Flawfinder version 2.0.10, (C) 2001-2019 David A. Wheeler.
Number of rules (primarily dangerous function names) in C/C++ ruleset: 223
Examining data/openjdk-16-16~14/test/jdk/jdk/internal/loader/NativeLibraries/libnativeLibrariesTest.c
Examining data/openjdk-16-16~14/test/jdk/tools/jlink/plugins/StripNativeDebugSymbolsPlugin/src/libFib.c
Examining data/openjdk-16-16~14/test/jdk/tools/launcher/exeJniInvocationTest.c
Examining data/openjdk-16-16~14/test/jdk/tools/launcher/exeJliLaunchTest.c
Examining data/openjdk-16-16~14/test/jdk/javax/management/loading/LibraryLoader/jar_src/RandomGen.c
Examining data/openjdk-16-16~14/test/jdk/javax/management/loading/LibraryLoader/jar_src/RandomGen.h
Examining data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c
Examining data/openjdk-16-16~14/test/jdk/sun/management/jmxremote/bootstrap/exelauncher.c
Examining data/openjdk-16-16~14/test/jdk/native_sanity/simplenativelib2/libsanity_SimpleNativeLib2.c
Examining data/openjdk-16-16~14/test/jdk/native_sanity/simplenativelauncher/exesanity_SimpleNativeLauncher.c
Examining data/openjdk-16-16~14/test/jdk/native_sanity/simplenativelib/libsanity_SimpleNativeLib.c
Examining data/openjdk-16-16~14/test/jdk/java/lang/reflect/exeCallerAccessTest/exeCallerAccessTest.c
Examining data/openjdk-16-16~14/test/jdk/java/lang/ProcessBuilder/checkHandles/libCheckHandles.c
Examining data/openjdk-16-16~14/test/jdk/java/lang/ClassLoader/nativeLibrary/libnativeLibraryTest.c
Examining data/openjdk-16-16~14/test/jdk/java/lang/String/nativeEncoding/libstringPlatformChars.c
Examining data/openjdk-16-16~14/test/jdk/java/awt/JAWT/myfile.c
Examining data/openjdk-16-16~14/test/jdk/java/awt/JAWT/myfile.cpp
Examining data/openjdk-16-16~14/test/jdk/java/awt/Window/MainKeyWindowTest/libTestMainKeyWindow.c
Examining data/openjdk-16-16~14/test/jdk/java/foreign/libNativeAccess.c
Examining data/openjdk-16-16~14/test/jdk/java/net/Socket/libNativeThread.c
Examining data/openjdk-16-16~14/test/jdk/java/nio/channels/FileChannel/directio/libDirectIO.c
Examining data/openjdk-16-16~14/test/jdk/java/nio/channels/spi/SelectorProvider/inheritedChannel/libInheritedChannel.c
Examining data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c
Examining data/openjdk-16-16~14/test/failure_handler/src/windows/native/libtimeoutHandler/GatherProcessInfoTimeoutHandler.c
Examining data/openjdk-16-16~14/test/lib-test/jdk/test/lib/process/exejvm-test-launcher.c
Examining data/openjdk-16-16~14/test/lib/jdk/test/lib/apps/libLingeredApp.c
Examining data/openjdk-16-16~14/test/micro/org/openjdk/bench/jdk/incubator/foreign/points/support/libJNIPoint.c
Examining data/openjdk-16-16~14/test/micro/org/openjdk/bench/jdk/incubator/foreign/points/support/points.h
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_isPointer.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_removeReference.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_isFloatingPoint.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_isSigned.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_logical.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_enableIf.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_isSame.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_removePointer.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_isArray.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_isConst.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_isVolatile.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_isIntegral.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_removeExtent.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_removeCV.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_decay.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_primitiveConversions.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/metaprogramming/test_conditional.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/classfile/test_AltHashing.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/classfile/test_symbolTable.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logStream.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSet.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logLevel.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_gcTraceTime.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_log.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorations.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorators.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logSelection.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestFixture.hpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTag.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logSelectionList.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logFileOutput.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logOutputList.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestFixture.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/code/test_vtableStub.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/code/test_dependencyContext.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_linux.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_virtualMemoryTracker.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_safepoint_locks.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_vmStructs.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_threads.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_objectMonitor.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_signatureStream.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_semaphore.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_globals.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_synchronizer.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_arguments.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_committed_virtualmemory.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_classLoader.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_perfdata.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_special_flags.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gtestLauncher.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/jfr/precompiled.hpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_networkUtilization.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/compiler/test_directivesParser.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_align.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_bitMap_search.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_spinYield.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_globalCounter.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_globalDefinitions.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_chunkedList.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_valueObjArray.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_bitMap_popcnt.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_growableArray.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_stringUtils.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_population_count.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_json.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_java_arithmetic.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_globalCounter_nested.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_bitMap.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_tribool.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_utf8.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_linkedlist.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_count_leading_zeros.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_singleWriterSynchronizer.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_count_trailing_zeros.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_bitMap_setops.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_lockFreeStack.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_powerOfTwo.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_waitBarrier.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_quicksort.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_bitMap_large.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_ostream.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_concurrentHashtable.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_resourceHash.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/oops/test_oop.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/oops/test_markWord.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/oops/test_typeArrayOop.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/oops/test_arrayOop.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/oops/test_instanceKlass.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/threadHelper.inline.hpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/memory/test_chunkManager.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/memory/test_spaceManager.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/memory/test_virtualspace.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/memory/test_is_metaspace_obj.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/memory/test_guardedMemory.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metachunk.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metaspace_allocation.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metaspace.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zBitField.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zList.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zForwarding.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zPhysicalMemory.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zBitMap.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zAddress.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zVirtualMemory.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zArray.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/z/test_zLiveMap.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_g1Predictions.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_g1Analytics.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_heapRegion.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_g1CodeCacheRemSet.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_g1IHOPControl.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_freeRegionList.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_g1BiasedArray.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_g1FreeIdSet.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/g1/test_g1HeapVerifier.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/parallel/test_psParallelCompact.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/parallel/test_psAdaptiveSizePolicy.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_oopStorageSet.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_collectorPolicy.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_collectedHeap.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_preservedMarks.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_workerDataArray.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_ptrQueueBufferAllocator.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_gcTimer.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_oopStorage_parperf.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_oopStorage.cpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/unittest.hpp
Examining data/openjdk-16-16~14/test/hotspot/gtest/opto/test_mathexact.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/AsyncGetCallTrace/libAsyncGetCallTraceTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/sa/libNoFramePointer.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/dcmd/jvmti/AttachFailed/libHasNoEntryPoint.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/dcmd/jvmti/AttachFailed/libReturnError.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetNamedModule/libGetNamedModuleTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetModulesInfo/libJvmtiGetAllModulesTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ClassLoadPrepare/libMAAClassLoadPrepare.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ThreadStart/libMAAThreadStart.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/ModuleAwareAgents/ClassFileLoadHook/libMAAClassFileLoadHook.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetThreadListStackTraces/libOneGetThreadListStackTraces.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/CanGenerateAllClassHook/libCanGenerateAllClassHook.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetSystemProperty/libJvmtiGetSystemPropertyTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/StartPhase/AllowedFunctions/libAllowedFunctions.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/SuspendWithCurrentThread/libSuspendWithCurrentThread.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GenerateEvents/libGenerateEvents2.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GenerateEvents/libGenerateEvents1.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/VMEvent/libVMEventTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/NotifyFramePop/libNotifyFramePopTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/IsModifiableModule/libIsModifiableModuleTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetClassMethods/libOverpassMethods.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/CompiledMethodLoad/libCompiledZombie.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleReads/libAddModuleReadsTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetLocalVariable/libGetLocalWithoutSuspendTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetLocalVariable/libGetLocalVars.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/RedefineClasses/libRedefineDoubleDelete.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleUsesAndProvides/libAddModuleUsesAndProvidesTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorInfo/libGetOwnedMonitorInfoTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorInfo/libGetOwnedMonitorInfoWithEATest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HiddenClass/libHiddenClassSigTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorStackDepthInfo/libGetOwnedMonitorStackDepthInfoTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetOwnedMonitorStackDepthInfo/libGetOwnedMonitorStackDepthInfoWithEATest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/signal/exesigtest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/Nestmates/libNestmatesJNI.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/ToStringInInterfaceTest/libToStringTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/FindClass/libbootLoaderTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/8033445/libDefaultMethods.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/PrivateInterfaceMethods/libPrivateInterfaceMethods.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/CalleeSavedRegisters/exeFPRegs.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/checked/libTestCheckedEnsureLocalCapacity.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/checked/libTestCheckedJniExceptionCheck.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/ReturnJNIWeak/libReturnJNIWeak.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/FindClassUtf8/libFindClassUtf8.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/8025979/libUninitializedStrings.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/CallWithJNIWeak/libCallWithJNIWeak.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/terminatedThread/libterminatedThread.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/atExit/libatExit.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/FastGetField/libFastGetField.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jni/registerNativesWarning/libregisterNativesWarning.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/modules/getModuleJNI/libGetModule.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/logging/loadLibraryTest/libLoadLibraryClass.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/SameObject/libSameObject.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/handshake/libHandshakeTransitionTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/clinit/libClassInitBarrier.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/execstack/libtest-rw.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/execstack/libtest-rwx.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/BoolReturn/libNativeSmallIntCalls.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/BoolReturn/libJNIBooleanTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/exceptionMsgs/NoClassDefFoundError/libNoClassDefFoundErrorTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/exceptionMsgs/ArrayIndexOutOfBoundsException/libArrayIndexOutOfBoundsExceptionTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/exceptionMsgs/ArrayStoreException/libArrayStoreExceptionTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/TLS/exestack-tls.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/cds/appcds/jvmti/dumpingWithAgent/libAddToSystemCLSearchOnLoad.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/runtime/jsig/libTestJNI.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/floatingpoint/libTestFloatSyncJNIArgs.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/floatingpoint/libTestFloatJNIArgs.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/calls/common/libCallsNative.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/calls/libTestDirtyInt.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/runtime/criticalnatives/argumentcorruption/libCNCheckLongArgs.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/runtime/criticalnatives/lookup/libCNLookUp.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/jvmci/jdk.vm.ci.code.test/libNativeCallTest.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/testlibrary/rtm/libXAbortProvoker.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/compiler/jsr292/cr8026328/libTest8026328.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/cslocker/libTestCSLocker.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/libCriticalNative.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/shenandoah/jni/libTestPinnedGarbage.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNICritical.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNIGlobalRefs.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/shenandoah/jvmti/libTestHeapDump.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/g1/libTestPeriodicCollectionJNI.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/stress/gclocker/libTestGCLocker.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/stress/TestJNIBlockFullGC/libTestJNIBlockFullGC.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/gc/TestJNIWeak/libTestJNIWeak.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/native_sanity/libJniVersion.c
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/runtime/defmeth/shared/redefineClasses.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/runtime/defmeth/shared/libredefineClasses.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/meth/stress/jni/nativeAndMH/libnativeAndMH.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/meth/stress/jni/nativeAndMH/nativeAndMH.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/stepBreakPopReturn/libstepBreakPopReturn.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/stepBreakPopReturn/stepBreakPopReturn.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/share/IndyRedefineClass.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/indy/func/jvmti/share/libIndyRedefineClass.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/libProcessUtils.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jdi/ThreadReference/forceEarlyReturn/forceEarlyReturn004/libforceEarlyReturn004a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jdi/ThreadReference/forceEarlyReturn/forceEarlyReturn005/libforceEarlyReturn005a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent03.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent02.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent01.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent01.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent03.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/libVirtualMachine07agent02.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine09/agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine09/libVirtualMachine09agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/libThreadController.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/StackTraceController.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/ThreadController.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/libStackTraceController.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/LockingThreads.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libRecursiveMonitoringThread.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/RecursiveMonitoringThread.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/Deadlock.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libDeadlock.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libLockingThreads.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/monitoring/share/thread/libNativeBlockedThread.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jdwp/ThreadReference/ForceEarlyReturn/forceEarlyReturn002/libforceEarlyReturn002a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/gclocker/libgcl001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/jnihelper.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/nsk_strace.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace015.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace015.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace014.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace014.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/strace003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/strace/libstrace011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/JVMDITools.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_thread.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_utils.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_list.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_list.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/native_thread.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/ExceptionCheckingJniEnv.hpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/JNIreferences.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/ExceptionCheckingJniEnv.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/libJNIreferences.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jdi/MonitorEnterExecutor.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jdi/libMonitorEnterExecutor.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/locks/libJNIMonitorLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/locks/JNIMonitorLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/locks/LockingThread.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/locks/libLockingThread.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jpda/libNativeMethodsTestThread.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/aod/aod.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/aod/aod.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/ShortArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libByteArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/CharArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libFloatArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/StringCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libDoubleArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/BooleanArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/ByteArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/DoubleArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libCharArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libShortArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libIntArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libLongArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libStringCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/libBooleanArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/LongArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/IntArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jni/FloatArrayCriticalLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/malloc/MallocLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/malloc/libMallocLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNILocalRefLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIGlobalRefLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIGlobalRefLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIWeakGlobalRefLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIWeakGlobalRefLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNILocalRefLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/libJNIRefLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jniref/JNIRefLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jvmti/libJVMTIAllocLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/gc/lock/jvmti/JVMTIAllocLocker.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/ExceptionCheckingJniEnv/exceptionjni001/libexceptionjni001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/ExceptionCheckingJniEnv/exceptionjni001/exceptionjni001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/JVMDITools.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_common/agent_common.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_common/agent_common.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/unit/libHeap.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/unit/Heap.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/libHotSwap.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/libsystemclssearch_agent.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/agent_tools.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/libbootclssearch_agent.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc002/libmaxloc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc002/maxloc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc001/libmaxloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMaxLocals/maxloc001/maxloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw005/libsetfmodw005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw005/setfmodw005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw006/setfmodw006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw006/libsetfmodw006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/setfmodw003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/libsetfmodw003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/setfmodw004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/libsetfmodw004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw002/libsetfmodw002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw002/setfmodw002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/libsetfmodw001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb003/libsetevntcallb003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb003/setevntcallb003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb001/libsetevntcallb001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb001/setevntcallb001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb002/setevntcallb002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventCallbacks/setevntcallb002/libsetevntcallb002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops001/libgetsysprops001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops001/getsysprops001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops002/libgetsysprops002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperties/getsysprops002/getsysprops002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj005/iterobjreachobj005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj005/libiterobjreachobj005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj001/iterobjreachobj001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj001/libiterobjreachobj001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj003/iterobjreachobj003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj003/libiterobjreachobj003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj002/iterobjreachobj002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj002/libiterobjreachobj002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj004/iterobjreachobj004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverObjectsReachableFromObject/iterobjreachobj004/libiterobjreachobj004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Allocate/alloc001/alloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Allocate/alloc001/liballoc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr001/libgetstacktr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr001/getstacktr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr005/libgetstacktr005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr005/getstacktr005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr002/getstacktr002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr002/libgetstacktr002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr008/getstacktr008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr008/libgetstacktr008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr007/libgetstacktr007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr007/getstacktr007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr009/libgetstacktr009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr009/getstacktr009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr004/libgetstacktr004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr004/getstacktr004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr003/getstacktr003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr003/libgetstacktr003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr006/getstacktr006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetStackTrace/getstacktr006/libgetstacktr006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf004/isintrf004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf004/libisintrf004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf005/isintrf005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsInterface/isintrf005/libisintrf005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab003/liblinetab003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab003/linetab003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab002/liblinetab002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab002/linetab002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab001/liblinetab001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLineNumberTable/linetab001/linetab001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname001/methname001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname001/libmethname001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname003/libmethname003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname003/methname003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname002/methname002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodName/methname002/libmethname002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv002/libdisposeenv002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv002/disposeenv002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv001/libdisposeenv001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DisposeEnvironment/disposeenv001/disposeenv001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/curthrcputime001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/libcurthrcputime001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin002/libisfldsin002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin002/isfldsin002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin003/libisfldsin003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsFieldSynthetic/isfldsin003/isfldsin003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig006/libgetclsig006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig006/getclsig006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig004/getclsig004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig004/libgetclsig004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig005/libgetclsig005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassSignature/getclsig005/getclsig005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc004/fieldacc004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc004/libfieldacc004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc002/fieldacc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc002/libfieldacc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc001/libfieldacc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc001/fieldacc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc003/libfieldacc003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldAccess/fieldacc003/fieldacc003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat004/thrstat004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat004/libthrstat004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat001/libthrstat001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat001/thrstat001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat005/libthrstat005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat005/thrstat005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat003/thrstat003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat003/libthrstat003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat002/thrstat002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadState/thrstat002/libthrstat002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAvailableProcessors/getavailproc001/getavailproc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAvailableProcessors/getavailproc001/libgetavailproc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit002/librawmonexit002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit002/rawmonexit002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/librawmonexit001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit005/rawmonexit005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit005/librawmonexit005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit003/librawmonexit003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit003/rawmonexit003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe006/libpopframe006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe006/popframe006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe011/libpopframe011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe011/popframe011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe001/popframe001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe001/libpopframe001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe003/popframe003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe003/libpopframe003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe005/libpopframe005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe005/popframe005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe008/libpopframe008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe008/popframe008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe002/libpopframe002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe002/popframe002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe004/libpopframe004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe004/popframe004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe010/libpopframe010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe010/popframe010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe009/libpopframe009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe009/popframe009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe007/popframe007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/PopFrame/popframe007/libpopframe007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd001/libintrpthrd001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd001/intrpthrd001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd002/intrpthrd002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd002/libintrpthrd002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd003/libintrpthrd003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/InterruptThread/intrpthrd003/intrpthrd003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod001/libfieldmod001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod001/fieldmod001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod002/fieldmod002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FieldModification/fieldmod002/libfieldmod002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd001/libresumethrd001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd001/resumethrd001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd002/libresumethrd002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThread/resumethrd002/resumethrd002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize001/libargsize001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize001/argsize001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize002/libargsize002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetArgumentsSize/argsize002/argsize002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk002/libclrbrk002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk002/clrbrk002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk005/libclrbrk005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk005/clrbrk005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk001/libclrbrk001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearBreakpoint/clrbrk001/clrbrk001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/agentthr/libagentthr.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/agentthr/agentthr.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/libsetNullVMInit.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLineNumberTable/linetab004/liblinetab004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLineNumberTable/linetab004/linetab004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/OnUnload/JvmtiTest/libOnUnload.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/OnUnload/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/extmech/libextmech.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/extmech/extmech.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/libgetallstktr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/heapref.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/libheapref.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/libredefineCFLH.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/libDispose.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/librawmonitor.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/libnosuspendStackTrace.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/libgc.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/libnosuspendMonitorInfo.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/libenvironment.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/libAddToBootstrapClassLoaderSearch.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/IsSynthetic/issynth001/libIsSyntheticIssynth001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/IsSynthetic/issynth001/issynth001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref004/libfollowref004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref004/followref004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref002/followref002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref002/libfollowref002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref006/followref006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref006/libfollowref006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref001/followref001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref001/libfollowref001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref003/followref003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref003/libfollowref003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref005/followref005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/FollowReferences/followref005/libfollowref005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetConstantPool/getcpool001/libgetcpool001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetConstantPool/getcpool001/getcpool001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/clsldrclss00x/clsldrclss00x.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/clsldrclss00x/libclsldrclss00x.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/libtimers.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/libMethodBind.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/libearlyretfp.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretvoid/earlyretvoid.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretvoid/libearlyretvoid.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretobj/earlyretobj.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretobj/libearlyretobj.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretlong/earlyretlong.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretlong/libearlyretlong.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretstr/earlyretstr.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretstr/libearlyretstr.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretbase/libearlyretbase.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretbase/earlyretbase.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/libearlyretint.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/libStackTrace.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal004/getlocal004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal004/libgetlocal004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal003/getlocal003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetLocalVariable/getlocal003/libgetlocal003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/librefignore.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/refignore.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr002/libagentthr002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr002/agentthr002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr003/libagentthr003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr003/agentthr003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr001/agentthr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RunAgentThread/agentthr001/libagentthr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadLocalStorage/getthrdstor001/getthrdstor001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadLocalStorage/getthrdstor001/libgetthrdstor001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/sharedAgents/simpleAgent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/sharedAgents/libsimpleAgent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/libattach009Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/libattach038Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent01.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent02.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent03.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent01.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/libattach045Agent02.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach020/libattach020Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach020/attach020Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/libattach040Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/libattach002Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/libattach008Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/libattach022Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/attach022Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach012/attach012Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach012/libattach012Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/libattach037Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/attach046Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/libattach046Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach021/attach021Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach021/libattach021Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Agent01.