(vmField.fieldName) + 2 /* "::" */; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:343:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vmField.typeString[strlen(vmField.typeString) - 1] == '*') { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:387:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag* flag = JVMFlag::find_flag(#name, strlen(#name), /*allow_locked*/ true, /* return_flag */ true); \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciJavaClasses.cpp:116:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* name_symbol = SymbolTable::probe(name, (int)strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciJavaClasses.cpp:117:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). Symbol* signature_symbol = SymbolTable::probe(signature, (int)strlen(signature)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/jvmci/jvmciRuntime.cpp:518:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t detail_msg_length = strlen(buf) * 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:86:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s += strlen(s); // Advance working string data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/libadt/set.cpp:100:10: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. } else strcat(s,"}"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:143:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). prefix_len = strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:145:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t name_len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:182:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(name, LogFileOutput::Prefix, strlen(LogFileOutput::Prefix)) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:273:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(output->config_string()) > 0, "should always have a config description"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:409:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (outputstr == NULL || strlen(outputstr) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:433:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(outputstr) + strlen(implicit_output_prefix) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:433:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(outputstr) + strlen(implicit_output_prefix) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logConfiguration.cpp:446:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (output_options != NULL && strlen(output_options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logDecorators.cpp:47:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (decorator_args == NULL || strlen(decorator_args) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:51:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _file_name = make_file_name(name + strlen(Prefix), _pid_str, _vm_start_time_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:80:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!isdigit(*value_str) || end != value_str + strlen(value_str) || value >= SIZE_MAX) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:123:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(filename) + number_of_digits + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:165:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options == NULL || strlen(options) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:235:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _archive_name_len = 2 + strlen(_file_name) + _file_count_max_digits; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:393:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). first_replace_len = strlen(PidFilenamePlaceholder); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:397:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). second_replace_len = strlen(PidFilenamePlaceholder); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:405:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). first_replace_len = strlen(TimestampFilenamePlaceholder); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:409:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). second_replace_len = strlen(TimestampFilenamePlaceholder); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:413:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t first_len = strlen(first); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:414:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t second_len = strlen(second); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logFileOutput.cpp:417:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t result_len = strlen(file_name) + first_len - first_replace_len + second_len - second_replace_len; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logLevel.cpp:46:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(level); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logLevel.cpp:52:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). double score = StringUtils::similarity(level, len, levelname, strlen(levelname)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp:61:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _config_string_buffer_size = strlen(_config_string) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logOutput.cpp:70:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t offset = strlen(_config_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logPrefix.hpp:108:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(ret == 0 || strlen(buf) < len, \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logPrefix.hpp:110:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(ret == 0 || strlen(buf) == ret || ret >= len, \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.cpp:48:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/logging/logTag.cpp:54:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). double score = StringUtils::similarity(tagname, strlen(tagname), str, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:141:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int version_len = (int)strlen(vm_version); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:154:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(header_version, vm_version, JVM_IDENT_MAX-9); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:248:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:410:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strncmp((const char*)attr, name, strlen(name)) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:415:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, (char*)value, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:508:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t n = os::read(fd, _header, (unsigned int)sz); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/filemap.cpp:576:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). n = os::read(fd, _paths_misc_info, (unsigned int)info_size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapInspection.cpp:302:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char x = start[strlen(col_name)]; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/heapInspection.hpp:334:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int min = (int)(strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/metaspaceShared.cpp:1674:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int class_list_path_len = (int)strlen(class_list_path_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.cpp:786:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(VerifySubSet) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.cpp:1198:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(VerifySubSet); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/memory/universe.cpp:1200:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(subset_list, VerifySubSet, length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp:1925:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(str, (char *) (bytes+2), len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/constantPool.cpp:2143:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int) strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:711:10: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal(cts)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:734:27: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. change = change || !v.equal(bbts[i]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:758:29: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. change = change || !v.equal(bbts[i]); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1763:15: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (match.equal(_state[i])) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1772:17: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (match.equal(_state[i])) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1821:48: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!actual.is_lock_reference() || !expected.equal(actual)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1969:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (out[0].equal(CellTypeState::ref) && out[1].equal(CellTypeState::bottom)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.cpp:1969:50: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (out[0].equal(CellTypeState::ref) && out[1].equal(CellTypeState::bottom)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/generateOopMap.hpp:224:8: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bool equal(CellTypeState a) const { return _state == a._state; } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:947:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t msglen = strlen(desc) + strlen(className) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:947:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t msglen = strlen(desc) + strlen(className) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2586:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hash_len = (int)strlen(hash_buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2591:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int src_length = (int)strlen(src); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2751:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(other_pkg == NULL || strlen(other_pkg) > 0, "package name is empty string"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2824:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2824:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2824:68: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/instanceKlass.cpp:2824:88: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:655:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t addr_len = strlen(addr_buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:659:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(result) == name_len, ""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:661:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(result) == name_len + addr_len, ""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:841:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(class1_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:844:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(class2_description); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:846:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(" and "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:872:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(klass_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:888:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(module_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:894:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(version) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:912:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(loader_name_and_id); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:933:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(parent_loader_phrase) + strlen(parent_loader_name_and_id); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:933:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(parent_loader_phrase) + strlen(parent_loader_name_and_id); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:937:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += ((use_are) ? strlen(" are in ") : strlen(" is in ")); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:937:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += ((use_are) ? strlen(" are in ") : strlen(" is in ")); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:938:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(module_name_phrase) + strlen(" of loader "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/klass.cpp:938:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(module_name_phrase) + strlen(" of loader "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:151:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int klass_name_len = (int)strlen(klass_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:166:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/method.cpp:172:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.cpp:93:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (::strncmp(classname, prefix, strlen(prefix)) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.cpp:180:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = (int)strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.cpp:195:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = (int)strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.hpp:192:65: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bool equals(const char* str) const { return equals(str, (int) strlen(str)); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.hpp:197:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return starts_with(prefix, (int) strlen(prefix)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/oops/symbol.hpp:203:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return index_of_at(i, str, (int) strlen(str)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/callnode.cpp:531:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (endcn == NULL) endcn = name + strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2142:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return buf+strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/chaitin.cpp:2175:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return buf+strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:230:21: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. if (buf[0] == 0) strcat(buf, ","); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/compile.cpp:4493:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_print_inlining_output, ss.base(), end+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/idealGraphPrinter.cpp:149:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). _stream->read(&c, 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1028:24: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). bool uup = umask.is_UP(); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1033:18: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). if( !umask.is_AllStack() && data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1034:22: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (int)umask.Size() <= lrgs(useidx).num_regs() && data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1036:31: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). (!is_vect && umask.is_misaligned_pair()))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1080:33: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). if( dmask.overlap(umask) ) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/reg_split.cpp:1117:34: [1] (access) umask: Ensure that umask is given most restrictive possible setting (e.g., 066 or 077) (CWE-732). RegMask tmp_rm(umask); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.hpp:622:8: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bool equal(SWPointer& q) { return equal(cmp(q)); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.hpp:622:44: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bool equal(SWPointer& q) { return equal(cmp(q)); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/opto/superword.hpp:625:15: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. static bool equal(int cmp) { return cmp == Equal; } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/cdsoffsets.cpp:35:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name = NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:326:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int str_len = (int)strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:392:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(name) > Symbol::max_length()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:1328:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol name = SymbolTable::probe(name_to_probe, (int)strlen(name_to_probe)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:1329:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol signature = SymbolTable::probe(sig, (int)strlen(sig)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2034:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol fieldname = SymbolTable::probe(name, (int)strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2035:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol signame = SymbolTable::probe(sig, (int)strlen(sig)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2269:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol fieldname = SymbolTable::probe(name, (int)strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2270:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol signame = SymbolTable::probe(sig, (int)strlen(sig)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:2941:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int prefix_len = (int)strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:3022:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int meth_name_len = (int)strlen(meth_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jni.cpp:3028:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol signature = SymbolTable::probe(meth_sig, (int)strlen(meth_sig)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp:480:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jniCheck.cpp:1554:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(result) + 1; // + 1 for NULL termination data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:769:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || (int)strlen(name) > Symbol::max_length()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:793:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || (int)strlen(name) > Symbol::max_length()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:831:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((int)strlen(name) > Symbol::max_length()) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:911:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int str_len = (int)strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvm.cpp:973:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int str_len = (int)strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:312:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(ik()->source_debug_extension()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:853:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol sym = SymbolTable::probe(name, (int)strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1666:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefix_len = strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1692:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefix_len = strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnhancedRedefineClasses.cpp:1705:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return search_prefix_name_space(0, name_str, strlen(name_str), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:814:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:1189:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). info_ptr->name = (char *) jvmtiMalloc(strlen(n)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:1438:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). info_ptr->name = (char*)jvmtiMalloc(strlen(name)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2378:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result = (char *) jvmtiMalloc(strlen(class_sig)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2391:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jvmtiError err = allocate(strlen(gen_sig) + 1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2444:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *source_name_ptr = (char *) jvmtiMalloc(strlen(sfncp)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2824:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *source_debug_extension_ptr = (char *) jvmtiMalloc(strlen(sde)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2881:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *name_ptr = (char*) jvmtiMalloc(strlen(fieldName) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2890:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *signature_ptr = (char*) jvmtiMalloc(strlen(fieldSignature) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2901:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jvmtiError err = allocate(strlen(gen_sig) + 1, (unsigned char **)generic_ptr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2960:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *name_ptr = (char *) jvmtiMalloc(strlen(utf8_name)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2967:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *signature_ptr = (char *) jvmtiMalloc(strlen(utf8_signature) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:2977:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jvmtiError err = allocate(strlen(gen_sig) + 1, (unsigned char **)generic_ptr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3138:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_buf = (char *) jvmtiMalloc(strlen(utf8_name)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3142:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sig_buf = (char *) jvmtiMalloc(strlen(utf8_signature)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3148:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). gen_sig_buf = (char *) jvmtiMalloc(strlen(utf8_gen_sign)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3693:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = allocate((strlen(key)+1) * sizeof(char), (unsigned char**)tmp_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnv.cpp:3723:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = allocate((strlen(value)+1) * sizeof(char), (unsigned char **)value_ptr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:458:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* prefix_copy = NEW_RESOURCE_ARRAY(char, strlen(prefix)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiEnvBase.cpp:1172:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *dup_str = (char*)allocate(strlen(str)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExport.hpp:427:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_name, name, sizeof(_name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:110:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = rt.allocate(strlen(id)+1, (unsigned char**)&(ext_funcs[i].id)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:117:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = rt.allocate(strlen(desc)+1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:141:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = rt.allocate(strlen(src_params[j].name)+1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:198:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = rt.allocate(strlen(id)+1, (unsigned char**)&(ext_events[i].id)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:205:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = rt.allocate(strlen(desc)+1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiExtensions.cpp:229:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). err = rt.allocate(strlen(src_params[j].name)+1, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiImpl.cpp:613:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int) strlen(ty_sign); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRawMonitor.cpp:59:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name = strcpy(NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal), name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3760:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefix_len = strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3786:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefix_len = strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3799:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return search_prefix_name_space(0, name_str, strlen(name_str), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:4141:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (int)strlen(scratch_class->source_debug_extension())); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:87:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(curr) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:96:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). very_end = curr + strlen(curr); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:112:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). flags_end = flags + strlen(flags); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:192:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fnlen = strlen(fname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/jvmtiTrace.cpp:221:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t evtlen = strlen(ename); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodHandles.cpp:1119:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(name) + 50; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/methodHandles.cpp:1197:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str += strlen(str) + 1; // skip name and null data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp:485:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefix_len = strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/nativeLookup.cpp:493:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int wrapper_name_len = (int)strlen(wrapper_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:54:69: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol enumSigSymbol = SymbolTable::lookup(enum_sig, (int) strlen(enum_sig), THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:155:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). CmdLine cmdline(c_cmdline, strlen(c_cmdline), true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:168:77: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). GenDCmdArgument* arg = parser.lookup_dcmd_option(parsedArgNames->at(i), strlen(parsedArgNames->at(i))); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:1119:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag* result = JVMFlag::find_flag(flag_name, strlen(flag_name), true, true); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:1893:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(field_name != NULL && strlen(field_name) > 0, "Field name not valid"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/prims/whitebox.cpp:1902:69: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). TempNewSymbol name_symbol = SymbolTable::lookup(field_name, (int) strlen(field_name), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:125:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _value = AllocateHeap(strlen(value)+1, mtArguments); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:140:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:142:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len += strlen(_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:164:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _value = AllocateHeap(strlen(value)+1, mtArguments); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:178:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(module_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:180:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_module_name, module_name, len); // copy the trailing null data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:199:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _key = AllocateHeap(strlen(key)+1, mtArguments); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:210:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name = AllocateHeap(strlen(name)+1, mtArguments); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:215:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _options = AllocateHeap(strlen(options)+1, mtArguments); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:230:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:804:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (remainder == s || strlen(remainder) > 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:885:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag* result = JVMFlag::find_flag(name, strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:944:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t old_len = old_value != NULL ? strlen(old_value) : 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:945:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t new_len = strlen(new_value); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1009:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(tagset_buffer, "+", max_tagset_len - strlen(tagset_buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1009:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(tagset_buffer, "+", max_tagset_len - strlen(tagset_buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1011:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(tagset_buffer, LogTag::name(tagSet[i]), max_tagset_len - strlen(tagset_buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1011:70: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(tagset_buffer, LogTag::name(tagSet[i]), max_tagset_len - strlen(tagset_buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1014:7: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant character. strncat(tagset_buffer, "*", max_tagset_len - strlen(tagset_buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1014:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(tagset_buffer, "*", max_tagset_len - strlen(tagset_buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1176:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length += strlen(args[i]) + 1; // add 1 for a space or NULL terminating character data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1181:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t offset = strlen(args[j]) + 1; // add 1 for a space or NULL terminating character data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1202:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). st->print_cr("java_class_path (initial): %s", strlen(path) == 0 ? "<not set>" : path ); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1260:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). arg_len = strlen(argname); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1299:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(locked_message_buf) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1361:11: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = getc(stream); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:1393:9: [1] (buffer) getc: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). c = getc(stream); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2009:7: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg) == 0 || strcasecmp(arg, "NONE") == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2175:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prop_len = strlen(prop_name) + strlen(prop_value) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2175:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prop_len = strlen(prop_name) + strlen(prop_value) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2194:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prop_len = strlen(prop_base_name) + strlen(prop_value) + max_digits + extra_symbols_count; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2194:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prop_len = strlen(prop_base_name) + strlen(prop_value) + max_digits + extra_symbols_count; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2298:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _len_prefix = strlen(JNI_LIB_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2305:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _len_jdwp = strlen(_jdwp); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2474:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = (pos == NULL) ? strlen(tail) : pos - tail; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2480:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len2 = strlen(pos+1) + 1; // options start after ':'. Final zero must be copied. data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:2566:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(tail) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3024:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strncmp(tail, "Flags=", strlen("Flags=")) != 0) && data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3025:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (strncmp(tail, "VMOptionsFile=", strlen("VMOptionsFile=")) != 0)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3106:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (char* tail = copy + strlen(copy) - 1; tail >= copy && *tail == separator; tail--) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3361:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int retcode = parse_options_buffer(name, buffer, strlen(buffer), vm_args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3411:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t bytes_read = ::read(fd, (void *)buf, (unsigned)bytes_alloc); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3537:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t jvm_path_len = strlen(jvm_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3538:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t file_sep_len = strlen(os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:3824:67: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). code = parse_options_buffer("vm options resource", vmoptions, strlen(vmoptions), &initial_vm_options_args); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:4325:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t ext_path_length = strlen(ext_path_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/arguments.cpp:4345:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(ext_path_str) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/fieldType.cpp:81:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(element); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:670:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(d.name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:929:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name_len = strlen(_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:941:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). score = StringUtils::similarity(current->_name, strlen(current->_name), name, length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.cpp:990:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag* result = JVMFlag::find_flag((char*)name, strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:120:72: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag* find_flag(const char* name) { return find_flag(name, strlen(name), true, true); }; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:217:143: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error boolAt(const char* name, bool* value, bool allow_locked = false, bool return_flag = false) { return boolAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:220:116: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error boolAtPut(const char* name, bool* value, JVMFlag::Flags origin) { return boolAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:223:140: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error intAt(const char* name, int* value, bool allow_locked = false, bool return_flag = false) { return intAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:226:113: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error intAtPut(const char* name, int* value, JVMFlag::Flags origin) { return intAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:229:143: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error uintAt(const char* name, uint* value, bool allow_locked = false, bool return_flag = false) { return uintAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:232:116: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error uintAtPut(const char* name, uint* value, JVMFlag::Flags origin) { return uintAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:235:143: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error intxAt(const char* name, intx* value, bool allow_locked = false, bool return_flag = false) { return intxAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:238:116: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error intxAtPut(const char* name, intx* value, JVMFlag::Flags origin) { return intxAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:241:144: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error uintxAt(const char* name, uintx* value, bool allow_locked = false, bool return_flag = false) { return uintxAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:244:117: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error uintxAtPut(const char* name, uintx* value, JVMFlag::Flags origin) { return uintxAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:247:147: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error size_tAt(const char* name, size_t* value, bool allow_locked = false, bool return_flag = false) { return size_tAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:250:120: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error size_tAtPut(const char* name, size_t* value, JVMFlag::Flags origin) { return size_tAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:253:150: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error uint64_tAt(const char* name, uint64_t* value, bool allow_locked = false, bool return_flag = false) { return uint64_tAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:256:126: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error uint64_tAtPut(const char* name, uint64_t* value, JVMFlag::Flags origin) { return uint64_tAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:259:147: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error doubleAt(const char* name, double* value, bool allow_locked = false, bool return_flag = false) { return doubleAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:262:120: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error doubleAtPut(const char* name, double* value, JVMFlag::Flags origin) { return doubleAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:265:144: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error ccstrAt(const char* name, ccstr* value, bool allow_locked = false, bool return_flag = false) { return ccstrAt(name, strlen(name), value, allow_locked, return_flag); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/flags/jvmFlag.hpp:269:117: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static JVMFlag::Error ccstrAtPut(const char* name, ccstr* value, JVMFlag::Flags origin) { return ccstrAtPut(name, strlen(name), value, origin); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.cpp:623:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.cpp:1304:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fv.description = NEW_RESOURCE_ARRAY(char, strlen(description) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/frame.hpp:118:8: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bool equal(frame other) const; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/mutex.cpp:1158:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(m->_name, name, MONITOR_NAME_LEN - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp:2276:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen(Key); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp:2278:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (Search = kvList; *Search; Search += strlen(Search) + 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/objectMonitor.cpp:2312:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t sz = strlen(SyncKnobs); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:286:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:286:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:286:66: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:289:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t pnamelen = pname ? strlen(pname) : 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:295:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t plen = strlen(buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:308:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t plen = (path == NULL) ? 0 : strlen(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:609:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t size = strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:619:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). vm_exit_out_of_memory(strlen(str) + 1, OOM_MALLOC_ERROR, "os::strdup_check_oom"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1278:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(mode) + 1 < sizeof(modified_mode), "mode chars plus one extra must fit in buffer"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1301:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int home_len = (int)strlen(home); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1339:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (path == NULL || strlen(path) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1343:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* inpath = (char*)NEW_C_HEAP_ARRAY(char, strlen(path) + 1, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.cpp:1373:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, p, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os.hpp:589:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). static size_t read(int fd, void *buf, unsigned int nBytes); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os_perf.hpp:213:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t length = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/os_perf.hpp:216:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_name, name, length + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:88:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name = NEW_C_HEAP_ARRAY(char, strlen(name) + strlen(prefix) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:88:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _name = NEW_C_HEAP_ARRAY(char, strlen(name) + strlen(prefix) + 2, mtInternal); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:89:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(_name != NULL && strlen(name) != 0, "invalid name"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:129:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t namelen = strlen(name()) + 1; // include null terminator data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:233:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy((char *)_valuep, s2 == NULL ? "" : s2, _length); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:247:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). MIN2((jint)(strlen((char*)initial_value)+1), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:253:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ((jint)strlen(initial_value) > (jint)PerfMaxStringConstLength)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:259:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (jint)strlen(initial_value), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:367:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(ns) + strlen(name) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:367:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(ns) + strlen(name) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.cpp:428:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (max_length == 0 && s != NULL) max_length = (int)strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.hpp:724:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strncmp(name, javadot, strlen(javadot)) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfData.hpp:728:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strncmp(name, comdot, strlen(comdot)) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/perfMemory.cpp:252:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(!Arguments::copy_expand_pid(PerfDataSaveFile, strlen(PerfDataSaveFile), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/prefetch.hpp:45:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). static void read(void* loc, intx interval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:601:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = 100 + strlen(current_class_name) + 2*strlen(module_from_name) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:601:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = 100 + strlen(current_class_name) + 2*strlen(module_from_name) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:602:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(new_class_name) + 2*strlen(module_to_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:602:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(new_class_name) + 2*strlen(module_to_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:612:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = 160 + strlen(current_class_name) + 2*strlen(module_from_name) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:612:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = 160 + strlen(current_class_name) + 2*strlen(module_from_name) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:613:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(new_class_name) + 2*sizeof(uintx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:628:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = 118 + strlen(current_class_name) + 2*strlen(module_from_name) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:628:59: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = 118 + strlen(current_class_name) + 2*strlen(module_from_name) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:629:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:629:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:629:63: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:639:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = 170 + strlen(current_class_name) + strlen(new_class_name) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:639:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = 170 + strlen(current_class_name) + strlen(new_class_name) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:640:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). 2*strlen(module_to_name) + strlen(package_name) + 2*sizeof(uintx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/reflection.cpp:640:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). 2*strlen(module_to_name) + strlen(package_name) + 2*sizeof(uintx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1976:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1976:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1976:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1976:98: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1990:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1990:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:1990:83: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/sharedRuntime.cpp:2920:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/stackValue.hpp:95:8: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. bool equal(StackValue *value) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:153:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); \ data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:2772:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bool only_at = strlen(DeoptimizeOnlyAt) > 0; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:2786:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:3460:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read((void*)addr, prefetch_interval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4056:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4056:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4056:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4056:69: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4077:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4077:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4077:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4078:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(ebuf) + strlen(sub_msg2) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/thread.cpp:4078:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(ebuf) + strlen(sub_msg2) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/threadSMR.inline.hpp:49:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read((void*)current_p, scan_interval); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:520:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefixed_name_len = strlen(prefixed_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:529:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t name_len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:536:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t possible_prefix_len = strlen(possible_prefix); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:677:23: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!locs->at(i)->equal(other_locs->at(i))) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vframe.cpp:686:24: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!exprs->at(i)->equal(other_exprs->at(i))) data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3131:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(typeName); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3134:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, typeName, len - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3145:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). start = typeName + strlen("GrowableArray<"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3147:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). start = typeName + strlen("Array<"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3153:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(s, start, len - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmStructs.cpp:3163:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char * s = typeName + strlen("const "); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.cpp:159:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) op->name(), strlen(op->name()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.cpp:409:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) op->name(), strlen(op->name()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vmThread.cpp:419:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) op->name(), strlen(op->name()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/runtime/vm_version.cpp:338:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(line, keywords_to_match[i], strlen(keywords_to_match[i])) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp:227:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (arg1 != NULL && (strlen(arg1) > 0)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp:264:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (arg0 != NULL && (strlen(arg0) > 0)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp:310:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag* f = JVMFlag::find_flag((char*)name, strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.cpp:377:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(name) <= AttachOperation::name_length_max, "operation <= name_length_max"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:125:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(name) <= name_length_max, "exceeds maximum name length"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:126:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = MIN2(strlen(name), (size_t)name_length_max); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:143:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(strlen(arg) <= arg_length_max, "exceeds maximum argument length"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/attachListener.hpp:144:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = MIN2(strlen(arg), (size_t)arg_length_max); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:49:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ptr, str, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:97:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t next_size = strlen(next_str); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:107:7: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(buf, ","); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:122:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, str, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:131:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). this->parse_value(_default_string, strlen(_default_string), THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:148:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len == strlen("true") && strncasecmp(str, "true", len) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:150:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (len == strlen("false") && strncasecmp(str, "false", len) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:156:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(buf, str, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:166:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). this->parse_value(_default_string, strlen(_default_string), THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:190:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). this->parse_value(_default_string, strlen(_default_string), THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:236:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_value._unit, &str[idx], len - idx); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:267:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). this->parse_value(_default_string, strlen(_default_string), THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticArgument.cpp:342:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). this->parse_value(_default_string, strlen(_default_string), THREAD); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:161:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cmd_list->at(i))); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:171:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(_cmd.value())); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:202:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cmd_list->at(i))); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:326:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t opt_len = strlen(_libpath.value()) + strlen(_option.value()) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticCommand.cpp:326:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t opt_len = strlen(_libpath.value()) + strlen(_option.value()) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:211:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(argbuf, iter.key_addr(), len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:226:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(arg->name()) == len && data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.cpp:501:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(factory->name()) == len && data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/diagnosticFramework.hpp:85:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). : _str(str), _delim(delim), _len(::strlen(str)), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/dtraceAttacher.cpp:54:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag::boolAtPut((char*)flag, strlen(flag), &value, data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:1819:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). writer()->write_raw((void*)header, (int)strlen(header)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:1939:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert(path != NULL && strlen(path) > 0, "path missing"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:1997:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* str = NEW_RESOURCE_ARRAY(char, strlen(error())+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2049:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (HeapDumpPath == NULL ? 0 : strlen(HeapDumpPath)) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2050:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(os::file_separator()) + max_digit_chars + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2051:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dump_file_name) + strlen(dump_file_ext) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2051:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(dump_file_name) + strlen(dump_file_ext) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2070:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t fs_len = strlen(os::file_separator()); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2071:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(base_path) >= fs_len) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2073:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end += (strlen(base_path) - fs_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2082:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t dlen = strlen(base_path); // if heap dump dir specified data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2086:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(base_path) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2092:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(my_path, base_path, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/heapDumper.cpp:2095:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(base_path) + max_digit_chars + 2; // for '.' and \0 data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.cpp:1546:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag* flag = JVMFlag::find_flag(str, strlen(str)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/management.cpp:2013:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(cmd_name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:230:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) name(), strlen(name()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:231:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) pool->name(), strlen(pool->name()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:261:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) name(), strlen(name()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/memoryManager.cpp:262:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (char *) pool->name(), strlen(pool->name()), data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:38:3: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. strncat(buffer, src, TEMP_BUF_SIZE - 1 - strlen(buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:38:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(buffer, src, TEMP_BUF_SIZE - 1 - strlen(buffer)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:49:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t j = strlen(buffer); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/services/writeableFlags.cpp:253:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). JVMFlag* f = JVMFlag::find_flag((char*)name, strlen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTable.inline.hpp:267:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read(*pref->value(), 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/concurrentHashTable.inline.hpp:274:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). Prefetch::read(*next_pref->value(), 0); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/debug.cpp:142:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int file_name_len = (int)strlen(file_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:73:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). mfd.read(_section_data, shdr.sh_size)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:82:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bool FileReader::read(void* buf, size_t size) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:114:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(filepath) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:195:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (!freader.read(&_elfHdr, sizeof(_elfHdr))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:211:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (!freader.read(&shdr, sizeof(shdr))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:263:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.cpp:277:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (!mfd.read((void*)&hdr, sizeof(hdr))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFile.hpp:103:8: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). bool read(void* buf, size_t size); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfFuncDescTable.cpp:68:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). !mfd.read((void*)&addr, sizeof(addr))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfStringTable.cpp:66:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). mfd.read((void*)buf, size_t(buflen))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/elfSymbolTable.cpp:99:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (!mfd.read((void*)&sym, sizeof(sym))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/formatBuffer.hpp:107:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(_buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_gcc.hpp:227:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_gcc.hpp:227:44: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_sparcWorks.hpp:237:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_sparcWorks.hpp:237:44: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp:117:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). #define read _read data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_xlc.hpp:126:12: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/globalDefinitions_xlc.hpp:126:44: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:41:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return tmp == NULL ? s + strlen(s) : tmp; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:350:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int tokens, read; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:357:49: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). tokens = sscanf(pos, "%lf%n", &double_value, &read); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:360:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). assert(read > 0, "sanity"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:374:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). skip(read); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:452:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(valid_chars); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/json.cpp:480:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(expected_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:94:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result_len = strlen(result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:99:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result_len = strlen(result); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:372:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(copy, buffer, buffer_pos); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:393:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int i = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:417:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_length = strlen(force_directory) + strlen(os::file_separator()) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:417:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_length = strlen(force_directory) + strlen(os::file_separator()) + data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:418:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(basename) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:420:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_length = strlen(log_name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:428:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_length += strlen(pid_text); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:434:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buffer_length += strlen(tms); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:445:3: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(buf, ""); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:482:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int buf_pos = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:487:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&buf[buf_pos], nametail, first); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:489:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). buf_pos = (int)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:491:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(&buf[buf_pos], tail, second - first - 2); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:555:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). data[::strlen(data)-1] = '\0'; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:1029:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(copy, buffer, buffer_pos); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.cpp:1064:20: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int networkStream::read(char *buf, size_t len) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp:100:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). void print_raw(const char* str) { write(str, strlen(str)); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp:102:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). void print_raw_cr(const char* str) { write(str, strlen(str)); cr(); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp:234:10: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). size_t read(void *data, size_t size, size_t count) { return ::fread(data, size, count, _file); } data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/ostream.hpp:304:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int read(char *buf, size_t len); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.cpp:31:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t from_len = strlen(from); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.cpp:32:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t to_len = strlen(to); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/stringUtils.cpp:39:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). memmove(dst, left_over, strlen(left_over) + 1); // copies the trailing 0 of <left_over> data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/utf8.cpp:451:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). assert((int) strlen(result) == utf8_len, "length prediction must be correct"); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:153:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(coredump_message, message, sizeof(coredump_message)); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:176:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(_detail_msg) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:501:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(_detail_msg) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:507:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(_detail_msg) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:568:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(_detail_msg) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1206:43: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (Arguments::copy_expand_pid(pattern, strlen(pattern), &buf[pos], buflen - pos)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1231:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t pos = strlen(cwd); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/vmError.cpp:1243:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (tmpdir != NULL && strlen(tmpdir) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:155:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t tag_len = (tag_end == NULL) ? strlen(tag) : tag_end - tag; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:191:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _element_close_stack_ptr = (cur_tag += strlen(cur_tag) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:199:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). _element_close_stack_ptr = cur_tag + strlen(cur_tag) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/hotspot/share/utilities/xmlstream.cpp:352:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t format_len = strlen(format); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnet/aix_close.c:340:11: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(num_woken * 50); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/ch/AixPollPort.c:165:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(fd, buf, 1), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:141:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char*)vm + vm->vmt_data[VMT_OBJECT].vmt_off); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:152:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char*)vm + vm->vmt_data[VMT_STUB].vmt_off); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:200:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(fstype); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:211:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((char*)vm + vm->vmt_data[VMT_ARGS].vmt_off); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:155:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(fn, "/cmdline", sizeof fn - strnlen(fn, sizeof fn) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:194:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). while ((count = read(fd, s, pageSize - cmdlen)) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:194:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:201:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:208:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(fstype); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:215:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(options); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:91:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int langStrLen = strlen(languageString); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:107:25: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(languageString, "-"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:167:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int length = strlen(scriptRegion); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:374:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int c_len = strlen(c_exception); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:401:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(c_exception+c_len, "|*.", 3); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:402:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(c_exception+c_len+3, c_exception, c_len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjava/java_props_macosx.c:485:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sProps->protocol##Port = malloc(strlen(buf) + 1); \ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:486:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(jvm_cfg, selfInfo.dli_fname, MAXPATHLEN); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:494:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, jvm_cfg, pathsize); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libjli/java_md_macosx.c:506:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t pathLen = strlen(realPathToSelf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:191:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). protoLen = strlen(cproto); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:192:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hostLen = strlen(chost); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnet/DefaultProxySelector.c:201:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). urlRef = CFURLCreateWithBytes(NULL, (const UInt8 *) uri, strlen(uri), data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:165:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:172:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:179:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(fstype); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:186:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(options); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:218:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize len = strlen(buf.f_mntonname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:311:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((len = (cname != NULL ? strlen(cname) : 0) + strlen(syms[i]) + 2) > data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:311:58: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((len = (cname != NULL ? strlen(cname) : 0) + strlen(syms[i]) + 2) > data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:477:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t prefixLen = strlen(JNI_LIB_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:478:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t suffixLen = strlen(JNI_LIB_SUFFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:494:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(cname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/ClassLoader.c:511:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). libName[strlen(libName)-suffixLen] = '\0'; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c:435:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int prefix_len = (int) strlen(JNI_LIB_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/System.c:436:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int suffix_len = (int) strlen(JNI_LIB_SUFFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:188:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t messagelen = message == NULL ? 0 : strlen(message); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:478:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:518:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:590:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int) strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjava/jni_util.c:753:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:235:40: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int str_length = (int) strlen(string); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:272:52: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int str_length = (int) strlen(pkg); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:291:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int clazz_length = (int) strlen(clazz); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageDecompressor.cpp:300:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). desc_length = (int) strlen(desc_string); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:162:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* replaced = new char[(int) strlen(package_name) + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:172:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* path = new char[(int) strlen(radical) + (int) strlen(package_name) + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:172:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* path = new char[(int) strlen(radical) + (int) strlen(package_name) + 1]; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:353:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int) strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:356:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(_name, name, len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:443:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return (u8)osSupport::read(_fd, (char*)data, size, offset) == size; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:497:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(module); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:502:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(next, module, length); next += length; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:510:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(parent); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:514:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(next, parent, length); next += length; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:520:14: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(base); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:524:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(next, base, length); next += length; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:530:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). length = strlen(extension); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/imageFile.cpp:535:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(next, extension, length); next += length; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:117:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t moduleNameLen = strlen(module_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/jimage.cpp:118:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t nameLen = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjimage/osSupport.hpp:62:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). static jlong read(jint fd, char *buf, jlong nBytes, jlong offset); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/args.c:611:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ctx.eob = case_data + strlen(case_data); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:71:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). #define JLI_StrLen(p1) strlen((p1)) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/jli_util.h:78:33: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). #define JLI_StrNCpy(p1, p2, p3) strncpy((p1), (p2), (p3)) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:69:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((size_t)(read(fd, in, (unsigned int)entry->csize)) != entry->csize) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:140:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). && read(fd, buf, count) == (jlong) count); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:253:9: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, eb, ENDHDR) < 0) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:278:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((bytes = read(fd, buffer, (unsigned int)len)) < 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:373:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((bytes = read(fd, bp, MINREAD)) < 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:395:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((res = read(fd, bp + bytes, MINREAD)) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:407:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if ((res = read(fd, bp + bytes, read_size)) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/parse_manifest.c:425:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read(fd, locbuf, LOCHDR) < 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:216:1: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal(const char *s1, const char *s2) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:227:10: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. (equal(filename + len - 3, "jar") || data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:228:10: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal(filename + len - 3, "JAR")) && data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:340:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (equal((*argv)[i], "-cp") || data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libjli/wildcard.c:341:13: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. equal((*argv)[i], "-classpath")) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:640:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bucket->name = malloc(strlen(name) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:701:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bucket->name = malloc(strlen(name) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_code.c:2122:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for ( p = stack_operands + strlen(stack_operands); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libverify/check_format.c:235:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). unsigned int length = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:127:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fname_length = strlen(fname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:181:12: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return read(zfd, buf, nbytes); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:803:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(name) >= PATH_MAX) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1148:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return ZIP_GetEntry2(zip, name, (jint)strlen(name), JNI_FALSE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zip_util.c:1474:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *nameLenP = (jint)strlen(entry->name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzguts.h:72:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). # define read _read data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:223:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen((const char *)path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:629:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) == data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:629:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((state->msg = (char *)malloc(strlen(state->path) + strlen(msg) + 3)) == data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:635:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzlib.c:635:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (void)snprintf(state->msg, strlen(state->path) + strlen(msg) + 3, data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzread.c:59:15: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ret = read(state->fd, buf + *have, get); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:394:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:450:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(next); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/share/native/libzip/zlib/gzwrite.c:548:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(next); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1099:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(result, " [deoptimized frame]; ", size - strlen(result) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1099:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(result, " [deoptimized frame]; ", size - strlen(result) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1101:5: [1] (buffer) strncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf, or automatically resizing strings. Risk is low because the source is a constant string. strncat(result, " [compiled] ", size - strlen(result) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1101:44: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strncat(result, " [compiled] ", size - strlen(result) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1210:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(result, name, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1213:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(result, "<unknown BufferBlob>", size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1221:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(result, name, size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_db/libjvm_db.c:1224:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). Risk is low because the source is a constant string. strncpy(result, "<unknown CodeBlob>", size); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:130:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(fd, buf, len), ret); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:372:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(PROTOCOL_VERSION) + strlen(cstr) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:372:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(PROTOCOL_VERSION) + strlen(cstr) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:377:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pos += strlen(PROTOCOL_VERSION)+1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libjvm_dtrace/jvm_dtrace.c:392:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(cstr); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c:111:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c:118:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c:125:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(fstype); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/solaris/native/libnio/fs/SolarisNativeDispatcher.c:132:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(options); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/launcher/jexec.c:321:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t count = read(fd, buf, CHUNK_SIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessEnvironment_md.c:74:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize valLength = strlen(valBeg); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:447:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). cp += strlen(cp) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:714:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(prargs, psinfo.pr_psargs, PRARGSZ); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:721:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(prargs, psinfo.pr_fname, PRARGSZ); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:184:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t pathsize = strlen(path) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:258:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fmtsize = sizeof(IOE_FORMAT) + strlen(detail) + 3 * sizeof(errnum); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:316:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). bytes += strlen(*a)+1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:334:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = strlen(*a) +1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/ProcessImpl_md.c:425:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sp.dirlen = c->pdir == 0 ? 