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent01.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Target.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Target.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/libattach015Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/libattach014Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/attach014Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/libattach041Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/libattach039Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach050/attach050Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach050/libattach050Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/attach002aAgent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/libattach002aAgent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/libattach042Agent00.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload002/libagentonload002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload002/agentonload002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload003/agentonload003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload003/libagentonload003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload001/libagentonload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnLoad/agentonload001/agentonload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw002/libclrfldw002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw002/clrfldw002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw001/libclrfldw001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldAccessWatch/clrfldw001/clrfldw001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetVersionNumber/getvern001/libgetvern001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetVersionNumber/getvern001/getvern001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop001/getsysprop001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop001/libgetsysprop001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop002/getsysprop002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSystemProperty/getsysprop002/libgetsysprop002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/libgettime001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/gettime001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetTag/settag001/settag001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetTag/settag001/libsettag001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat006/libgetclstat006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat006/getclstat006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat007/getclstat007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat007/libgetclstat007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat005/getclstat005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassStatus/getclstat005/libgetclstat005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/libnativemethbind001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind002/nativemethbind002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind002/libnativemethbind002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind003/libnativemethbind003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind003/nativemethbind003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind004/nativemethbind004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind004/libnativemethbind004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab002/getjniftab002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab002/libgetjniftab002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab001/getjniftab001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJNIFunctionTable/getjniftab001/libgetjniftab001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/timerinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/libtimerinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/liballthr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr002/liballthr002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr002/allthr002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/SetNativeMethodPrefix002Main.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/SetNativeMethodPrefix002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/libSetNativeMethodPrefix002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix002/libSetNativeMethodPrefix002Main.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix001/SetNativeMethodPrefix001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetNativeMethodPrefix/SetNativeMethodPrefix001/libSetNativeMethodPrefix001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/non-concrete-klass-filter/libNonConcreteKlassFilter.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/non-concrete-klass-filter/NonConcreteKlassFilter.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/concrete-klass-filter/libConcreteKlassFilter.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/concrete-klass-filter/ConcreteKlassFilter.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/HeapFilter.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/libHeapFilter.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/libCallbacks.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/abort/Abort.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/abort/libAbort.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/libsetenvstor002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/setenvstor002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/libsetenvstor003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/setenvstor003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/libsetenvstor001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/setenvstor001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart001/gcstart001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart001/libgcstart001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart002/gcstart002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionStart/gcstart002/libgcstart002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/libsetlocal004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/setlocal004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal001/libsetlocal001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal001/setlocal001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal003/setlocal003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal003/libsetlocal003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal002/libsetlocal002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal002/setlocal002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj003/iterreachobj003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj003/libiterreachobj003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj004/libiterreachobj004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj004/iterreachobj004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj005/libiterreachobj005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj005/iterreachobj005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj001/libiterreachobj001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj001/iterreachobj001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj002/iterreachobj002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverReachableObjects/iterreachobj002/libiterreachobj002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf007/libgetclmdf007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf007/getclmdf007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf004/libgetclmdf004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf004/getclmdf004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf006/getclmdf006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf006/libgetclmdf006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf005/getclmdf005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassModifiers/getclmdf005/libgetclmdf005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls006/libiterinstcls006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls006/iterinstcls006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls002/libiterinstcls002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls002/iterinstcls002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls001/iterinstcls001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls001/libiterinstcls001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls005/libiterinstcls005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls005/iterinstcls005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls004/libiterinstcls004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls004/iterinstcls004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls003/libiterinstcls003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls003/iterinstcls003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls007/iterinstcls007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverInstancesOfClass/iterinstcls007/libiterinstcls007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter004/rawmonenter004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter004/librawmonenter004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter003/librawmonenter003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter003/rawmonenter003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/librawmonenter001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter002/librawmonenter002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter002/rawmonenter002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp001/topthrgrp001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp001/libtopthrgrp001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp002/libtopthrgrp002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTopThreadGroups/topthrgrp002/topthrgrp002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw002/clrfmodw002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw002/libclrfmodw002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw001/clrfmodw001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClearFieldModificationWatch/clrfmodw001/libclrfmodw001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GenerateEvents/genevents001/libgenevents001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GenerateEvents/genevents001/genevents001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/libretransform003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform002/libretransform002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform002/retransform002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/retransform004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/libretransform004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt003/libframecnt003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt003/framecnt003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt002/libframecnt002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt002/framecnt002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt001/framecnt001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameCount/framecnt001/libframecnt001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo001/thrgrpinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo001/libthrgrpinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo002/libthrgrpinfo002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupInfo/thrgrpinfo002/thrgrpinfo002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectSize/objsize001/objsize001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectSize/objsize001/libobjsize001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMInit/vminit001/libvminit001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMInit/vminit001/vminit001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/libobjfree002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/objfree002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/libobjfree001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/objfree001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnvironmentLocalStorage/getenvstor001/getenvstor001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnvironmentLocalStorage/getenvstor001/libgetenvstor001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps002/getcaps002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps002/libgetcaps002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps001/getcaps001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCapabilities/getcaps001/libgetcaps001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/libextevents001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DataDumpRequest/datadumpreq001/datadumpreq001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DataDumpRequest/datadumpreq001/libdatadumpreq001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld006/getclfld006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld006/libgetclfld006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld005/getclfld005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld005/libgetclfld005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld007/libgetclfld007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassFields/getclfld007/getclfld007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/thrcputime002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/libthrcputime002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/thrcputime001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/libthrcputime001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetExtensionEventCallback/setextevent001/libsetextevent001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetExtensionEventCallback/setextevent001/setextevent001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn004/libgetsrcfn004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn004/getsrcfn004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn006/getsrcfn006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn006/libgetsrcfn006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn005/getsrcfn005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceFileName/getsrcfn005/libgetsrcfn005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex001/srcdebugex001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex001/libsrcdebugex001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex002/libsrcdebugex002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex002/srcdebugex002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex003/libsrcdebugex003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetSourceDebugExtension/srcdebugex003/srcdebugex003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/libsetfldw003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/setfldw003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw006/libsetfldw006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw006/setfldw006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/libsetfldw001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw002/libsetfldw002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw002/setfldw002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw005/libsetfldw005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw005/setfldw005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/setfldw004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/libsetfldw004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnUnload/agentonunload001/agentonunload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Agent_OnUnload/agentonunload001/libagentonunload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname002/libgeterrname002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname002/geterrname002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname001/libgeterrname001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetErrorName/geterrname001/geterrname001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop001/nframepop001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop001/libnframepop001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop003/nframepop003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop003/libnframepop003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop002/nframepop002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NotifyFramePop/nframepop002/libnframepop002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt002/libgetjlocfmt002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt002/getjlocfmt002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt001/libgetjlocfmt001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetJLocationFormat/getjlocfmt001/getjlocfmt001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Exception/exception001/libexception001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Exception/exception001/exception001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap006/libiterheap006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap006/iterheap006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap001/iterheap001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap001/libiterheap001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap004/iterheap004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap004/libiterheap004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap007/libiterheap007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap007/iterheap007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap005/libiterheap005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap005/iterheap005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap003/libiterheap003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap003/iterheap003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap002/iterheap002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateOverHeap/iterheap002/libiterheap002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassPrepare/classprep001/classprep001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassPrepare/classprep001/libclassprep001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc001/forcegc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc001/libforcegc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc002/libforcegc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceGarbageCollection/forcegc002/forcegc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop001/libframepop001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop001/framepop001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/framepop002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/libframepop002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResourceExhausted/libresexhausted.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResourceExhausted/resexhausted.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc002/methloc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc002/libmethloc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc001/libmethloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodLocation/methloc001/methloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon003/contmon003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon003/libcontmon003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon002/contmon002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon002/libcontmon002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon001/libcontmon001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentContendedMonitor/contmon001/contmon001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd005/libgetclmthd005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd005/getclmthd005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd006/libgetclmthd006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd006/getclmthd006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd007/getclmthd007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassMethods/getclmthd007/libgetclmthd007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnv/GetEnv001/GetEnv001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetEnv/GetEnv001/libGetEnv001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm003/getfldnm003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm003/libgetfldnm003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm005/getfldnm005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm005/libgetfldnm005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm004/libgetfldnm004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldName/getfldnm004/getfldnm004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/mexit001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/libmexit001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/libmexit002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/mexit002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/libcurthrtimerinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/curthrtimerinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl002/libgetfldecl002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl002/getfldecl002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl004/libgetfldecl004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl004/getfldecl004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl001/libgetfldecl001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldDeclaringClass/getfldecl001/getfldecl001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait005/librawmnwait005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait005/rawmnwait005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait002/librawmnwait002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait002/rawmnwait002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/librawmnwait001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait003/rawmnwait003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait003/librawmnwait003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait004/rawmnwait004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait004/librawmnwait004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMDeath/vmdeath001/libvmdeath001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMDeath/vmdeath001/vmdeath001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEnter/mcontenter001/libmcontenter001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEnter/mcontenter001/mcontenter001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls002/libdeclcls002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls002/declcls002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls001/declcls001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls001/libdeclcls001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls003/declcls003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodDeclaringClass/declcls003/libdeclcls003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP01/ap01t001/ap01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP01/ap01t001/libap01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP11/ap11t001/ap11t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP11/ap11t001/libap11t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP03/ap03t001/ap03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP03/ap03t001/libap03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/libap10t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/ap10t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP02/ap02t001/ap02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP02/ap02t001/libap02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t001/libap07t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t001/ap07t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t002/ap07t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP07/ap07t002/libap07t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP06/ap06t001/ap06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP06/ap06t001/libap06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t001/ap05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t001/libap05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t002/ap05t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP05/ap05t002/libap05t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t001/ap04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t001/libap04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t003/ap04t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t003/libap04t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t002/libap04t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP04/ap04t002/ap04t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP09/ap09t001/ap09t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP09/ap09t001/libap09t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP12/ap12t001/ap12t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP12/ap12t001/libap12t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI05/ji05t001/libji05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI05/ji05t001/ji05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI01/ji01t001/libji01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI01/ji01t001/ji01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI06/ji06t001/libji06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI06/ji06t001/ji06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t003/ji03t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t003/libji03t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t001/ji03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t001/libji03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t004/ji03t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t004/libji03t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t002/ji03t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/jni_interception/JI03/ji03t002/libji03t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/libcm02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/cm02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t018/cm01t018.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t018/libcm01t018.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t011/libcm01t011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t011/cm01t011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t003/cm01t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t003/libcm01t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t004/cm01t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t004/libcm01t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t013/libcm01t013.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t013/cm01t013.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t014/libcm01t014.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t014/cm01t014.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t002/cm01t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t002/libcm01t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t006/libcm01t006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t006/cm01t006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t005/libcm01t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t005/cm01t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t012/cm01t012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t012/libcm01t012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t001/cm01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t001/libcm01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t019/cm01t019.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t019/libcm01t019.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t010/libcm01t010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t010/cm01t010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t016/cm01t016.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t016/libcm01t016.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t021/cm01t021.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t021/libcm01t021.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t017/libcm01t017.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t017/cm01t017.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t020/cm01t020.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t020/libcm01t020.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/cm01t008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/libcm01t008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t015/libcm01t015.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t015/cm01t015.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t009/cm01t009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t009/libcm01t009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t007/libcm01t007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t007/cm01t007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/libcm03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/cm03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/libma06t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/libma06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/ma05t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/ma05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/libma05t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA05/ma05t001/libma05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/ma02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/libma02t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/ma02t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA02/ma02t001/libma02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/libma07t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/libma07t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/ma03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/libma03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/libma03t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA03/ma03t001/ma03t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/ma08t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/ma08t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/libma08t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA08/ma08t001/libma08t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/ma01t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/ma01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/libma01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA01/ma01t001/libma01t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/libma04t002a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/libma04t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/libma04t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/libma04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/libma04t003a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/libma04t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/ma10t003a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/libma10t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/ma10t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t003/libma10t003a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/libma10t004a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/libma10t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/ma10t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/ma10t005a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/libma10t005a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t005/libma10t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/libma10t006a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/ma10t006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/ma10t006a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t006/libma10t006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/libma10t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/ma10t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/libma10t002a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t002/ma10t002a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/libma10t008a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/ma10t008a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/ma10t008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t008/libma10t008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/ma10t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/libma10t001a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/libma10t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t001/ma10t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/ma10t007a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/ma10t007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/libma10t007a.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t007/libma10t007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/libbi04t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t001/libbi03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t001/bi03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t002/libbi03t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI03/bi03t002/bi03t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t001/libbi01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t001/bi01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t002/libbi01t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI01/bi01t002/bi01t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t002/bi02t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t002/libbi02t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t001/libbi02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI02/bi02t001/bi02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/extension/EX03/ex03t001/ex03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/extension/EX03/ex03t001/libex03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t008/libem02t008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t008/em02t008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t010/em02t010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t010/libem02t010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t001/em02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t001/libem02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t011/em02t011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t011/libem02t011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t003/em02t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t003/libem02t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t007/libem02t007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t007/em02t007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t005/em02t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t005/libem02t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t002/libem02t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t002/em02t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t012/libem02t012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t012/em02t012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t004/em02t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t004/libem02t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t009/em02t009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t009/libem02t009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t006/libem02t006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM02/em02t006/em02t006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/libem04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/libem05t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/libem05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM06/em06t001/libem06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM06/em06t001/em06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t002/libem01t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t002/em01t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t001/em01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM01/em01t001/libem01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t001/libem07t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t001/em07t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/libem07t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/sp02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/libsp02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/libsp02t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/libsp02t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t001/libsp03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t001/sp03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t002/libsp03t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP03/sp03t002/sp03t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t003/libsp05t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t003/sp05t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t002/libsp05t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP05/sp05t002/sp05t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/libsp07t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/libsp07t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t003/libsp01t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t003/sp01t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t001/sp01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t001/libsp01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t002/sp01t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP01/sp01t002/libsp01t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t001/sp04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t001/libsp04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t002/libsp04t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP04/sp04t002/sp04t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/libsp06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/libsp06t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/libsp06t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t003/hs201t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t003/libhs201t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/libhs201t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/libhs201t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/hs203t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/libhs203t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/libhs203t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/hs203t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/hs203t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/libhs203t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/libhs203t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/hs203t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/libhs103t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/hs103t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/libhs104t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/hs104t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/libhs104t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/hs104t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/hs302t010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/libhs302t010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/libhs302t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/hs302t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/libhs302t012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/hs302t012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/hs302t006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/libhs302t006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/hs302t008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/libhs302t008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/hs302t011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/libhs302t011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/libhs302t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/hs302t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/hs302t007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/libhs302t007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/hs302t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/libhs302t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/hs302t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/libhs302t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/hs302t009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/libhs302t009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/hs302t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/libhs302t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/hs301t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/libhs301t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/hs301t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/libhs301t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/hs301t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/libhs301t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/hs301t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/libhs301t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/hs301t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/libhs301t005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t001/hs202t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t001/libhs202t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/libhs202t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/hs202t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/libhs204t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.h
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/libhs204t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/hs204t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/libhs204t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/libhs204t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/hs204t004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/gf01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/libgf01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t003/gf08t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t003/libgf08t003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t001/gf08t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t001/libgf08t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t002/libgf08t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF08/gf08t002/gf08t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF04/gf04t001/libgf04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF04/gf04t001/gf04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/gf06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/libgf06t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC01/tc01t001/libtc01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC01/tc01t001/tc01t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/libtc05t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC04/tc04t001/libtc04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC04/tc04t001/tc04t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t001/tc03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t001/libtc03t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t002/libtc03t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC03/tc03t002/tc03t002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC02/tc02t001/libtc02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC02/tc02t001/tc02t001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTag/gettag001/libgettag001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTag/gettag001/gettag001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Breakpoint/breakpoint001/libbreakpoint001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Breakpoint/breakpoint001/breakpoint001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr003/libgetclsldr003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr003/getclsldr003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr002/getclsldr002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr002/libgetclsldr002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr001/libgetclsldr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoader/getclsldr001/getclsldr001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf005/getintrf005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf005/libgetintrf005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf007/libgetintrf007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf007/getintrf007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf006/libgetintrf006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetImplementedInterfaces/getintrf006/getintrf006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ExceptionCatch/excatch001/excatch001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ExceptionCatch/excatch001/libexcatch001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart002/threadstart002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart002/libthreadstart002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/libthreadstart001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart003/threadstart003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart003/libthreadstart003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall004/rawmnntfyall004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall004/librawmnntfyall004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall002/rawmnntfyall002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall002/librawmnntfyall002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/librawmnntfyall001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall003/rawmnntfyall003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall003/librawmnntfyall003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectHashCode/objhashcode001/objhashcode001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectHashCode/objhashcode001/libobjhashcode001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/libframeloc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/frameloc002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc001/libframeloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc001/frameloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc003/frameloc003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc003/libframeloc003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/libsetthrdstor003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/setthrdstor003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/libsetthrdstor001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/setthrdstor001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/setthrdstor002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/libsetthrdstor002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd007/libstopthrd007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd007/stopthrd007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd006/libstopthrd006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/StopThread/stopthrd006/stopthrd006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodLoad/compmethload001/compmethload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodLoad/compmethload001/libcompmethload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep001/libsinglestep001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep001/singlestep001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep002/libsinglestep002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep002/singlestep002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep003/libsinglestep003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SingleStep/singlestep003/singlestep003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk002/libsetbrk002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk002/setbrk002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk008/libsetbrk008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk008/setbrk008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk005/libsetbrk005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk005/setbrk005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk007/setbrk007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk007/libsetbrk007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk003/libsetbrk003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetBreakpoint/setbrk003/setbrk003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss001/libloadedclss001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss001/loadedclss001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss002/loadedclss002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLoadedClasses/loadedclss002/libloadedclss002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes001/bytecodes001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes001/libbytecodes001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes002/libbytecodes002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes002/bytecodes002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes003/libbytecodes003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetBytecodes/bytecodes003/bytecodes003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/libthreadend001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend002/libthreadend002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend002/threadend002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo002/libthrinfo002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo002/thrinfo002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/libthrinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab001/liblocaltab001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab001/localtab001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab004/liblocaltab004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab004/localtab004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab003/localtab003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab003/liblocaltab003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab002/liblocaltab002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab002/localtab002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab005/liblocaltab005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariableTable/localtab005/localtab005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod001/libmethmod001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod001/methmod001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod002/methmod002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetMethodModifiers/methmod002/libmethmod002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon002/crrawmon002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon002/libcrrawmon002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/libcrrawmon001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/libgetthrdgrpchld001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/getthrdgrpchld001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceEarlyReturn/ForceEarlyReturn001/libForceEarlyReturn001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ForceEarlyReturn/ForceEarlyReturn001/ForceEarlyReturn001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop002/libsetsysprop002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop002/setsysprop002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop003/setsysprop003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetSystemProperty/setsysprop003/libsetsysprop003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd003/libsuspendthrd003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd003/suspendthrd003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd002/suspendthrd002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd002/libsuspendthrd002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd001/suspendthrd001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThread/suspendthrd001/libsuspendthrd001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps002/librelcaps002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps002/relcaps002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps001/librelcaps001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RelinquishCapabilities/relcaps001/relcaps001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMObjectAlloc/vmobjalloc001/libvmobjalloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/VMObjectAlloc/vmobjalloc001/vmobjalloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/resumethrdlst001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/libresumethrdlst001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/resumethrdlst002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/libresumethrdlst002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/libthrtimerinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/thrtimerinfo001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DynamicCodeGenerated/dyncodgen001/libdyncodgen001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DynamicCodeGenerated/dyncodgen001/dyncodgen001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal002/getlocal002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal002/libgetlocal002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal001/libgetlocal001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetLocalVariable/getlocal001/getlocal001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectsWithTags/objwithtags001/objwithtags001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectsWithTags/objwithtags001/libobjwithtags001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage006/objmonusage006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage006/libobjmonusage006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage002/libobjmonusage002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage002/objmonusage002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage001/libobjmonusage001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage001/objmonusage001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage005/objmonusage005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage005/libobjmonusage005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage004/libobjmonusage004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage004/objmonusage004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage003/libobjmonusage003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetObjectMonitorUsage/objmonusage003/objmonusage003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEntered/mcontentered001/libmcontentered001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorContendedEntered/mcontentered001/mcontentered001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWait/monitorwait001/libmonitorwait001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWait/monitorwait001/monitorwait001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf003/getfldmdf003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf003/libgetfldmdf003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf004/getfldmdf004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFieldModifiers/getfldmdf004/libgetfldmdf004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab001/setjniftab001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab001/libsetjniftab001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab002/libsetjniftab002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetJNIFunctionTable/setjniftab002/setjniftab002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag002/setvrbflag002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag002/libsetvrbflag002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag001/libsetvrbflag001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetVerboseFlag/setvrbflag001/setvrbflag001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase001/libgetphase001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase001/getphase001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase002/getphase002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPhase/getphase002/libgetphase002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/libsetnotif001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/StressRedefine/stressRedefine.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/StressRedefine/libstressRedefine.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass024/libredefclass024.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass024/redefclass024.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass020/libredefclass020.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass020/redefclass020.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass026/redefclass026.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass026/libredefclass026.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass030/libredefclass030.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass030/redefclass030.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/libredefclass027.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass031/redefclass031.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass031/libredefclass031.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass016/redefclass016.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass016/libredefclass016.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass029/redefclass029.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass029/libredefclass029.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass017/redefclass017.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass017/libredefclass017.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass018/libredefclass018.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass018/redefclass018.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass005/redefclass005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass005/libredefclass005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass004/libredefclass004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass004/redefclass004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass019/redefclass019.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass019/libredefclass019.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass011/redefclass011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass011/libredefclass011.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass025/libredefclass025.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass025/redefclass025.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass014/libredefclass014.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass014/redefclass014.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass001/redefclass001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass001/libredefclass001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass028/libredefclass028.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass028/redefclass028.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass009/redefclass009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass009/libredefclass009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass012/libredefclass012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass012/redefclass012.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass006/libredefclass006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass006/redefclass006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass002/libredefclass002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass002/redefclass002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass010/libredefclass010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass010/redefclass010.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass003/libredefclass003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass003/redefclass003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass022/libredefclass022.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass022/redefclass022.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass015/redefclass015.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass015/libredefclass015.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass021/redefclass021.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass021/libredefclass021.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass023/libredefclass023.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass023/redefclass023.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass008/libredefclass008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass008/redefclass008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass013/redefclass013.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass013/libredefclass013.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassLoad/classload001/libclassload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassLoad/classload001/classload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/suspendthrdlst002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/libsuspendthrdlst002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/suspendthrdlst001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/libsuspendthrdlst001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon004/drrawmon004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon004/libdrrawmon004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon003/libdrrawmon003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon003/drrawmon003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/libdrrawmon001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth002/libissynth002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth002/issynth002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth001/issynth001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodSynthetic/issynth001/libIsMethodSyntheticIssynth001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Deallocate/dealloc001/libdealloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/Deallocate/dealloc001/dealloc001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPotentialCapabilities/getpotcaps001/libgetpotcaps001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetPotentialCapabilities/getpotcaps001/getpotcaps001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry002/mentry002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry002/libmentry002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/libmentry001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/mentry001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodObsolete/isobsolete001/libisobsolete001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodObsolete/isobsolete001/isobsolete001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodUnload/compmethunload001/libcompmethunload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CompiledMethodUnload/compmethunload001/compmethunload001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk001/classfloadhk001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk001/libclassfloadhk001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk004/classfloadhk004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk004/libclassfloadhk004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk003/classfloadhk003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk003/libclassfloadhk003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk002/classfloadhk002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk002/libclassfloadhk002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk008/classfloadhk008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk008/libclassfloadhk008.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk005/classfloadhk005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk005/libclassfloadhk005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk009/classfloadhk009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk009/libclassfloadhk009.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk007/libclassfloadhk007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk007/classfloadhk007.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk006/classfloadhk006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ClassFileLoadHook/classfloadhk006/libclassfloadhk006.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative001/isnative001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative001/libisnative001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative002/libisnative002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsMethodNative/isnative002/isnative002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWaited/monitorwaited001/monitorwaited001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MonitorWaited/monitorwaited001/libmonitorwaited001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf001/libownmoninf001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf001/ownmoninf001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf002/libownmoninf002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf002/ownmoninf002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf003/libownmoninf003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetOwnedMonitorInfo/ownmoninf003/ownmoninf003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/libextfuncs001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy002/librawmnntfy002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy002/rawmnntfy002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy003/rawmnntfy003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy003/librawmnntfy003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy004/librawmnntfy004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy004/rawmnntfy004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/librawmnntfy001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps001/libaddcaps001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps001/addcaps001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps002/libaddcaps002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps002/addcaps002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps003/libaddcaps003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AddCapabilities/addcaps003/addcaps003.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionFinish/gcfinish001/gcfinish001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GarbageCollectionFinish/gcfinish001/libgcfinish001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray005/libisarray005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray005/isarray005.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray004/isarray004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IsArrayClass/isarray004/libisarray004.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss001/libclsldrclss001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss001/clsldrclss001.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss002/clsldrclss002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetClassLoaderClasses/clsldrclss002/libclsldrclss002.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/gc/g1/unloading/libdefine.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC1/libmallocWithGC1.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC3/libmallocWithGC3.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC01/libnativeGC01.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC02/libnativeGC02.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC03/libnativeGC03.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/gc/gctests/mallocWithGC2/libmallocWithGC2.cpp
Examining data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/gc/gctests/nativeGC05/libnativeGC05.cpp
Examining data/openjdk-16-16~14/src/java.smartcardio/windows/native/libj2pcsc/pcsc_md.c
Examining data/openjdk-16-16~14/src/java.smartcardio/windows/native/libj2pcsc/pcsc_md.h
Examining data/openjdk-16-16~14/src/java.smartcardio/unix/native/libj2pcsc/pcsc_md.c
Examining data/openjdk-16-16~14/src/java.smartcardio/unix/native/libj2pcsc/pcsc_md.h
Examining data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/proc_service.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/salibelf.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/dwarf.cpp
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_core.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/salibelf.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/DwarfParser.cpp
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/dwarf.hpp
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/elfmacros.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/ps_core_common.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/ps_core_common.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/salibelf.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.h
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c
Examining data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/elfmacros.h
Examining data/openjdk-16-16~14/src/java.rmi/share/native/librmi/GC.c
Examining data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp
Examining data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c
Examining data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/WindowsDirectory.c
Examining data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/NativeFunc.h
Examining data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/GSSLibStub.c
Examining data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/NativeFunc.c
Examining data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/gssapi.h
Examining data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/NativeUtil.h
Examining data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/NativeUtil.c
Examining data/openjdk-16-16~14/src/java.security.jgss/macosx/native/libosxkrb5/nativeccache.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libdt_socket/socket_md.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libdt_socket/socket_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/proc_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/util_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/mutex_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/path_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/exec_md.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libdt_socket/socket_md.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libdt_socket/socket_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/proc_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/util_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/path_md.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/exec_md.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/sysSocket.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/signature.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/threadControl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/bag.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/vm_interface.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ThreadReferenceImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ThreadGroupReferenceImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/export/sys.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/signature.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugDispatch.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ModuleReferenceImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ClassObjectReferenceImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/outStream.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/inStream.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/StringReferenceImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventFilter.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHandler.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ClassTypeImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/stream.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugLoop.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/FieldImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ArrayTypeImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ThreadReferenceImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/StackFrameImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ClassObjectReferenceImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/outStream.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ClassTypeImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/EventRequestImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/util.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugLoop.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHandlerRestricted.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/EventRequestImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/threadControl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/commonRef.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/classTrack.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHelper.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/util.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ReferenceTypeImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHandler.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/error_messages.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/classTrack.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/invoker.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/standardHandlers.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/stream.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHelper.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/FrameID.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/StringReferenceImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ObjectReferenceImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/MethodImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ArrayReferenceImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/VirtualMachineImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/error_messages.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/invoker.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/stepControl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/MethodImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventFilterRestricted.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/StackFrameImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ArrayTypeImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/bag.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ClassLoaderReferenceImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ModuleReferenceImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ClassLoaderReferenceImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ReferenceTypeImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/InterfaceTypeImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/standardHandlers.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/inStream.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/commonRef.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/JDWP.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/InterfaceTypeImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ObjectReferenceImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/FrameID.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventFilter.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/stepControl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ArrayReferenceImpl.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugDispatch.c
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/VirtualMachineImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/ThreadGroupReferenceImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/FieldImpl.h
Examining data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/include/jdwpTransport.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessEnvironment_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/Console_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/gdefs_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessImpl_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/dirent_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/VM_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/locale_str.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/FileOutputStream_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinCAPISeedGenerator.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/jlong_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/Win32ErrorMode.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/dirent_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_main_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjava/FileDescriptor_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet4AddressImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/PlainSocketImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/NTLMAuthentication.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/SocketImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/SocketOutputStream.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/SocketInputStream.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/NTLMAuthSequence.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/DefaultProxySelector.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnet/InetAddressImplFactory.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjimage/osSupport_windows.cpp
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjli/cmdtoargs.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/include/jni_md.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/MappedMemoryUtils.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/WindowsAsynchronousFileChannelImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramChannelImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/WindowsAsynchronousSocketChannelImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/Net.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/SocketDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileChannelImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/Iocp.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/nio_util.h
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/IOUtil.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/WindowsAsynchronousServerSocketChannelImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileKey.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/RegistryFileTypeDetector.c
Examining data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/linux/native/libjava/CgroupMetrics.c
Examining data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c
Examining data/openjdk-16-16~14/src/java.base/linux/native/libnet/linux_close.c
Examining data/openjdk-16-16~14/src/java.base/linux/native/libnio/ch/EPoll.c
Examining data/openjdk-16-16~14/src/java.base/linux/native/libnio/fs/LinuxWatchService.c
Examining data/openjdk-16-16~14/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/jni_util_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessEnvironment_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/Console_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/gdefs_md.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/jdk_util_md.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/VM_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/io_util_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/locale_str.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/FileOutputStream_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/UnixFileSystem_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/jlong_md.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/io_util_md.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjava/FileDescriptor_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/jspawnhelper/jspawnhelper.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/portconfig.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet4AddressImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainSocketImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/SdpSupport.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/ResolverConfigurationImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/SocketImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/SocketOutputStream.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/SocketInputStream.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnet/InetAddressImplFactory.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjimage/osSupport_unix.cpp
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libjsig/jsig.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/include/jni_md.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/MappedMemoryUtils.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/UnixAsynchronousSocketChannelImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/InheritedChannel.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/DatagramChannelImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/Net.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/SocketDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/NativeThread.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/FileChannelImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/nio_util.h
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/IOUtil.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/PollSelectorImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/DatagramDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/FileDispatcherImpl.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/FileKey.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixCopyFile.c
Examining data/openjdk-16-16~14/src/java.base/aix/native/libjava/ProcessHandleImpl_aix.c
Examining data/openjdk-16-16~14/src/java.base/aix/native/libnet/aix_close.c
Examining data/openjdk-16-16~14/src/java.base/aix/native/libjli/java_md_aix.c
Examining data/openjdk-16-16~14/src/java.base/aix/native/libjli/java_md_aix.h
Examining data/openjdk-16-16~14/src/java.base/aix/native/libnio/ch/AixPollPort.c
Examining data/openjdk-16-16~14/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/TimeZone.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/StringCoding.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/StackStreamFactory.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/io_util.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/jio.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/java_props.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeAccessors.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Runtime.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/ObjectStreamClass.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/AccessController.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/VMSupport.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Executable.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/StrictMath.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/AtomicLong.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/gdefs.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/BootLoader.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/SecurityManager.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Thread.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/check_version.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Class.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Reflection.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/RandomAccessFile.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/ClassLoader.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/FileInputStream.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/io_util.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/check_classname.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/VM.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/NullPointerException.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Float.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/jlong.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Object.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Throwable.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/sizecalc.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/check_classname.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Reference.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Module.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Signal.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/ConstantPool.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/LambdaProxyClassArchive.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Double.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Array.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Field.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/String.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/System.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/jdk_util.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/StackTraceElement.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjava/Shutdown.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libnet/DatagramPacket.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libnet/proxy_util.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libnet/net_util.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libnet/net_util.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libnet/Inet4Address.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libnet/proxy_util.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libnet/Inet6Address.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libnet/InetAddress.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/jimage.cpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/endian.cpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.hpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/endian.hpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/inttypes.hpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/osSupport.hpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/jimage.hpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/NativeImageBuffer.cpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.hpp
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/emessages.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/manifest_info.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/args.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/splashscreen.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/splashscreen_stubs.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/java.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libzip/Inflater.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libzip/Adler32.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libzip/Deflater.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libzip/CRC32.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_rem_pio2.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_fabs.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_frexp.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_significand.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_fmod.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_fmod.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_scalb.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_expm1.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_log.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_atanh.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_nextafter.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_scalbn.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_asin.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_logb.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_isnan.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_asin.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_log1p.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_modf.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/k_cos.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_floor.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_ceil.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_lib_version.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_ldexp.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_acos.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_rint.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_atan2.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/k_tan.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/k_sin.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_acos.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_remainder.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_log.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_log10.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_matherr.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_exp.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_copysign.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_tanh.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_tan.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/fdlibm.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_scalb.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_sqrt.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_log10.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_atan.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_atanh.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_signgam.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_finite.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/k_rem_pio2.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_cosh.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_cosh.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_exp.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_ilogb.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_sinh.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_atan2.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/jfdlibm.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_sinh.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_sin.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/k_standard.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/w_remainder.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/s_cos.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libfdlibm/e_sqrt.c