0 : strlen(c->pdir)+1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:97:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return pos + strlen(zidir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:109:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path = (char *) malloc(strlen(dir) + strlen(name) + 2); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:109:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). path = (char *) malloc(strlen(dir) + strlen(name) + 2); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:113:19: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. return strcat(strcat(strcpy(path, dir), "/"), name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:228:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(fd, dbuf, size), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:277:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(line) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:343:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(fd, buf, size), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:457:25: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(iop->fd, (void *)iop->buffer, BUFFER_SIZE), len); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:647:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(fd, buf, size), res); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:670:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t tz_key_len = strlen(tz_key); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:703:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tz_len = (temp_tz == NULL) ? strlen(tz) : temp_tz - tz; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/TimeZone_md.c:709:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((strlen(java_home_dir) + 15) > PATH_MAX) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:111:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). p += strlen(p) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:197:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(original) > PATH_MAX) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:215:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, original, PATH_MAX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:218:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). end = path + strlen(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:249:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int rn = strlen(r); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/canonicalize_md.c:250:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (rn + (int)strlen(p) >= len) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:149:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ssize_t n = read(fd, buf, remaining); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:254:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int filelen = strlen(file); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/childproc.c:259:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int dirlen = strlen(dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.c:103:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = (char *)ps + strlen(ps) - 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/io_util_md.c:170:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read(fd, buf, len), result); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:114:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). temp = malloc(strlen(lc) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:145:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). temp = malloc(strlen(lc) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:177:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). encoding_variant = malloc(strlen(temp)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:196:30: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). temp = realloc(temp, strlen(p)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:205:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). encoding_variant = realloc(encoding_variant, strlen(temp)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:240:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *std_language = malloc(strlen(language)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:248:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). *std_country = malloc(strlen(country)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:445:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *os_version = malloc(strlen(name.version) + data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:446:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(name.release) + 2); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/java_props_md.c:449:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(os_version, "."); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c:57:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(jniEntryName, "_"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjava/jni_util_md.c:67:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libjimage/osSupport_unix.cpp:66:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). jlong osSupport::read(jint fd, char *buf, jlong nBytes, jlong offset) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:268:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (s != NULL && strlen(s) <= strlen(chost)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:268:46: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (s != NULL && strlen(s) <= strlen(chost)) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:269:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strcasecmp(chost+(strlen(chost) - strlen(s)), s) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:269:55: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strcasecmp(chost+(strlen(chost) - strlen(s)), s) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:371:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). protoLen = strlen(cproto); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/DefaultProxySelector.c:372:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). hostLen = strlen(chost); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:247:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(searchName, name_utf, IFNAMESIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:888:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, if_name, IFNAMESIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:951:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(currif->name, name, IFNAMESIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:983:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(currif->name, vname, IFNAMESIZE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1212:16: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %08x %02x %02x %02x %20s\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1250:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.ifr_name, name, sizeof(if2.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1276:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1299:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1313:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1487:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if6.ifr_name, ifreqP->ifr_name, sizeof(if6.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1580:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1594:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1644:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.lifr_name, ifname, sizeof(if2.lifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1801:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.lifr_name, name, sizeof(if2.lifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1887:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.lifr_name, ifname, sizeof(if2.lifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1936:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.lifr_name, ifname, sizeof(if2.lifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:1950:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.lifr_name, ifname, sizeof(if2.lifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:2083:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.ifr_name, name, sizeof(if2.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:2133:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/NetworkInterface.c:2147:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:156:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy (buf, param, sizeof(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:430:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(format) + strlen(hostname) + strlen(error_string) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:430:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(format) + strlen(hostname) + strlen(error_string) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:430:48: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size = strlen(format) + strlen(hostname) + strlen(error_string) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:537:12: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %02x " data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:610:20: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %08x %02x %02x %02x %20s\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:656:12: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. while (fscanf (f, "%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x " data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1038:12: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %02x " data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnet/net_util_md.c:1125:20: [1] (buffer) fscanf: It's unclear if the %s limit in the format string is small enough (CWE-120). Check that the limit is sufficiently small, or use a different input function. while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %08x %02x %02x %02x %20s\n", data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/FileDispatcherImpl.c:85:34: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return convertReturnVal(env, read(fd, buf, len), JNI_TRUE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c:121:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int n = read(fd, buf, sizeof(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/IOUtil.c:137:11: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). res = read(fd, buf, 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/ch/Net.c:131:9: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(uts.sysname, "?"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixCopyFile.c:61:21: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read((int)src, &buf, sizeof(buf)), n); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:322:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize len = (jsize)strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:339:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(tmpbuf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:492:17: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). RESTARTABLE(read((int)fd, bufp, (size_t)nbytes), n); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:787:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize len = strlen(ptr->d_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:926:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (jsize)strlen(target); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:947:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize len = (jsize)strlen(resolved); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:1088:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize len = strlen(p->pw_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:1140:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize len = strlen(g->gr_name); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:255:51: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, pattern, (jsize)wcslen(pattern)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:291:57: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp_string = (*env)->NewString(env, buf, (jsize)wcslen(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:301:61: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp_string = (*env)->NewString(env, buf, (jsize)wcslen(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:388:50: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ret = (*env)->NewString(env, pattern, (jsize)wcslen(pattern)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:428:51: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, buf, (jsize)wcslen(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:491:51: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, buf, (jsize)wcslen(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:512:51: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, buf, (jsize)wcslen(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:575:51: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, buf, (jsize)wcslen(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:753:51: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, buf, (jsize)wcslen(buf)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:844:66: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). tmp_string = (*env)->NewString(env, name, (jsize)wcslen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:862:26: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcscat_s(ret, BUFLEN-wcslen(ret), number); // "+12.34" data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:864:26: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcscat_s(ret, BUFLEN-wcslen(ret), fix); // "+12.34$" data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:865:26: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcscat_s(ret, BUFLEN-wcslen(ret), L";"); // "+12.34$;" data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:867:26: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcscat_s(ret, BUFLEN-wcslen(ret), fix); // "+12.34$;(" data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:868:26: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcscat_s(ret, BUFLEN-wcslen(ret), number); // "+12.34$;(12.34" data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:870:26: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcscat_s(ret, BUFLEN-wcslen(ret), fix); // "+12.34$;(12.34$)" data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:1066:60: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (*env)->NewString(env, era, (jsize)wcslen(era))); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:1075:40: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize len = (jsize)wcslen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:479:47: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (jsize)wcslen(exeName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:486:55: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (jsize)wcslen(longPath)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:530:63: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = (*env)->NewString(env, (const jchar *)str, (jsize)wcslen(str)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:533:9: [1] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Risk is low because the source is a constant character. wcscat(domain, L"\\"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:535:66: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = (*env)->NewString(env, (const jchar *)domain, (jsize)wcslen(domain)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:443:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mapFileName = malloc(strlen(java_home_dir) + strlen(MAPPINGS_FILE) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/TimeZone_md.c:443:50: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). mapFileName = malloc(strlen(java_home_dir) + strlen(MAPPINGS_FILE) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:259:24: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)wcslen(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:265:60: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rv = (*env)->NewString(env, cp, (jsize)wcslen(cp)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:272:63: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rv = (*env)->NewString(env, canonicalPath, (jsize)wcslen(canonicalPath)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:291:28: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int len = (int)wcslen(canonicalPrefix) + MAX_PATH; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:298:62: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rv = (*env)->NewString(env, cp, (jsize)wcslen(cp)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:307:67: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). rv = (*env)->NewString(env, canonicalPath, (jsize)wcslen(canonicalPath)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:666:36: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). search_path = (WCHAR*)malloc(2*wcslen(pathbuf) + 6); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:685:16: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = (int)wcslen(search_path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:697:9: [1] (buffer) wcscat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Risk is low because the source is a constant character. wcscat(search_path, L"*"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:728:41: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (jsize)wcslen(find_data.cFileName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:877:44: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ret = (*env)->NewString(env, p, (jsize)wcslen(p)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:183:9: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (wcslen(p) > 4 && !wcsncmp(p, L"\\\\.\\", 4)) data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:246:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(orig_path) >= MAX_PATH) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:292:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *p = path + strlen(path); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:337:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(path) == 3 && path[1] == ':' && path[2] == '\\') { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:363:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fd.cFileName + strlen(fd.cFileName)))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:370:60: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(dst = cp(dst, dend, '\0', src, src + strlen(src)))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:415:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). canonicalPrefix + strlen(canonicalPrefix)))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:420:39: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fd.cFileName + strlen(fd.cFileName)))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:425:56: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(dst = cp(dst, dend, '\0', src, src + strlen(src)))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:520:29: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((pathlen = (int)wcslen(path)) > MAX_PATH - 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:532:44: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fd.cFileName + wcslen(fd.cFileName)))){ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:539:61: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(dst = wcp(dst, dend, L'\0', src, src + wcslen(src)))){ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:579:23: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if ((pathlen=(int)wcslen(pathWithCanonicalPrefix)) > MAX_PATH - 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:590:43: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). canonicalPrefix + wcslen(canonicalPrefix)))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:595:40: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). fd.cFileName + wcslen(fd.cFileName)))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/canonicalize_md.c:600:58: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (!(dst = wcp(dst, dend, L'\0', src, src + wcslen(src)))) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/dirent_md.c:66:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirp->path = (char *)malloc(strlen(dirname) + 5); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:95:27: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). dirlen = (int)wcslen(dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:106:40: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curDirLenCached = (int)wcslen(dir); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:156:24: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). pathlen = (int)wcslen(ps); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:490:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/io_util_md.c:499:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return (jint)read; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:125:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(systemPath) + strlen(gb18030Font) < MAX_PATH + 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:125:38: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(systemPath) + strlen(gb18030Font) < MAX_PATH + 1) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:182:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(ret, "-"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:293:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(*script) != 4) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:420:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = MAX_PATH - (UINT)strlen("\\kernel32.dll") - 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:425:13: [1] (buffer) wcsncat: Easily used incorrectly (e.g., incorrectly computing the correct maximum size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or automatically resizing strings. Risk is low because the source is a constant string. wcsncat(kernel32_path, L"\\kernel32.dll", MAX_PATH - ret); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:606:30: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (uname != NULL && wcslen(uname) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/java_props_md.c:749:49: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, wcstr, (jsize)wcslen(wcstr)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:47:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(path, "\\"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jdk_util_md.c:54:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(path, "\\"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:59:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(jniEntryName, sym, (p - sym)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:62:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(jniEntryName, "_"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjava/jni_util_md.c:68:13: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(jniEntryName, "_"); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjimage/osSupport_windows.cpp:67:18: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). jlong osSupport::read(jint fd, char *buf, jlong nBytes, jlong offset) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:283:13: [1] (buffer) getchar: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). int c = getchar(); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:326:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* cptr = (char*) malloc(strlen(argv[0]) + sizeof(char) * 3 + strlen(cmdline) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/cmdtoargs.c:326:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char* cptr = (char*) malloc(strlen(argv[0]) + sizeof(char) * 3 + strlen(cmdline) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:512:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wnamelen = strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:526:24: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wfullnamelen = wcslen(wfullname); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libjli/java_md.c:528:22: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). elplen = wcslen(ELP_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DefaultProxySelector.c:271:29: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t maxlen = wcslen(s); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/DefaultProxySelector.c:331:71: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jhost = (*env)->NewString(env, head->host, (jsize)wcslen(head->host)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthSequence.c:123:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AuthId.UserLength = (unsigned long) strlen( pUser ); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthSequence.c:128:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AuthId.PasswordLength = (unsigned long) strlen( pPassword ); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NTLMAuthSequence.c:133:51: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). AuthId.DomainLength = (unsigned long) strlen( pDomain ); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:278:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). curr->name = (char *)malloc(strlen(dev_name) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:302:13: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(curr->displayName, ifrowP->bDescr, ifrowP->dwDescrLen); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface.c:545:47: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (jsize)wcslen ((PWCHAR)ifs->displayName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:356:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nif->name = malloc (strlen(newname)+1); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:357:52: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). nif->displayName = malloc (wcslen(ptr->FriendlyName)*2+2); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:542:48: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (jsize)wcslen ((PWCHAR)ifs->displayName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:62:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(s1)+1; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:65:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len + strlen(s2) > MAX_STR_LEN) /* insufficient space */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:69:9: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(s1, " "); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:113:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(result) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:179:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (((ret != ERROR_SUCCESS) || (strlen(result) == 0)) && data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:200:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (((ret != ERROR_SUCCESS) || (strlen(result) == 0)) && data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:65:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* receives number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:84:40: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return convertReturnVal(env, (jint)read, JNI_TRUE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:113:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* receives number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:135:45: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return convertLongReturnVal(env, (jlong)read, JNI_TRUE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:57:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:70:40: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return convertReturnVal(env, (jint)read, JNI_TRUE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:97:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:99:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:100:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). totalRead += read; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:102:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read < num) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:151:24: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:174:40: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return convertReturnVal(env, (jint)read, JNI_TRUE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c:172:28: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c:183:13: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). if (read > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/IOUtil.c:184:26: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). totalRead += read; data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/Iocp.c:145:70: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, (const jchar *)message, (jsize)wcslen(message)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:65:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* receives number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:79:40: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return convertReturnVal(env, (jint)read, JNI_TRUE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:118:14: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). &read, /* receives number of bytes read */ data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:135:45: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return convertLongReturnVal(env, (jlong)read, JNI_TRUE); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/RegistryFileTypeDetector.c:54:36: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jsize len = (jsize)wcslen((WCHAR*)data); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:180:70: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, (const jchar *)message, (jsize)wcslen(message)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:313:70: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jstring name = (*env)->NewString(env, data.cFileName, (jsize)wcslen(data.cFileName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:346:63: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, data->cFileName, (jsize)wcslen(data->cFileName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:364:72: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jstring name = (*env)->NewString(env, data.cStreamName, (jsize)wcslen(data.cStreamName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:387:64: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, data.cStreamName, (jsize)wcslen(data.cStreamName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:542:72: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = (*env)->NewString(env, (const jchar *)fileSystemName, (jsize)wcslen(fileSystemName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:546:68: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = (*env)->NewString(env, (const jchar *)volumeName, (jsize)wcslen(volumeName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:629:73: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return (*env)->NewString(env, (const jchar *)volumeName, (jsize)wcslen(volumeName)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:829:62: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = (*env)->NewString(env, (const jchar *)domain, (jsize)wcslen(domain)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:834:60: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s = (*env)->NewString(env, (const jchar *)name, (jsize)wcslen(name)); data/openjdk-11-jre-dcevm-11.0.9+1/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:883:20: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (jsize)wcslen(string)); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2513:10: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). return strncpy(dest, src, n); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-port.h:2535:27: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). return static_cast<int>(read(fd, buf, count)); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h:67:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (s.compare(0, strlen(prefix), prefix) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h:68:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). std::string::size_type end = s.find("::", strlen(prefix)); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h:71:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s.erase(strlen("std"), end - strlen("std")); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/include/gtest/internal/gtest-type-util.h:71:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). s.erase(strlen("std"), end - strlen("std")); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:656:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t full_regex_len = strlen(regex) + 10; data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-port.cc:910:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(regex); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-printers.cc:334:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PrintCharsAsStringTo(s, strlen(s), os); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest-printers.cc:351:34: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). PrintCharsAsStringTo(s, std::wcslen(s), os); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:907:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const int length = strlen(ansi); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:1873:34: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). num_chars = static_cast<int>(wcslen(str)); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:3665:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). segment = next_segment + strlen("]]>"); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:4250:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). result.reserve(strlen(str) + 1); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5569:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t prefix_len = strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/test/fmw/gtest/src/gtest.cc:5981:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). else if (temp_dir[strlen(temp_dir) - 1] == '\\') data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:50:31: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strncmp(str, prefix, strlen(prefix)) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:54:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t suffix_len = strlen(suffix); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:55:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t str_len = strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:126:34: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strncmp(argv[i], "-jdk", strlen(argv[i])) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:130:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return argv[i] + strlen("--jdk="); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:133:24: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return argv[i] + strlen("-jdk:"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:143:33: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const char* v = argv[i] + strlen("-new-thread"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:144:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(v) == 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:227:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(java_home) + strlen("/lib/jli/libjli.dylib") + 1; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:227:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(java_home) + strlen("/lib/jli/libjli.dylib") + 1; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:235:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(java_home) + strlen(java_home_var) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/gtestMain.cpp:235:36: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(java_home) + strlen(java_home_var) + 2; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestUtils.inline.hpp:101:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). while (ret != NULL && buf[strlen(buf) - 1] != '\n' && !feof(fp)) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/logTestUtils.inline.hpp:125:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t match_len = strlen(substrs[idx]); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:100:17: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASSERT_LT(strlen(expected_buf), sizeof(expected_buf)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:101:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ret = jio_snprintf(expected_buf + strlen(expected_buf), data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:102:49: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sizeof(expected_buf) - strlen(expected_buf), data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logConfiguration.cpp:104:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(expected_buf) > 0 ? "," : "", data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp:62:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). EXPECT_EQ(3, read) << "Invalid uptime decoration: " << uptime; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp:136:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ASSERT_EQ(7, read) << "Invalid format: " << timestr; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logDecorations.cpp:173:16: [1] (buffer) read: Check buffer boundaries if used in a loop including recursive loops (CWE-120, CWE-20). ASSERT_EQ(9, read) << "Invalid format: " << timestr; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logFileOutput.cpp:114:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(filename) + 3; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:148:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (size_t i = strlen(start_marker); i < size; i++) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:151:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sprintf(data + size - strlen(end_marker) - 1, "%s", end_marker); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logMessageTest.cpp:187:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t prefix_len = strlen(prefix); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logStream.cpp:100:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASSERT_TRUE(strlen(line_buffer) == 1*M - 1); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSet.cpp:166:11: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (equal) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:38:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jio_snprintf(expected + strlen(expected), data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:39:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sizeof(expected) - strlen(expected), data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:61:29: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jio_snprintf(expected + strlen(expected), data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:62:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). sizeof(expected) - strlen(expected), data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/memory/test_guardedMemory.cpp:137:19: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t str_sz = strlen(str) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:110:16: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = wcslen(to_copy); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:116:17: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return dest + wcslen(to_copy); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:286:51: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). os::snprintf(buf, JVM_MAXPATHLEN, "%d", (int) wcslen(path)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:303:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t buf_len = strlen(buf); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:371:56: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). printf("Checking \"%ls\" (%d chars):\n", path, (int) wcslen(path)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:372:64: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). printf("_wfullpath %ls (%d chars)\n", abs, (int) wcslen(abs)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:432:23: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int cwd_len = (int) wcslen(cwd); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/runtime/test_os_windows.cpp:433:30: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). int dir_prefix_len = (int) wcslen(dir_prefix); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_ostream.cpp:41:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). static const size_t len_lorem = strlen(lorem); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:77:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASSERT_TRUE(strncmp(expected, buffer, strlen(expected)) == 0); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_spinYield.cpp:92:41: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASSERT_TRUE(strncmp(expected, buffer, strlen(expected)) == 0); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_stringUtils.cpp:32:54: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). EXPECT_NEAR(0.95349, StringUtils::similarity(str1, strlen(str1), str2, strlen(str2)), 1e-5); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_stringUtils.cpp:32:74: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). EXPECT_NEAR(0.95349, StringUtils::similarity(str1, strlen(str1), str2, strlen(str2)), 1e-5); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:39:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASSERT_EQ(strlen(res), (size_t) 9) << "string should be truncated here"; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:42:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASSERT_EQ(strlen(res), (size_t) 15) << "string should be truncated here"; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:45:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASSERT_EQ(strlen(res), (size_t) 18) << "string should be truncated here"; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/gtest/utilities/test_utf8.cpp:49:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). ASSERT_EQ(strlen(res), (size_t) 3 * 19) << "string should end here"; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:239:12: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). optlen = strlen(CLASS_PATH_OPT) + strlen(javaclasspath) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:239:37: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). optlen = strlen(CLASS_PATH_OPT) + strlen(javaclasspath) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/ThreadSignalMask/exeThreadSignalMask.c:172:3: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(path, argv[1], PATH_MAX); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/runtime/handshake/libHandshakeTransitionTest.c:38:3: [1] (obsolete) usleep: This C routine is considered obsolete (as opposed to the shell command by the same name). The interaction of this function with SIGALRM and other timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead. usleep(ms*1000); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:98:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). char *fieldName = (char *)malloc(strlen(name) + 16); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:66:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t n = strlen(FROM); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:119:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(to) == strlen(from) && data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:119:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(to) == strlen(from) && data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:120:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(class_name) > 0 && data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:121:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(to) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent00.c:55:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(optionsString); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent01.c:58:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t length = strlen(optionsString); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/framepop002.c:90:53: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). return strncmp(inf.name, TEST_THREAD_NAME_BASE, strlen(TEST_THREAD_NAME_BASE)) == 0; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.c:239:35: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (ind == 4 || strlen(inf.name) == data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.c:240:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strlen(thrInfo[ind].thrNames[i]))); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.c:117:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (extList[i].id != NULL && strlen(extList[i].id) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.c:143:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (extList[i].short_description != NULL && strlen(extList[i].short_description) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.c:160:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(extList[i].params[j].name) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.c:128:42: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (extList[i].id != NULL && strlen(extList[i].id) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.c:154:57: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (extList[i].short_description != NULL && strlen(extList[i].short_description) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.c:171:32: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). || strlen(extList[i].params[j].name) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/getthrdgrpchld001.c:247:28: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t threadNameLen = strlen(expectedThreadName); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.c:101:25: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (ind < 2 && strlen(inf.name) != strlen(threads[ind].name))) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.c:101:45: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). (ind < 2 && strlen(inf.name) != strlen(threads[ind].name))) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.c:263:29: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if(value_length != (jint) wcslen(STRING)) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.c:268:19: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). wcslen(STRING)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/HeapFilter.c:284:25: [1] (buffer) wcslen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). field->size = (int) wcslen((wchar_t*)field->value); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/resumethrdlst001.c:178:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/resumethrdlst002.c:193:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c:102:47: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER))) data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c:102:62: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER))) data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c:102:80: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER))) data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.c:102:95: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER))) data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.c:123:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(fld_name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.c:125:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len != strlen(fields[0].name) || !isdigit(fld_name[len - 1])) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.c:119:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(fld_name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.c:121:16: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (len != strlen(fields[0].name) || !isdigit(fld_name[len - 1])) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/setlocal004.c:87:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(table[i].name) != 1) continue; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/suspendthrdlst001.c:170:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/suspendthrdlst002.c:185:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t len = strlen(name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.c:66:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(rec->name, name, NAME_LENGTH); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.c:81:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(rec->name, name, NAME_LENGTH); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:463:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(chbuffer, ""); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.c:498:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(chbuffer, ""); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:463:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(chbuffer, ""); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.c:498:5: [1] (buffer) strcpy: Does not check for buffer overflows when copying to destination [MS-banned] (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused). Risk is low because the source is a constant character. strcpy(chbuffer, ""); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c:216:22: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). size_t PFX_LEN = strlen(TEST_THREAD_NAME_PREFIX); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.c:225:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(thr_info->name) < PFX_LEN || data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.c:158:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.c:104:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:207:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.c:212:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(segment, options, (size_t) sizeof(segment)/sizeof(char)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.c:112:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.c:127:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.c:96:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.c:131:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.c:131:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.c:211:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/heapref.c:427:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(classSig); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/refignore.c:425:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). const size_t len = strlen(classSig); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.c:161:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.c:135:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (options && strlen(options) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c:175:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(segment1, p_segment1, (size_t) sizeof(segment1)/sizeof(char)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.c:182:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(segment2, p_segment2, (size_t) sizeof(segment2)/sizeof(char)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c:175:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(segment1, p_segment1, (size_t) sizeof(segment1)/sizeof(char)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.c:182:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(segment2, p_segment2, (size_t) sizeof(segment2)/sizeof(char)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.c:1067:23: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). u2 len = (u2) strlen(str); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c:107:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). name_len = (jint) strlen(name) + 1; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.c:402:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). package_name_length = strlen(package_name); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:77:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) > 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:83:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:101:13: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:150:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(name, opt, opt_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:152:9: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(value, val, val_len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:226:11: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). len = strlen(options); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:233:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(context.options.string, options, len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:333:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.c:358:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(value) <= 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:159:7: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(msg_buf2, msg_buf, sizeof(msg_buf2)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:165:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). } else if (strlen(msg_buf2) != 0) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.c:166:18: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). msg_buf2[strlen(msg_buf2)-1] = '\n'; // Make sure we have a newline char at the end. data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:77:9: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). if (strlen(element->str[allocs]) != data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:81:20: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). strsize += strlen(element->str[allocs])+1; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:82:21: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (k = 0; k < strlen(element->str[allocs]); k++) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:101:27: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for (k=0; k < strlen(element->str[j]); k++) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.c:229:14: [1] (buffer) equal: Function does not check the second iterator for over-read conditions (CWE-126). This function is often discouraged by most C++ coding standards in favor of its safer alternatives provided since C++14. Consider using a form of this function that checks the second iterator before potentially overflowing it. if (!equal) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:86:10: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). jint strlen; data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:98:26: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). str = (char *)malloc(strlen*sizeof(char)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:113:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(i=0;i<strlen;i++) data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.c:116:15: [1] (buffer) strlen: Does not handle strings that are not \0-terminated; if given one it may perform an over-read (it could cause a crash if unprotected) (CWE-126). for(i=0;i<strlen; i++) { data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c:43:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(*dst, pStr, len); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c:69:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mn->methodName, szName, sizeof(mn->methodName)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.c:70:5: [1] (buffer) strncpy: Easily used incorrectly; doesn't always \0-terminate or check for invalid pointers [MS-banned] (CWE-120). strncpy(mn->classSig, szSignature, sizeof(mn->classSig)); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:149:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(path, "\\"); data/openjdk-11-jre-dcevm-11.0.9+1/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.c:160:17: [1] (buffer) strcat: Does not check for buffer overflows when concatenating to destination [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or snprintf (warning: strncat is easily misused). Risk is low because the source is a constant character. strcat(path, "\\"); ANALYSIS SUMMARY: Hits = 5713 Lines analyzed = 1576946 in approximately 38.73 seconds (40711 lines/second) Physical Source Lines of Code (SLOC) = 1047664 Hits@level = [0] 15391 [1] 2385 [2] 1851 [3] 204 [4] 1256 [5] 17 Hits@level+ = [0+] 21104 [1+] 5713 [2+] 3328 [3+] 1477 [4+] 1273 [5+] 17 Hits/KSLOC@level+ = [0+] 20.1439 [1+] 5.45308 [2+] 3.17659 [3+] 1.4098 [4+] 1.21508 [5+] 0.0162266 Dot directories skipped = 3 (--followdotdir overrides) Minimum risk level = 1 Not every hit is necessarily a security vulnerability. There may be other security vulnerabilities; review your code! See 'Secure Programming HOWTO' (https://dwheeler.com/secure-programs) for more information.