Examining data/openjdk-16-16~14/src/java.base/share/native/launcher/defines.h
Examining data/openjdk-16-16~14/src/java.base/share/native/launcher/main.c
Examining data/openjdk-16-16~14/src/java.base/share/native/include/jvmticmlr.h
Examining data/openjdk-16-16~14/src/java.base/share/native/include/jni.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libnio/nio_util.c
Examining data/openjdk-16-16~14/src/java.base/share/native/libnio/ch/nio.h
Examining data/openjdk-16-16~14/src/java.base/share/native/libnio/ch/NativeSocketAddress.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libjava/ProcessHandleImpl_macosx.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.h
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libnet/bsd_close.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libnet/DefaultProxySelector.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libnio/ch/KQueue.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/MacOSXNativeDispatcher.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/UTIFileTypeDetector.c
Examining data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c
Examining data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c
Examining data/openjdk-16-16~14/src/jdk.management/linux/native/libmanagement_ext/UnixOperatingSystem.c
Examining data/openjdk-16-16~14/src/jdk.management/unix/native/libmanagement_ext/OperatingSystemImpl.c
Examining data/openjdk-16-16~14/src/jdk.management/aix/native/libmanagement_ext/UnixOperatingSystem.c
Examining data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/management_ext.h
Examining data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/HotSpotDiagnostic.c
Examining data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/management_ext.c
Examining data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/DiagnosticCommandImpl.c
Examining data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/Flag.c
Examining data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/GcInfoBuilder.c
Examining data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/GarbageCollectorExtImpl.c
Examining data/openjdk-16-16~14/src/jdk.management/macosx/native/libmanagement_ext/UnixOperatingSystem.c
Examining data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/AttachProviderImpl.c
Examining data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c
Examining data/openjdk-16-16~14/src/jdk.attach/linux/native/libattach/VirtualMachineImpl.c
Examining data/openjdk-16-16~14/src/jdk.attach/aix/native/libattach/VirtualMachineImpl.c
Examining data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c
Examining data/openjdk-16-16~14/src/jdk.management.agent/windows/native/libmanagement_agent/FileSystemImpl.c
Examining data/openjdk-16-16~14/src/jdk.management.agent/unix/native/libmanagement_agent/FileSystemImpl.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/MemoryImpl.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/VMManagementImpl.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/management.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/management.h
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/HotspotThread.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/ThreadImpl.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/ClassLoadingImpl.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/GarbageCollectorImpl.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/MemoryManagerImpl.c
Examining data/openjdk-16-16~14/src/java.management/share/native/libmanagement/MemoryPoolImpl.c
Examining data/openjdk-16-16~14/src/java.prefs/windows/native/libprefs/WindowsPreferences.c
Examining data/openjdk-16-16~14/src/java.prefs/unix/native/libprefs/FileSystemPreferences.c
Examining data/openjdk-16-16~14/src/utils/hsdis/hsdis.h
Examining data/openjdk-16-16~14/src/utils/hsdis/hsdis-demo.c
Examining data/openjdk-16-16~14/src/utils/hsdis/hsdis.c
Examining data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c
Examining data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/Sctp.h
Examining data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpNet.c
Examining data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.h
Examining data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/EncodingSupport_md.c
Examining data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c
Examining data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.h
Examining data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/EncodingSupport_md.c
Examining data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAssert.h
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JarFacade.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/EncodingSupport.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/PathCharsValidator.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/FileSystemSupport.h
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/Reentrancy.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAgent.h
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/Utilities.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/Reentrancy.h
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAssert.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JavaExceptions.h
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/Utilities.h
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JavaExceptions.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/EncodingSupport.h
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAgent.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InstrumentationImplNativeMethods.c
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JarFacade.h
Examining data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/PathCharsValidator.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/bridge/AccessBridgeCalls.c
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjabsysinfo/AccessBridgeSysInfo.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeATInstance.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeATInstance.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/MessageHistory.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/MessageHistory.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspectorResource.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalkerResource.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeMessageQueue.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeWindowsEntryPoints.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeMessageQueue.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeWindowsEntryPoints.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeMessages.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeMessages.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/accessBridgeResource.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/resource.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgeCalls.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgeCallbacks.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.h
Examining data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/msiwrapper/Executor.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/msiwrapper/MsiWrapper.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/msiwrapper/Resources.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/msiwrapper/Resources.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/msiwrapper/Executor.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/applauncher/WinLauncher.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/JniUtils.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/WindowsRegistry.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/ResourceEditor.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/IconSwap.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/IconSwap.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/VersionInfo.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/ResourceEditor.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/VersionInfo.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/jpackage.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/JniUtils.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinSysInfo.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/PlatformLogEvent.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinErrorHandling.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinSysInfo.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinFileUtils.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/UniqueHandle.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/PlatformLogEvent.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinErrorHandling.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinFileUtils.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinDll.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libwixhelper/libwixhelper.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/applauncher/LinuxLauncher.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/applauncher/Executor.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/applauncher/Package.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/applauncher/Package.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/applauncher/Executor.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/common/LinuxSysInfo.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/UnixDll.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/UnixFileUtils.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/UnixSysInfo.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/PlatformLogEvent.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/PlatformLogEvent.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/UnixSysInfo.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/applauncher/JvmLauncher.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/applauncher/CfgFile.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/applauncher/AppLauncher.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/applauncher/CfgFile.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/applauncher/JvmLauncher.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/applauncher/AppLauncher.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/FileUtils.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/tstrings.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/kludge_c++11.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/ErrorHandling.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/Dll.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/Toolbox.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/SourceCodePos.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/Log.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/FileUtils.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/SysInfo.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/tstrings.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/ErrorHandling.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/Log.h
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/macosx/native/applauncher/MacLauncher.cpp
Examining data/openjdk-16-16~14/src/jdk.incubator.jpackage/macosx/native/common/MacSysInfo.cpp
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/p11_md.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/p11_md.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/j2secmod_md.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/j2secmod_md.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/p11_md.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/p11_md.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/j2secmod_md.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/j2secmod_md.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/j2secmod.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_dual.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_digest.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11gcm2.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_util.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_general.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_objmgmt.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11f.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11t.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_sign.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_mutex.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_crypt.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11wrapper.h
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_sessmgmt.c
Examining data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/j2secmod.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_config.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_sys.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Util.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiOut.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Charset_Util.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Util.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Charset_Util.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiIn.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libjawt/jawt.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/GDIRenderer.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/GDIBlitLoops.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/WindowsFlags.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/GDIWindowSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/GDIWindowSurfaceData.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/WindowsFlags.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPipelineManager.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DVertexCacher.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPaints.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DMaskCache.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPipeline.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DMaskBlit.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DBufImgOps.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DMaskFill.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DSurfaceData.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPaints.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DMaskCache.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DBadHardware.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DMaskBlit.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DBufImgOps.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/ShaderList.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DResourceManager.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DRenderQueue.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DGlyphCache.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPipelineManager.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DRenderer.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DGraphicsDevice.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DVertexCacher.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DTextRenderer.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DRenderer.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DGraphicsDevice.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DResourceManager.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DTextRenderer.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DGlyphCache.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/ShaderList.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DMaskFill.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DRenderQueue.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DBlitLoops.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DContext.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DBlitLoops.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaders.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DContext.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/WGLSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/WGLGraphicsConfig.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/J2D_GL/wglext.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/WGLSurfaceData.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/OGLFuncs_md.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/WGLGraphicsConfig.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/j2d_md.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_MenuItem.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PopupMenu.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/WPrinterJob.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_GDIObject.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Choice.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/initIDs.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDS.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_List.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsConfig.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Dimension.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Menu.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_CustomPaletteDef.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Cursor.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/MouseInfo.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ComCtl32Util.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Insets.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_BitmapUtil.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ObjectList.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/stdhdrs.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_IconCursor.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Panel.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Color.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/Devices.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ObjectList.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Mlib.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Pen.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Frame.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TextComponent.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsDevice.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Object.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awtmsg.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_MouseEvent.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Menu.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintControl.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_MouseEvent.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Brush.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ComCtl32Util.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Robot.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/Devices.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Checkbox.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DataTransferer.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/DllUtil.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Mlib.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/alloc.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/GDIHashtable.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Canvas.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDT.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_InputTextInfor.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_FileDialog.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintDialog.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Taskbar.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_KeyEvent.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsDevice.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsConfig.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/CmdIDList.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Taskbar.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Event.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_new.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Scrollbar.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Pen.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Scrollbar.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Debug.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Window.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Canvas.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TrayIcon.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Palette.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Label.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DCHolder.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_new.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/colordata.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Debug.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DrawingSurface.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Rectangle.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_IconCursor.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ScrollPane.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_MenuBar.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Panel.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TextField.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_AWTEvent.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintDialog.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/mlib_types_md.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintControl.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/DllUtil.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Label.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PopupMenu.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Object.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Desktop.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Button.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ScrollPane.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TextField.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_KeyEvent.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Dialog.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_KeyboardFocusManager.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Dialog.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Event.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Clipboard.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/CmdIDList.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_GDIObject.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Container.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TextArea.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_InputMethod.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Clipboard.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TextComponent.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_BitmapUtil.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TextArea.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Brush.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/GDIHashtable.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Cursor.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Frame.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_MenuItem.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Insets.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/img_util_md.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DCHolder.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TrayIcon.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_InputEvent.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_List.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Container.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DrawingSurface.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Choice.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Checkbox.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDS.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Palette.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Dimension.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_AWTEvent.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DesktopProperties.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ThemeReader.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_InputTextInfor.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsEnv.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Button.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DesktopProperties.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_MenuBar.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/Hashtable.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDT.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DataTransferer.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_FileDialog.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Window.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/Hashtable.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_InputEvent.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/lcdglyph.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/common/awt/systemscale/systemScale.cpp
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/common/awt/systemscale/systemScale.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/common/awt/utility/rect.h
Examining data/openjdk-16-16~14/src/java.desktop/windows/native/include/jawt_md.h
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiIn.c
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.h
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCM.c
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.h
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiOut.c
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c
Examining data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libsplashscreen/splashscreen_config.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libsplashscreen/splashscreen_sys.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libjawt/jawt.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt/java2d/j2d_md.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt/awt/awt_LoadLibrary.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt/awt/awt_Mlib.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt/awt/initIDs.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libfontmanager/X11FontScaler.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libfontmanager/X11TextRenderer.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/GLXGraphicsConfig.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glx.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/GLXSurfaceData.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/GLXGraphicsConfig.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/OGLFuncs_md.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/GLXSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11FontScaler_md.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11PMBlitLoops.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11Renderer.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11SurfaceData.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11SurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11TextRenderer_md.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/awt_Font.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/awt_GraphicsEnv.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/awt_Mlib.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/awt_Component.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/colordata.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/awt.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/systemscale/systemScale.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/systemscale/systemScale.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/utility/rect.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/color.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/CUPSfuncs.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/awt_p.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/img_util_md.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/awt_DrawingSurface.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/awt_util.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/common/font/X11FontScaler.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/include/jawt_md.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRSurfaceData.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_UNIXToolkit.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/list.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/swing_GTKEngine.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_Event.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/sun_awt_X11_GtkFileDialogPeer.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/multiVis.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/list.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk_interface.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/canvas.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/wsutils.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_MenuComponent.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_Robot.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/multiVis.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/swing_GTKStyle.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_InputMethod.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_AWTEvent.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_util.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_DrawingSurface.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_Insets.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk_interface.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/gnome_interface.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/awt_Desktop.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/gnome_interface.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/awt_Taskbar.h
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/awt_Taskbar.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XWindow.c
Examining data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_headless/awt/HeadlessToolkit.c
Examining data/openjdk-16-16~14/src/java.desktop/aix/native/libawt/porting_aix.h
Examining data/openjdk-16-16~14/src/java.desktop/aix/native/libawt/porting_aix.c
Examining data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshalgo.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshalgo.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshrec.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshmod.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshnterr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshrec.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshmod.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1errors.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1afm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1parse.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1load.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1driver.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1parse.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1gload.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1driver.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1afm.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1load.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1gload.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1objs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1objs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1tokens.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttcolr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/pngshim.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttmtx.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/pngshim.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttcpal.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttkern.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttcmap.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfwoff2.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfobjs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfdriver.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sferrors.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttcmap.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttpost.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttpost.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfobjs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfdriver.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttcmapc.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/woff2tags.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttsbit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttload.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfwoff.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/woff2tags.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfwoff.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttmtx.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttload.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttcpal.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfwoff2.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttcolr.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttsbit.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/ttkern.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidtoken.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidload.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidload.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/ciderrs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidobjs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidgload.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidgload.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidparse.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidparse.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidobjs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidriver.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cid/cidriver.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psconv.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psconv.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psarrst.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/pserror.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psread.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psft.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psarrst.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/cffdecode.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psintrp.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psfixed.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/cffdecode.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psobjs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psfont.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/t1decode.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psobjs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psfont.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/afmparse.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/afmparse.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psauxmod.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psauxerr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psread.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/t1cmap.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/pserror.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/pshints.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psauxmod.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psblues.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/pshints.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/t1cmap.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psglue.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psintrp.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psblues.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/t1decode.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psstack.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psstack.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/pstypes.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psft.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttpload.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttgxvar.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttsubpix.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttsubpix.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttinterp.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttdriver.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttgload.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttpload.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttinterp.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttdriver.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttgxvar.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttgload.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttobjs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttobjs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/tterrors.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/aflatin.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afwarp.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afangles.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afstyles.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afranges.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afloader.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afloader.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afdummy.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afangles.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afglobal.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afcjk.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afglobal.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afblue.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afshaper.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afcover.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afmodule.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afhints.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/aflatin.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afscript.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afmodule.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afdummy.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afranges.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afcjk.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afindic.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afblue.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afwrtsys.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afwarp.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afhints.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afshaper.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afindic.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/aftypes.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/aferrors.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psnames/psnamerr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psnames/psmodule.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psnames/psmodule.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psnames/pstables.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/smooth/ftsmooth.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/smooth/ftgrays.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/smooth/ftsmerrs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/smooth/ftsmooth.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/smooth/ftgrays.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/raster/ftraster.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/raster/ftraster.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/raster/ftrend1.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/raster/ftrend1.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/raster/ftmisc.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/raster/rasterrs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftsynth.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftutil.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftrfork.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftsystem.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftpatent.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstroke.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftoutln.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftfstype.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftbbox.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftgloadr.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftcid.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftlcdfil.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftgasp.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftbase.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftcalc.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftdbgmem.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/fttrigon.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftsnames.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftglyph.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftdebug.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftpsprop.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftobjs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/fttype1.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftmac.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftmm.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftinit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftadvanc.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftfntfmt.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/fthash.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftbitmap.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffcmap.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffdrivr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cfferrs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffcmap.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffparse.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffparse.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffgload.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffobjs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffload.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffobjs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffgload.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffload.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cfftoken.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffdrivr.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/ft2build.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/fttypes.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftrender.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftmoderr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/fterrdef.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftmodapi.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftoutln.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftoption.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftconfig.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftheader.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftmodule.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftmm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/tttags.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftincrem.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftdriver.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftsizes.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftchapters.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftfntfmt.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftcid.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftstroke.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftbitmap.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftsynth.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/fterrors.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftgasp.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftlist.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svsfnt.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svbdf.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svcid.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svmm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svpsinfo.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svkern.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svtteng.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svttglyf.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svttcmap.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svmetric.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svgldict.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svcfftl.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svpscmap.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svwinfnt.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svpfr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svfntfmt.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svpostnm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svotval.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svgxval.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/services/svprop.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftvalid.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftpsprop.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/tttypes.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/wofftypes.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/cffotypes.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftcalc.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/internal.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/sfnt.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/autohint.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/fthash.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/cfftypes.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/psaux.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/pshints.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftdebug.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftmemory.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftgloadr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftobjs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftdrv.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftstream.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/t1types.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftrfork.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/ftserv.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/fttrace.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftadvanc.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftbbox.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftcolor.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/tttables.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftlcdfil.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/fttrigon.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftsnames.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftparams.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/t1tables.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ttnameid.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/freetype.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftimage.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftmac.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftbdf.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftglyph.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftsystem.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftgzip.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gfx_impl.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_jpeg.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gif.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/java_awt_SplashScreen.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gfx_impl.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_png.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gfx.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Configure.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDevice.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PortMixerProvider.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PlatformMidi.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/SoundDefs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Ports.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PlatformMidi.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudioDevice.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDevice.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudioDeviceProvider.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudio.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PortMixer.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Platform.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/liblcms/LCMS.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConvClearEdge_Fp.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_image.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine_NN.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_32nw.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageConvCopyEdge.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageScanPoly.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine_BC_F32.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_u16nw.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_16ext.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_D64nw.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_F32nw.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_status.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageClipping.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConvCopyEdge_Bit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConvEdge.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConvMxN.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine_BC_S32.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageAffine_NN.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageAffine_BL.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageConvClearEdge.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/safe_math.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/safe_alloc.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageAffine_BC.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageCopy.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageConvVersion.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageConv.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageRowTable.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageAffine_BC_S16.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageFilters.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffineEdge.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_8ext.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageLookUp_64.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageCopy.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageAffine_BL_S16.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_8nw.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageLookUp_f.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageConv_f.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine_BL_S32.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageLookUp.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageLookUp.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine_NN_Bit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageLookUp.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_image_get.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConvKernelConvert.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageAffine_BL_U16.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConvClearEdge_Bit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageDivTables.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_image_proto.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageFilters.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConvMxN_Fp.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageClipping.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine_BL_D64.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageCheck.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageUtils.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_sys.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_image_types.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConvMxN_ext.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageLookUp_Bit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageCreate.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_u16ext.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine_BL_F32.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/j2d_names.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageConv_16nw.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageDivTables.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_sys_proto.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_SysMath.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_types.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_c_ImageAffine_BC_U16.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libmlib_image/mlib_ImageAffine_BC_D64.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/jinclude.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/jpegdecoder.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/Trace.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/SurfaceData.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/Disposer.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/Disposer.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FillPath.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteBinary2Bit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteGray.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Index12Gray.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntBgr.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ThreeByteBgr.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ThreeByteBgr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntArgbBm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/DrawParallelogram.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteIndexed.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Ushort555Rgbx.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntArgbPre.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/UshortGray.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntRgbx.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/UshortIndexed.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntRgbx.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AlphaMath.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/DrawLine.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ProcessPath.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntArgb.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Any3Byte.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Any3Byte.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/DrawPath.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AnyByteBinary.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Index8Gray.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/GraphicsPrimitiveMgr.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Ushort565Rgb.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Ushort4444Argb.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntArgbPre.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ImageData.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Ushort555Rgb.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntRgb.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntArgb.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/GraphicsPrimitiveMgr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/UshortGray.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Ushort565Rgb.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AnyByte.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AnyShort.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ProcessPath.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Any4Byte.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteGray.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/UshortIndexed.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/TransformHelper.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AnyByte.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AlphaMacros.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/LineUtils.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/DrawPolygons.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FourByteAbgrPre.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteBinary1Bit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Index12Gray.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/GlyphImageRef.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntRgb.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/MaskBlit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FourByteAbgrPre.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/LoopMacros.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ParallelogramUtils.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteBinary4Bit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FillSpans.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AnyShort.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntBgr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Ushort4444Argb.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/MaskFill.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/DrawPath.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ScaledBlit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/BlitBg.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AlphaMath.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FillParallelogram.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/DrawRect.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntDcm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteBinary1Bit.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AnyInt.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AlphaMacros.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Blit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Ushort555Rgb.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AnyInt.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/IntArgbBm.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Index8Gray.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Any4Byte.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Ushort555Rgbx.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteBinary2Bit.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FillRect.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteBinary4Bit.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteIndexed.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FourByteAbgr.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FourByteAbgr.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/Trace.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/PathConsumer2D.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/ShapeSpanIterator.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/Region.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/SpanIterator.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/BufferedRenderPipe.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/BufferedMaskBlit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/SpanClipRenderer.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/Region.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/SurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_output8.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_nodither.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_alpha.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_icm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_input8_32.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_output8_16_24.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_noscale.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_ordclrsgn.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_input8.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_output8_16_32.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_colors.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_util.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_opaque.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_globals.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_output32.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_ordgray.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_output16_32.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_replscale.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_dir8dither.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_output16.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_orddither.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_fsdither.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_input32.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_dcm8.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_scaleloop.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_dirdither.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_anycm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_colors.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_fscolor.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_dcm.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_output24.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_output8_32.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_ordclruns.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_fsgray.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_globals.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_fsutil.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/BufImgSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/dither.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/DataBufferNative.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/imageInitIDs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/awt_ImageRep.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/awt_parseImage.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/dither.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/gif/gifdecoder.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/imageInitIDs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/awt_parseImage.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/BufImgSurfaceData.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/HBShaper.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/fontscaler.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/scriptMapping.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/DrawGlyphList.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/glyphblitting.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/sunFont.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/hb-jdk.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/freetypeScaler.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/scriptMapping.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/hb-jdk-font.cc
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLTextRenderer.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLFuncs.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLFuncs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBlitLoops.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLRenderQueue.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLRenderer.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLPaints.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/khrplatform.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/gl.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLRenderer.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBlitLoops.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLRenderQueue.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLSurfaceData.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLVertexCache.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLFuncMacros.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLMaskBlit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLMaskFill.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLTextRenderer.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLVertexCache.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLMaskBlit.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLMaskFill.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLPaints.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_assert.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_assert.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_mem.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_util.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_util.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_mem.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/utility/rect.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/medialib/mlib_ImageCreate.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/medialib/mlib_ImageCopy_Bit.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/medialib/mlib_sys.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/font/sunfontids.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/font/AccelGlyphCache.c
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/font/fontscalerdefs.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/common/font/AccelGlyphCache.h
Examining data/openjdk-16-16~14/src/java.desktop/share/native/include/jawt.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libsplashscreen/splashscreen_config.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_Ports.cpp
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_Utils.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_MidiUtils.c
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_Utils.cpp
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_MidiUtils.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_MidiOut.c
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_MidiIn.c
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libosxui/ScreenMenu.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libosxui/JRSUIConstantSync.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/java2d/opengl/CGLGraphicsConfig.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/java2d/opengl/CGLSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/java2d/opengl/J2D_GL/cglext.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/java2d/opengl/OGLFuncs_md.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/java2d/opengl/CGLLayer.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/OSVersion.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/PrintModel.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CSystemColors.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/PrinterView.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/ImageSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CDropTarget.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CMenu.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CMenuItem.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CFileDialog.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/QuartzSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/GeomUtilities.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/InitIDs.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/JavaComponentAccessibility.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/AWTWindow.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/LWCToolkit.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/JavaTextAccessibility.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/AWTView.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CDataTransferer.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/AWTEvent.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/AWTSurfaceLayers.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CMenuComponent.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CDragSource.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CTrayIcon.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/DnDUtilities.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CPopupMenu.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CMenuBar.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/JavaAccessibilityUtilities.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/ApplicationDelegate.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/CRobotKeyCode.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/JavaAccessibilityAction.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/awt/PrinterSurfaceData.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/font/CGGlyphImages.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/font/CoreTextSupport.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/font/AWTStrike.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/font/AWTFont.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libawt_lwawt/font/CGGlyphOutlines.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libosxapp/ThreadUtilities.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libosxapp/AWT_debug.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libosxapp/NSApplicationAWT.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libosxapp/PropertiesUtilities.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/libosxapp/QueuingApplicationDelegate.h
Examining data/openjdk-16-16~14/src/java.desktop/macosx/native/include/jawt_md.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/ECC_JNI.cpp
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/secitem.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_jac.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/oid.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_gf.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec2_mont.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mp_gf2m.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mplogic.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi-priv.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_mont.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mp_gf2m.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecc_impl.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_jm.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_256.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec2_233.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_521.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec2_aff.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec_naf.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mplogic.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec2_163.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec2.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mp_gf2m-priv.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec2_193.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_192.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpmontg.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/secoidt.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpprime.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_384.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_aff.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/logtab.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl-exp.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl-curve.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi-config.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl-priv.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp.h
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_mult.c
Examining data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecp_224.c
Examining data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp
Examining data/openjdk-16-16~14/src/jdk.jdi/windows/native/libdt_shmem/shmem_md.h
Examining data/openjdk-16-16~14/src/jdk.jdi/windows/native/libdt_shmem/shmem_md.c
Examining data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/SharedMemoryTransport.c
Examining data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/sysShmem.h
Examining data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c
Examining data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/SharedMemoryConnection.c
Examining data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c
Examining data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.h
Examining data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/SharedMemory.h
Examining data/openjdk-16-16~14/src/jdk.internal.le/windows/native/lible/Kernel32.cpp
Examining data/openjdk-16-16~14/src/jdk.net/linux/native/libextnet/LinuxSocketOptions.c
Examining data/openjdk-16-16~14/src/jdk.net/macosx/native/libextnet/MacOSXSocketOptions.c
Examining data/openjdk-16-16~14/src/jdk.security.auth/windows/native/libjaas/nt.c
Examining data/openjdk-16-16~14/src/jdk.security.auth/unix/native/libjaas/Unix.c
Examining data/openjdk-16-16~14/src/hotspot/os/posix/threadLocalStorage_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/semaphore_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/gc/z/zUtils_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/gc/z/zVirtualMemory_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/gc/z/zInitialize_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/gc/z/zArguments_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/jvm_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/vmError_posix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/semaphore_posix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/posix/include/jvm_md.h
Examining data/openjdk-16-16~14/src/hotspot/os/windows/vmError_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/pdh_interface.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/sharedRuntimeRem.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/osThread_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/iphlp_interface.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/iphlp_interface.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/semaphore_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/windbghelp.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/osThread_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/c2_globals_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/vmStructs_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/pdh_interface.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/jvm_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/windbghelp.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/threadLocalStorage_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zSyscall_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zArguments_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zLargePages_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zUtils_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zSyscall_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zNUMA_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zPhysicalMemoryBacking_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zInitialize_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zVirtualMemory_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zMapper_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zMapper_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zPhysicalMemoryBacking_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/os_share_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/threadCritical_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/decoder_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/globals_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/semaphore_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/windows/include/jvm_md.h
Examining data/openjdk-16-16~14/src/hotspot/os/windows/c1_globals_windows.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/osContainer_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/waitBarrier_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/globals_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/threadCritical_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/c1_globals_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/osContainer_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/osThread_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/c2_globals_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/decoder_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zMountPoint_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zMountPoint_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zLargePages_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zNUMA_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zSyscall_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zSyscall_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV2Subsystem_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/osThread_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/waitBarrier_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV2Subsystem_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/os_share_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/vmStructs_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/os_share_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/c2_globals_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/os_perf_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/gc/z/zLargePages_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/gc/z/zPhysicalMemoryBacking_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/gc/z/zNUMA_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/gc/z/zPhysicalMemoryBacking_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/c1_globals_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/osThread_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/globals_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/osThread_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/semaphore_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/vmStructs_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/semaphore_bsd.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/decoder_machO.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/decoder_machO.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/bsd/threadCritical_bsd.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/vmStructs_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/misc_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/loadlib_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/loadlib_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/decoder_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/porting_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/osThread_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/safepointMechanism_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/libo4.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/c2_globals_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/c1_globals_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/os_share_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/osThread_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/libo4.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/threadCritical_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/libodm_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/porting_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/libodm_aix.cpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/misc_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os/aix/globals_aix.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/os_linux_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/orderAccess_linux_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/thread_linux_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/atomic_linux_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/thread_linux_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/bytes_linux_ppc.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/os_linux_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/globals_linux_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/vmStructs_linux_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/prefetch_linux_ppc.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/atomic_linux_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/assembler_linux_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/vmStructs_linux_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/thread_linux_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/vm_version_linux_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/bytes_linux_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/gc/z/zSyscall_linux_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/orderAccess_linux_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/copy_linux_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/os_linux_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/os_linux_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/prefetch_linux_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/thread_linux_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/globals_linux_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/os_linux_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/globals_aix_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/orderAccess_aix_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/bytes_aix_ppc.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/os_aix_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/prefetch_aix_ppc.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/thread_aix_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/thread_aix_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/atomic_aix_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/os_aix_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/vmStructs_aix_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/orderAccess_linux_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/bytes_linux_aarch64.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/os_linux_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/vm_version_linux_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/copy_linux_aarch64.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/atomic_linux_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/thread_linux_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/gc/z/zSyscall_linux_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/thread_linux_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/os_linux_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/assembler_linux_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/prefetch_linux_aarch64.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/vmStructs_linux_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/globals_linux_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/thread_linux_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/bytes_linux_arm.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/vmStructs_linux_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/macroAssembler_linux_arm_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/vm_version_linux_arm_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/os_linux_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/thread_linux_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/copy_linux_arm.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/os_linux_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/orderAccess_linux_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/atomic_linux_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/prefetch_linux_arm.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/globals_linux_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/globals_bsd_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/assembler_bsd_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/vm_version_bsd_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/vmStructs_bsd_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/atomic_bsd_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/thread_bsd_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/bytes_bsd_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/orderAccess_bsd_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/prefetch_bsd_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/copy_bsd_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/thread_bsd_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/orderAccess_linux_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/bytes_linux_s390.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/thread_linux_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/thread_linux_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/globals_linux_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/os_linux_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/prefetch_linux_s390.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/vmStructs_linux_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/atomic_linux_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/os_linux_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/unwind_windows_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/thread_windows_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/assembler_windows_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/globals_windows_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/os_windows_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/thread_windows_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/os_windows_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/orderAccess_windows_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/vmStructs_windows_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/prefetch_windows_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/bytes_windows_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/atomic_windows_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/vm_version_windows_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/globals_bsd_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/thread_bsd_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/prefetch_bsd_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/vmStructs_bsd_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/assembler_bsd_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/bytes_bsd_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/thread_bsd_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/vm_version_bsd_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/atomic_bsd_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/orderAccess_bsd_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/thread_linux_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/assembler_linux_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/prefetch_linux_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/vm_version_linux_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/atomic_linux_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/vmStructs_linux_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/globals_linux_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/thread_linux_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/orderAccess_linux_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/bytes_linux_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/os_linux_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_LinearScan_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/register_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_LIRAssembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_ext_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_MacroAssembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vmStructs_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_FrameMap_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/abstractInterpreter_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/assembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/interp_masm_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c2_MacroAssembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/compiledIC_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/stubRoutines_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c2_globals_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/register_definitions_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_Defs_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/codeBuffer_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/templateInterpreterGenerator_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/registerSaver_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c2_MacroAssembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_LIR_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/assembler_s390.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/frame_s390.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/interpreterRT_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_FpuStackSim_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_FrameMap_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_LIRGenerator_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/icBuffer_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_MacroAssembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_ext_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/jvmciCodeInstaller_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/copy_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/disassembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_LIRAssembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vmreg_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/javaFrameAnchor_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/frame_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/g1/g1BarrierSetAssembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/g1/g1BarrierSetAssembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/shared/barrierSetAssembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/shared/modRefBarrierSetAssembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/shared/cardTableBarrierSetAssembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/shared/modRefBarrierSetAssembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/shared/barrierSetAssembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/shared/cardTableBarrierSetAssembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/gc/shared/barrierSetNMethod_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/register_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/sharedRuntime_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/stubRoutines_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/jniFastGetField_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/nativeInst_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/icache_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/templateTable_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/relocInfo_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/templateTable_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/methodHandles_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_globals_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/bytes_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/assembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/globalDefinitions_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/interpreterRT_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_Runtime1_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/frame_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/depChecker_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/macroAssembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/disassembler_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/runtime_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vmreg_s390.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c2_init_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/macroAssembler_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_CodeStubs_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/icache_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/macroAssembler_s390.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/registerMap_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/interp_masm_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/globals_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/jniTypes_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/relocInfo_s390.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vtableStubs_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/vmreg_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/methodHandles_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_LinearScan_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/stubGenerator_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/s390/nativeInst_s390.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/icache_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/frame_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/jniFastGetField_x86_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_CodeStubs_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_FrameMap_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/assembler_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/crc32c.h
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/jniFastGetField_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/jniTypes_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_init_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/rdtsc_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/runtime_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/methodHandles_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_intelJccErratum_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_FpuStackSim_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/assembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/icBuffer_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/bytes_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_globals_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/relocInfo_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vmreg_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/depChecker_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/register_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/methodHandles_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Defs_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/nativeInst_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/nativeInst_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/templateInterpreterGenerator_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/assembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/codeBuffer_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/jvmciCodeInstaller_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/interpreterRT_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/globalDefinitions_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/compiledIC_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/globals_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vmreg_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/registerMap_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LinearScan_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/runtime_x86_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/register_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/z/zBarrierSetAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/z/zBarrierSetAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/z/zGlobals_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/z/zGlobals_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/modRefBarrierSetAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/barrierSetNMethod_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/modRefBarrierSetAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vmStructs_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRGenerator_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_FrameMap_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/javaFrameAnchor_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/stubRoutines_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LinearScan_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_MacroAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_FpuStackSim_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/relocInfo_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/stubRoutines_x86_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIR_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_globals_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/register_definitions_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_intelJccErratum_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_md5.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vmreg_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/frame_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/stubRoutines_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/copy_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/icache_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/interpreterRT_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/abstractInterpreter_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/registerMap_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/disassembler_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/compiledIC_aot_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/stubRoutines_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/depChecker_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/templateInterpreterGenerator_x86_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/frame_x86.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/rdtsc_x86.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/interpreterRT_x86_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/interp_masm_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/codeBuffer_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/assembler_arm_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/frame_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/stubRoutines_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/sharedRuntime_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/relocInfo_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/assembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_LIRGenerator_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/frame_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/templateInterpreterGenerator_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/copy_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_ext_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_LIRAssembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_MacroAssembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/relocInfo_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_ext_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/frame_arm.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c2_globals_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/templateTable_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vmreg_arm.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vmStructs_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/javaFrameAnchor_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c2_MacroAssembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/register_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/registerMap_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_Defs_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/interpreterRT_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_LIRGenerator_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/register_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/nativeInst_arm_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/templateTable_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_Runtime1_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_FpuStackSim_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_CodeStubs_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_FrameMap_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/stubRoutines_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_LinearScan_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/macroAssembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/methodHandles_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/abstractInterpreter_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_LIR_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/interp_masm_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/g1/g1BarrierSetAssembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/g1/g1BarrierSetAssembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/shared/cardTableBarrierSetAssembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/shared/barrierSetAssembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/shared/barrierSetAssembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/shared/modRefBarrierSetAssembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/shared/modRefBarrierSetAssembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/shared/cardTableBarrierSetAssembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/gc/shared/barrierSetNMethod_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_FrameMap_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/register_definitions_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/assembler_arm.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/macroAssembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/icache_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/nativeInst_arm_32.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/globals_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/depChecker_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/jniTypes_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_FpuStackSim_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/jniFastGetField_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/jvmciCodeInstaller_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/icBuffer_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/nativeInst_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/runtime_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/stubGenerator_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/disassembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vmreg_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vtableStubs_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/depChecker_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c2_MacroAssembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/icache_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_arm_32.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/vmreg_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/bytes_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/compiledIC_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/assembler_arm.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/interpreterRT_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/globalDefinitions_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_globals_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_LinearScan_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/macroAssembler_arm.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/methodHandles_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_LIRAssembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/c1_MacroAssembler_arm.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/arm/assembler_arm_32.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/relocInfo_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/depChecker_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/icache_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/assembler_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/methodHandles_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/entryFrame_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vm_version_ext_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/jniTypes_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/bytecodeInterpreter_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/assembler_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/bytes_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/compiledIC_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/stubRoutines_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/assembler_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/macroAssembler_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/copy_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vmreg_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vmreg_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/stack_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/interpreterFrame_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/sharedRuntime_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/jniFastGetField_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/fakeStubFrame_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/entry_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/nativeInst_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/abstractInterpreter_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/interp_masm_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/relocInfo_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/register_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/bytecodeInterpreter_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/disassembler_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/gc/g1/g1BarrierSetAssembler_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/gc/shared/cardTableBarrierSetAssembler_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/gc/shared/barrierSetAssembler_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/gc/shared/modRefBarrierSetAssembler_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/gc/shared/barrierSetNMethod_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/codeBuffer_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/globals_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/globalDefinitions_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/stubRoutines_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/javaFrameAnchor_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/stack_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vm_version_ext_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/methodHandles_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/register_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vmreg_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/stubGenerator_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/interpreterRT_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/bytecodeInterpreter_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/nativeInst_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/icache_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/registerMap_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/interpreterRT_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/zeroInterpreter_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/disassembler_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vm_version_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vmStructs_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/macroAssembler_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/depChecker_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vtableStubs_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/vm_version_zero.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/stack_zero.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/icBuffer_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/zero/zeroInterpreter_zero.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vtableStubs_ppc_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/javaFrameAnchor_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c2_MacroAssembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vmreg_ppc.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/compiledIC_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/globalDefinitions_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/nativeInst_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRGenerator_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LinearScan_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/methodHandles_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c2_MacroAssembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_globals_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_FpuStackSim_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/abstractInterpreter_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIR_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vmStructs_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/frame_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/icache_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/disassembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LinearScan_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/copy_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/jniTypes_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/depChecker_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/codeBuffer_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_FrameMap_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/runtime_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vmreg_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/relocInfo_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c2_globals_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/jvmciCodeInstaller_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/shared/barrierSetAssembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/shared/modRefBarrierSetAssembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/shared/barrierSetNMethod_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/shared/modRefBarrierSetAssembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/shared/cardTableBarrierSetAssembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/shared/barrierSetAssembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/shared/cardTableBarrierSetAssembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/relocInfo_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/icache_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/register_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/globals_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/disassembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/register_definitions_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubRoutines_ppc_64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c2_init_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/vmreg_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/registerMap_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/register_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/frame_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/methodHandles_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/jniFastGetField_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubRoutines_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/bytes_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/nativeInst_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/frame_ppc.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/interp_masm_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_FrameMap_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/icBuffer_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateInterpreterGenerator_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_Defs_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_CodeStubs_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/sharedRuntime_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/interpreterRT_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/interpreterRT_ppc.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/frame_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_FrameMap_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/icBuffer_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_LIRAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/templateTable_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/jniFastGetField_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/register_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/bytecodes_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/interpreterRT_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/stubRoutines_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vmreg_aarch64.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/methodHandles_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/relocInfo_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/interpreterRT_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_LinearScan_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vmreg_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_FpuStackSim_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_globals_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_Runtime1_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/depChecker_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_FpuStackSim_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/immediate_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/sharedRuntime_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/disassembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_MacroAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vmreg_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64_log.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vtableStubs_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64_trig.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/icache_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_LIRAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/nativeInst_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c2_MacroAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c2_init_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/bytecodes_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/javaFrameAnchor_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/compiledIC_aot_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/stubRoutines_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/globalDefinitions_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/z/zBarrierSetAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/z/zGlobals_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/z/zGlobals_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/z/zBarrierSetAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/shenandoahBarrierSetAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/shenandoahBarrierSetAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/g1/g1BarrierSetAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/g1/g1BarrierSetAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shared/barrierSetAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shared/modRefBarrierSetAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shared/barrierSetAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shared/barrierSetNMethod_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shared/cardTableBarrierSetAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shared/cardTableBarrierSetAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shared/modRefBarrierSetAssembler_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/register_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/compiledIC_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/globals_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/frame_aarch64.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/runtime_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/frame_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/methodHandles_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/nativeInst_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/registerMap_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_LIR_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/interp_masm_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vmStructs_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/depChecker_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/relocInfo_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/templateInterpreterGenerator_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/bytes_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/abstractInterpreter_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/jvmciCodeInstaller_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_LinearScan_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/icache_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/immediate_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/register_definitions_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_CodeStubs_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/codeBuffer_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/aarch64Test.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_LIRGenerator_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_MacroAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c2_globals_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/interp_masm_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/jniTypes_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_FrameMap_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/copy_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c1_Defs_aarch64.hpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/c2_MacroAssembler_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/cpu/aarch64/stubGenerator_aarch64.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/heapDumperCompression.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/threadService.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/management.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/management.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memoryManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/mallocSiteTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/threadStackTracker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/nmtCommon.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/virtualMemoryTracker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/nmtCommon.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/allocationSite.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/gcNotifier.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/threadStackTracker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/lowMemoryDetector.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/nmtDCmd.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memoryPool.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/nmtDCmd.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/dtraceAttacher.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/gcNotifier.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/classLoadingService.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memBaseline.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/threadIdTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/threadIdTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/diagnosticCommand.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memoryPool.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/attachListener.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/lowMemoryDetector.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/runtimeService.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/virtualMemoryTracker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memTracker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/classLoadingService.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memoryService.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/heapDumperCompression.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memReporter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memoryService.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memBaseline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/threadService.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memReporter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memoryUsage.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/diagnosticCommand.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/mallocSiteTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/mallocTracker.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/mallocTracker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/mallocTracker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memoryManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/memTracker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/services/runtimeService.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethodBlocks.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciEnv.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMemberName.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciSignature.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciConstant.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMemberName.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciSymbol.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethodBlocks.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciUtilities.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciInstanceKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciCallProfile.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethodHandle.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethodData.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciField.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciExceptionHandler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciBaseObject.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethodType.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMetadata.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciConstant.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciObjectFactory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciTypeArray.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciTypeFlow.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciInstance.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciSymbol.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciStreams.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciBaseObject.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciCallSite.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciSignature.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciInstance.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciArrayKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMetadata.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciObjArray.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciFlags.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethodHandle.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciInstanceKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciNullObject.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciClassList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciConstantPoolCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciObjectFactory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/bcEscapeAnalyzer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciObject.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciTypeArrayKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciStreams.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciNullObject.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciCallSite.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciTypeArrayKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciObjArrayKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciEnv.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciField.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciArrayKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciObjArrayKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciArray.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciUtilities.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/compilerInterface.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethodData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciTypeFlow.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciUtilities.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciObject.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/bcEscapeAnalyzer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciMethodType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciTypeArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciConstantPoolCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciObjArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciFlags.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciExceptionHandler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/ci/ciType.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/arena.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/forms.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/dict2.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/dfa.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/arena.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/forms.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/filebuff.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/dict2.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/filebuff.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/formsopt.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/adlc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/adlc/formsopt.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/isIntegral.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/isFloatingPoint.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/removePointer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/primitiveConversions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/removeExtent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/logical.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/isConst.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/isSame.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/decay.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/isVolatile.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/conditional.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/enableIf.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/isPointer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/isSigned.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/isArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/removeCV.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/removeReference.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/metaprogramming/integralConstant.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderDataGraph.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/verificationType.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/stackMapTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/vmSymbols.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/systemDictionary.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classFileError.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/altHashing.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/modules.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/dictionary.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderStats.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/bytecodeAssembler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/verifier.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/protectionDomainCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/verificationType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/stackMapFrame.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/javaAssertions.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderHierarchyDCmd.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/defaultMethods.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/dictionary.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderExt.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/metadataOnStackMark.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/javaAssertions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/verifier.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/fieldLayoutBuilder.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classFileStream.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/protectionDomainCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/stackMapFrame.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/loaderConstraints.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/moduleEntry.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/fieldLayoutBuilder.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classFileStream.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/compactHashtable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/placeholders.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/stringTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/systemDictionaryShared.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/altHashing.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/klassFactory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/resolutionErrors.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/klassFactory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderHierarchyDCmd.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/vmSymbols.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/metadataOnStackMark.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderData.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/resolutionErrors.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/moduleEntry.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/systemDictionary.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/stringTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/loaderConstraints.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderDataGraph.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/symbolTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/bytecodeAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderExt.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderStats.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/stackMapTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/systemDictionaryShared.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/compactHashtable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderData.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderDataGraph.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/defaultMethods.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/packageEntry.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/packageEntry.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/stackMapTableFormat.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/symbolTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/classLoadInfo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/classfile/placeholders.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logLevel.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logSelection.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logStream.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logDecorations.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logTagSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logOutput.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logOutput.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logDecorators.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logFileStreamOutput.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logLevel.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logHandle.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logDecorators.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logFileStreamOutput.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logTagSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logSelection.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logDiagnosticCommand.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logTagSetDescriptions.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logMessageBuffer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logSelectionList.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logDecorations.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logMessageBuffer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logOutputList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logStream.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/log.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logTag.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logPrefix.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logTagSetDescriptions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logOutputList.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logDiagnosticCommand.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logTag.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logSelectionList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/logging/logMessage.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/debugInfo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/icBuffer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/exceptionHandlerTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/pcDesc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/location.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/compiledMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/compressedStream.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/vtableStubs.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/compiledMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/compiledIC.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/stubs.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/dependencyContext.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/vmreg.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/pcDesc.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/vmreg.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/relocInfo.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/debugInfoRec.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/debugInfo.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/scopeDesc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/vmreg.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/dependencies.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/codeCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/stubs.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/oopRecorder.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/vtableStubs.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/icBuffer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/location.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/codeBlob.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/compiledIC.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/codeBehaviours.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/nmethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/nativeInst.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/compressedStream.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/nmethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/compiledMethod.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/relocInfo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/scopeDesc.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/codeCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/oopRecorder.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/dependencies.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/oopRecorder.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/codeBlob.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/exceptionHandlerTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/codeBehaviours.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/debugInfoRec.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/code/dependencyContext.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/jniHandles.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/frame.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/abstract_vm_version.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/fieldDescriptor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/threadCritical.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/jniHandles.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntimeTrans.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/os.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/signature.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/os.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/safepoint.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vm_version.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/icache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/stubCodeGenerator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vframeArray.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/threadHeapSampler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/perfMemory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/rtmLocking.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/statSampler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/serviceThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/safepointMechanism.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/semaphore.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntimeTrig.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/orderAccess.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/stackValue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/synchronizer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/sweeper.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/safepointVerifiers.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/frame.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/prefetch.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/mutex.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/basicLock.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vmThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/objectMonitor.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlagConstraintList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlag.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlagConstraintsCompiler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlagConstraintsCompiler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlag.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlagRangeList.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlagConstraintList.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlagConstraintsRuntime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlagRangeList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlagConstraintsRuntime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/flags/flagSetting.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/semaphore.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/init.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/jniPeriodicChecker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/init.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/globals.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/notificationThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/threadStatisticalInfo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/handshake.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/javaCalls.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/biasedLocking.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/unhandledOops.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/globals_extension.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/osThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/globals_shared.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/sweeper.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/prefetch.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/handshake.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/handles.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/task.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/javaCalls.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/basicLock.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/timer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/relocator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vframeArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/park.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vmStructs.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/stubRoutines.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/objectMonitor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/unhandledOops.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/rtmLocking.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/icache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/stubCodeGenerator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/threadSMR.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/park.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/monitorChunk.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/safepointMechanism.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/atomic.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/threadSMR.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/memprofiler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/objectMonitor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/javaFrameAnchor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vmOperations.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/osThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/timerTrace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/statSampler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/abstract_vm_version.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/biasedLocking.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/safepointVerifiers.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/signature.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vm_version.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/monitorChunk.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/mutexLocker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/handles.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/mutexLocker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/registerMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/timer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/fieldDescriptor.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/stackValueCollection.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/serviceThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntimeMath.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/reflectionUtils.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vmStructs.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/reflectionUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/jniPeriodicChecker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vframe_hp.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/notificationThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/threadHeapSampler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/java.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/safepoint.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/task.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vframe.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/handles.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/interfaceSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vmOperations.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/stackValue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/stackValueCollection.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/relocator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/memprofiler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/interfaceSupport.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/stubRoutines.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/jniHandles.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/threadLocalStorage.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/mutex.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/timerTrace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vmThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/perfMemory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vframe.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/threadSMR.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/synchronizer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/frame.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/thread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/orderAccess.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/safepointMechanism.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/java.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/thread.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vframe_hp.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/fieldDescriptor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/jfieldIDWorkaround.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/os_perf.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/runtime/vframe.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/aotLoader.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/compiledIC_aot.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/compiledIC_aot.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/aotCompiledMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/aotLoader.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/aotCompiledMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/aot/aotLoader.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrBigEndianWriter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrEventWriterHost.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrStreamWriterHost.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrPosition.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrStreamWriterHost.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrWriterHost.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrJavaEventWriter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrEncoding.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrNativeEventWriter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrStorageHost.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrStorageHost.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrTypeWriterHost.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrJavaEventWriter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrEventWriterHost.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrPosition.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrEncoders.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrStorageAdapter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJavaCall.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJavaSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrUpcalls.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJavaCall.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrUpcalls.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJniMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJniMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/metadata/jfrSerializer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrOSInterface.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrModuleEvent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrModuleEvent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrThreadCPULoadEvent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/sampling/jfrCallTrace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/sampling/jfrThreadSampler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/sampling/jfrThreadSampler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/sampling/jfrCallTrace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrOSInterface.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrThreadCPULoadEvent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrEventSetting.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTraceRepository.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTraceRepository.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderService.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrEvent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrMemorySizer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrOptionSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrPostBox.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrMemorySizer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrPostBox.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrEvent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolBuffer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stringpool/jfrStringPool.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stringpool/jfrStringPool.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolWriter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolWriter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stringpool/jfrStringPoolBuffer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrEventSetting.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrRecorder.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorageControl.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrFullStorage.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrEpochStorage.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrMemorySpaceRetrieval.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrBuffer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorageUtils.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrEpochStorage.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrBuffer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrFullStorage.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorageControl.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorageUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointWriter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadState.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrType.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdKlassQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdBits.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdEpoch.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdKlassQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdBits.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdLoadBarrier.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceId.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdLoadBarrier.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdEpoch.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdLoadBarrier.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/traceid/jfrTraceIdMacros.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadState.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/jfrMetadataEvent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/jfrMetadataEvent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointWriter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrRepository.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunk.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunkRotation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunk.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunkRotation.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrEventSetting.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrRecorder.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jfr.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/dcmd/jfrDcmds.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/dcmd/jfrDcmds.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrConcurrentQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrEpochQueue.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrConcurrentLinkedListHost.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrBlob.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrTime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrBlob.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrTimeConverter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrTimeConverter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrHashtable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrVersionSystem.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrDoublyLinkedList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrTypes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrJavaLog.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrJavaLog.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrEpochQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrThreadIterator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrThreadIterator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrNode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrTime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrResourceManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrConcurrentQueue.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrConcurrentLinkedListHost.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrTryLock.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrVersionSystem.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLinkedList.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrPredicate.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrIterator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrRefCountPointer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrRelation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrSpinlockHelper.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLinkedList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jfrEvents.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/stopOperation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/edgeUtils.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/rootSetClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/edgeStore.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/rootSetClosure.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/bitset.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/edgeStore.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/edge.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/edgeUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/edge.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/bitset.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/edgeQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/dfsClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/dfsClosure.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/edgeQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/bitset.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/objectSampleMarker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/unifiedOopRef.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/saveRestore.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/granularTimer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/saveRestore.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/unifiedOopRef.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/granularTimer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/vmOperation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleCheckpoint.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleCheckpoint.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/eventEmitter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleWriter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/eventEmitter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleWriter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/sampling/objectSampler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/sampling/sampleList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/sampling/samplePriorityQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/sampling/objectSampler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/sampling/sampleList.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/sampling/objectSample.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/sampling/samplePriorityQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/sampling/objectSample.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/startOperation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/leakProfiler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/jfr.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrJdkJfrEvent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrMethodLookup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrJdkJfrEvent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrThreadLocal.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrTraceIdExtension.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrThreadLocal.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrMethodLookup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrStackTraceMark.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrKlassUnloading.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrAllocationTracer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrStackTraceMark.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrEpochSynchronization.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrThreadId.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrKlassExtension.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrThreadExtension.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrFlush.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrFlush.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrAllocationTracer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrEpochSynchronization.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrIntrinsics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jfr/support/jfrKlassUnloading.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilerEvent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilerDefinitions.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/directivesParser.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilerEvent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilerDirectives.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/methodLiveness.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/directivesParser.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilationPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/methodLiveness.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/abstractCompiler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/oopMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/abstractDisassembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/tieredThresholdPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilerDefinitions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compileTask.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/tieredThresholdPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/oopMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compileTask.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilationPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/abstractCompiler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/abstractDisassembler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compiler_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/compiler/compilerDirectives.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/precompiled/precompiled.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/pair.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/ticks.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/bitMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/formatBuffer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/dtrace_disabled.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/linkedlist.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/utf8.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/population_count.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/bitMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/resourceHash.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/waitBarrier_generic.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/tableStatistics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/waitBarrier.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/elfStringTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/numberSeq.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/decoder.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_xlc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/accessFlags.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/copy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/classpathStream.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/valueObjArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/json.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/constantTag.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/events.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/singleWriterSynchronizer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/classpathStream.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/globalCounter.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/bytes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/concurrentHashTableTasks.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/nativeCallStack.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/quickSort.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/exceptions.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/growableArray.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/elfFuncDescTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/virtualizationSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/spinYield.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/defaultStream.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/autoRestore.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_gcc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/fakeRttiSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/decoder_elf.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/stringUtils.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/constantTag.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/compilerWarnings.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/globalCounter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/decoder_elf.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/utf8.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/histogram.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/align.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/growableArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/powerOfTwo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/formatBuffer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/ticks.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/decoder.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/count_trailing_zeros.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/nativeCallStack.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/exceptions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/histogram.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/count_leading_zeros.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/elfSymbolTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/json.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/preserveException.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/elfStringTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/elfSymbolTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/concurrentHashTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/dtrace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/stringUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/hashtable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/compilerWarnings_visCPP.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/accessFlags.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/preserveException.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/elfFuncDescTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/stack.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/compilerWarnings_gcc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/breakpoint.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/sizes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/chunkedList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/hashtable.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/copy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/compilerWarnings_xlc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/numberSeq.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/singleWriterSynchronizer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/bitMap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/tribool.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/virtualizationSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/spinYield.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/tableStatistics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/concurrentHashTable.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/lockFreeStack.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/events.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/globalCounter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/hashtable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/stack.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/macros.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/waitBarrier_generic.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/utilities/debug.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_IR.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_CFGPrinter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueType.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_RangeCheckElimination.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Canonicalizer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_MacroAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_InstructionPrinter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_LinearScan.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueStack.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_CFGPrinter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_GraphBuilder.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueStack.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Compilation.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Defs.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIR.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_IR.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_FrameMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRAssembler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_FpuStackSim.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Runtime1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Compiler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Optimizer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Instruction.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_CodeStubs.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIR.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Defs.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_FrameMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Compilation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Runtime1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_RangeCheckElimination.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_InstructionPrinter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Optimizer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_GraphBuilder.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_LinearScan.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Compiler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Instruction.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Canonicalizer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_ValueSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/c1/c1_Decorators.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceMirrorKlass.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/cpCache.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/compiledICHolder.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/objArrayOop.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/verifyOopClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/arrayOop.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/markWord.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/compressedOops.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/accessBackend.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/methodData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/objArrayOop.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/metadata.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/objArrayKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/compressedOops.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/methodData.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/klassVtable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/markWord.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/cpCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/accessBackend.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/fieldInfo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/oopsHierarchy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/cpCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceOop.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceRefKlass.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/compressedOops.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/recordComponent.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/constantPool.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/weakHandle.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/constMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceClassLoaderKlass.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/method.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/klass.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceMirrorKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/weakHandle.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/objArrayKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/typeArrayOop.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/accessBackend.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/objArrayOop.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/constantPool.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceClassLoaderKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/array.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/oop.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/arrayKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/arrayKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/klass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceRefKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/constantPool.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/annotations.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/fieldStreams.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/arrayOop.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/methodCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/oop.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/typeArrayKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/annotations.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/oopsHierarchy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/markWord.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/arrayKlass.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/accessDecorators.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/recordComponent.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/klassVtable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/symbol.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/symbol.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/methodData.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/access.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/typeArrayKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/typeArrayKlass.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/fieldStreams.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/objArrayKlass.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceRefKlass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/compiledICHolder.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/access.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/weakHandle.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/oopHandle.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/oopHandle.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceMirrorKlass.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/metadata.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/instanceOop.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/method.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/typeArrayOop.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/methodCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/constMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/oops/oop.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/vmStructs_jvmci.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCodeInstaller.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/compilerRuntime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCodeInstaller.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmci.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/vmSymbols_jvmci.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jniAccessMark.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciObject.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompilerToVM.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmci_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmci_globals.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompiler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciExceptions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/metadataHandles.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/vmStructs_compiler_runtime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciJavaClasses.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/vmStructs_jvmci.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciJavaClasses.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompiler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/metadataHandles.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/compilerRuntime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmci.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/allocation.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceGCThresholdUpdater.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/heapShared.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/freeList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceShared.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/memRegion.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceChunkFreeListSummary.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/arena.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/binaryTreeDictionary.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/filemap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/archiveBuilder.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/heap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaspaceStatistics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/chunkManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaDebug.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaspaceDCmd.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/blockFreelist.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/occupancyMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/blockFreelist.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaDebug.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metachunk.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaspaceStatistics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/virtualSpaceList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaspaceSizesSnapshot.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metachunk.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaspaceCommon.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/occupancyMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/printMetaspaceInfoKlassClosure.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/printCLDMetaspaceInfoClosure.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaspaceSizesSnapshot.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/virtualSpaceNode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metablock.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/smallBlocks.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/smallBlocks.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaspaceDCmd.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/spaceManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/virtualSpaceList.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/printMetaspaceInfoKlassClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaspaceCommon.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/virtualSpaceNode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/chunkManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/printCLDMetaspaceInfoClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metabase.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/spaceManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/dynamicArchive.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/allStatic.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/arena.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/heapShared.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceShared.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/heapShared.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/heapInspection.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/virtualspace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/referenceType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/heapInspection.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceTracer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/padded.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceClosure.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/iterator.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/oopFactory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/virtualspace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/resourceArea.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/freeList.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/universe.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/resourceArea.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/archiveUtils.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/resourceArea.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/heap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/binaryTreeDictionary.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/archiveUtils.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/guardedMemory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/dumpAllocStats.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/operator_new.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/dumpAllocStats.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/universe.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/guardedMemory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/padded.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/oopFactory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/memRegion.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceTracer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceShared.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/iterator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metaspace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/dynamicArchive.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/archiveBuilder.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/metadataFactory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/allocation.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/archiveUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/iterator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/memory/allocation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zLargePages.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zInitialize.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zAddressSpaceLimit.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zUnload.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRelocationSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRelocate.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zForwardingTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPage.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zUnload.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zForwardingTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPageAllocator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPhysicalMemory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/vmStructs_z.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zThreadLocalAllocBuffer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zTask.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zVirtualMemory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRuntimeWorkers.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zLock.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHeuristics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zArguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zVerify.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHeapIterator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zObjectAllocator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMessagePort.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zServiceability.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zObjectAllocator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zGlobals.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zSafeDelete.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkStack.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRelocationSetSelector.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zForwardingEntry.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zCPU.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethodTableIteration.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethodTableIteration.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zWorkers.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zFuture.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zVirtualMemory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zErrno.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zTracer.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zUtils.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBreakpoint.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zDirector.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zStat.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkTerminate.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zAllocationFlags.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zCPU.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSetNMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRootsIterator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zLiveMap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zLiveMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zAddress.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMemory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zDriver.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zWorkers.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zAddress.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zObjArrayAllocator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBitField.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHeuristics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkStackAllocator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zWorkers.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNUMA.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zThread.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBreakpoint.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zReferenceProcessor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNUMA.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zTask.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zUncommitter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zVerify.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethodTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zResurrection.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRuntimeWorkers.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMessagePort.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/vmStructs_z.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zDirector.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNUMA.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zCPU.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zAttachedArray.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/z_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkStackAllocator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHash.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSetAssembler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zOop.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRelocationSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPageAllocator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zOop.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zForwarding.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRootsIterator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRelocate.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zAttachedArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPage.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zServiceability.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPageTable.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zResurrection.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zCollectedHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zVirtualMemory.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrier.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zLargePages.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethodTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zInitialize.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkStack.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zTracer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRelocationSetSelector.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSetRuntime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zValue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zDriver.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethodTableEntry.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkStackEntry.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zValue.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrier.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zLock.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBitMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPageTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zReferenceProcessor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zFuture.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHash.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSetRuntime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zCollectedHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zGranuleMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zTracer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPage.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zList.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zAddressSpaceLimit.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zUnmapper.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMetronome.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHeap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zForwarding.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zResurrection.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zForwardingTable.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPageTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMark.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zThreadLocalData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMemory.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zThreadLocalAllocBuffer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zArray.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zUnmapper.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBitMap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zGranuleMap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHeapIterator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRelocationSetSelector.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSetAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPhysicalMemory.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethodData.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMark.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zGlobals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zOopClosures.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPageCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zUncommitter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPhysicalMemory.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zLiveMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zObjArrayAllocator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrier.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zAddress.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkTerminate.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkCache.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMetronome.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zRelocationSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zSafeDelete.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zErrno.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zWeakRootsProcessor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zLargePages.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMark.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMarkStack.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zMemory.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zArguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zWeakRootsProcessor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zOopClosures.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zPageCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zNMethodData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zForwarding.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zBarrierSetNMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/z/zStat.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahWorkerPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahNMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahSATBMarkQueueSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMemoryPool.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahFreeSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahRootVerifier.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahPadding.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahEvacOOMHandler.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahCodeRoots.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahCollectorPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahVerifier.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahTracer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMarkCompact.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahControlThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMarkCompact.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahJfrSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahRuntime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMetrics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahArguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoah_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahForwarding.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahNumberSeq.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahUtils.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahNMethod.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahRootVerifier.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMetrics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahSATBMarkQueueSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahArguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahInitLogger.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahRuntime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahJfrSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahSharedVariables.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahEvacOOMHandler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahVMOperations.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahBarrierSetNMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahConcurrentRoots.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahWorkerPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahThreadLocalData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahOopClosures.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMonitoringSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahNMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahBarrierSetAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahTaskqueue.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahCollectorPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahAllocRequest.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahOopClosures.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMonitoringSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAdaptiveHeuristics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahHeuristics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahCompactHeuristics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahHeuristics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAdaptiveHeuristics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahPassiveHeuristics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahStaticHeuristics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahPassiveHeuristics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahCompactHeuristics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahStaticHeuristics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahPhaseTimings.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahControlThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahUnload.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMarkingContext.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahPacer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahAsserts.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahAsserts.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahConcurrentMark.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahVMOperations.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahBarrierSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/mode/shenandoahIUMode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/mode/shenandoahPassiveMode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/mode/shenandoahSATBMode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/mode/shenandoahMode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/mode/shenandoahPassiveMode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/mode/shenandoahIUMode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/mode/shenandoahSATBMode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahVerifier.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahUnload.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahNumberSeq.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahInitLogger.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahRootProcessor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahParallelCleaning.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahConcurrentRoots.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahLock.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahEvacOOMHandler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahCollectionSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahWorkGroup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahPacer.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/vmStructs_shenandoah.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahForwarding.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahBarrierSetClone.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahLock.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahMemoryPool.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahStrDedupQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahClosures.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahPacer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahCodeRoots.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahFreeSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahPhaseTimings.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahClosures.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahBarrierSetNMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegion.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahStringDedup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahWorkGroup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegion.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/sparsePRT.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/jvmFlagConstraintsG1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentStartToMixedTimeTracker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1MMUTracker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentRefineStats.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCCompactionPoint.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ParallelCleaning.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectionSetChooser.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapTransition.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1DirtyCardQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RegionsOnNodes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1MonitoringSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Arguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1StringDedupStat.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeterogeneousHeapPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1InitLogger.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Analytics.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1EdenRegions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BlockOffsetTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RootClosures.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CardCounts.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BufferNodeList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BufferNodeList.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RedirtyCardsQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionRemSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1StringDedup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Trace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1VMOperations.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCTask.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentRefine.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1EvacStats.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1MMUTracker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1YCTypes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1StringDedupQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CodeBlobClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1GCPhaseTimes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullCollector.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1AllocRegion.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CardTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Trace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RootProcessor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SharedDirtyCardQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/jvmFlagConstraintsG1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCMarkTask.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCOopClosures.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapRegionTraceType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SurvRateGroup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CardCounts.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1VMOperations.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/vmStructs_g1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1EvacFailure.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1MonitoringSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapRegionAttr.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionTracer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCScope.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCReferenceProcessorExecutor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BiasedArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BarrierSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1PageBasedVirtualSpace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeterogeneousHeapYoungGenSizer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectionSetChooser.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1PageBasedVirtualSpace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapVerifier.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RootProcessor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OopClosures.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Analytics.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FreeIdSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectorState.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1YoungGenSizer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCCompactionPoint.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heterogeneousHeapRegionManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CardTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SurvRateGroup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HRPrinter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegion.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1GCParPhaseTimesTracker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullCollector.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1MemoryPool.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RegionsOnNodes.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BiasedArray.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BarrierSetAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OldGenAllocationTracker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OopStarChunkedList.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1NUMA.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCMarkTask.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RedirtyCardsQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OopClosures.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CodeRootSetTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1YoungGenSizer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCCompactTask.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Predictions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1MemoryPool.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SATBMarkQueueSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeterogeneousHeapYoungGenSizer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentRefine.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OopClosures.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CodeCacheRemSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BlockOffsetTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1InitLogger.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionType.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FromCardCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionRemSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionManager.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCCompactTask.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapVerifier.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RegionToSpaceMapper.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectionSetCandidates.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1DirtyCardQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCPrepareTask.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCOopClosures.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FreeIdSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SurvivorRegions.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OopStarChunkedList.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectionSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RootClosures.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCMarker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BarrierSetRuntime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCAdjustTask.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ServiceThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ParScanThreadState.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkBitMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1GCPhaseTimes.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ThreadLocalData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCTask.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1StringDedup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapSizingPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionBounds.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RemSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeterogeneousHeapPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCMarker.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1IHOPControl.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCReferenceProcessorExecutor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapSizingPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1StringDedupStat.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OldGenAllocationTracker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCPrepareTask.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1NUMAStats.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SharedDirtyCardQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/sparsePRT.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SATBMarkQueueSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCScope.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CardTableEntryClosure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionTracer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SurvivorRegions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RegionMarkStatsCache.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1IHOPControl.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1EvacFailure.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ServiceThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCMarker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RemSetSummary.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FromCardCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1EvacStats.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CardTable.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OopStarChunkedList.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1NUMAStats.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentRefineStats.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RemSetSummary.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BarrierSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapRegionEventSender.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegion.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CodeBlobClosure.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionBounds.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ParScanThreadState.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Arguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentRefineThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BlockOffsetTable.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1AllocRegion.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CodeCacheRemSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkThread.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1StringDedupQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Policy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCOopClosures.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HotCardCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heterogeneousHeapRegionManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ParScanThreadState.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RemSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ParallelCleaning.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1EvacuationInfo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RegionToSpaceMapper.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1SharedClosures.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/sparsePRT.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentRefineThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMarkObjArrayProcessor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectionSetCandidates.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BarrierSetRuntime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1NUMA.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Policy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapTransition.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1AllocRegion.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HotCardCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1EvacStats.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RemSetTrackingPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RemSetTrackingPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1FullGCAdjustTask.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/heapRegionRemSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1BarrierSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectionSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HeapRegionEventSender.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonArguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonBarrierSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonThreadLocalData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonInitLogger.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonMemoryPool.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonBarrierSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/vmStructs_epsilon.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonMemoryPool.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonInitLogger.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonArguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilon_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parallelScavengeHeap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psCardTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/immutableSpace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parallelArguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parallelScavengeHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/gcAdaptivePolicyCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/objectStartArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/mutableSpace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parMarkBitMap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psPromotionManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/jvmFlagConstraintsParallel.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psFileBackedVirtualspace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/objectStartArray.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psVirtualspace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psVMOperations.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psParallelCompact.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psParallelCompact.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psMemoryPool.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psClosure.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psPromotionLAB.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psPromotionLAB.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psCompactionManager.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parallelArguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/jvmFlagConstraintsParallel.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psYoungGen.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/vmStructs_parallelgc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psAdaptiveSizePolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psYoungGen.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psVMOperations.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psGCAdaptivePolicyCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psScavenge.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psGenerationCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/objectStartArray.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psParallelCompact.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psGCAdaptivePolicyCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psCompactionManager.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psScavenge.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psCardTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psGenerationCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/immutableSpace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parallelScavengeHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parMarkBitMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/mutableSpace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/spaceCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psPromotionManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psOldGen.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psVirtualspace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parMarkBitMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/mutableNUMASpace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psMemoryPool.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psPromotionManager.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psAdaptiveSizePolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psOldGen.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psCompactionManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/spaceCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psFileBackedVirtualspace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/parallel_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psScavenge.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psRootType.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/gcAdaptivePolicyCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psPromotionLAB.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardTableBarrierSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/workerPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/ptrQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcPolicyCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardGeneration.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/plab.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/concurrentGCBreakpoints.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/jvmFlagConstraintsGC.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/barrierSetConfig.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/accessBarrierSupport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/accessBarrierSupport.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/preGCValues.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcThreadLocalData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcStats.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referenceDiscoverer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorageSetParState.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/adaptiveSizePolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referenceProcessor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/workerManager.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcArguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/ageTableTracer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcConfiguration.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/parallelCleaning.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/softRefGenPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/workgroup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcInitLogger.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/scavengableNMethodsData.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referencePolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/generationSpec.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcHeapSummary.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/satbMarkQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/genArguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/scavengableNMethods.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/softRefPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/collectedHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/plab.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/blockOffsetTable.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorageParState.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/hSpaceCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorageParState.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorage.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcId.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/ageTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorageSetParState.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/memAllocator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/strongRootsScope.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/satbMarkQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/genOopClosures.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardTableBarrierSetAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/concurrentGCBreakpoints.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/workgroup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/scavengableNMethods.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/genOopClosures.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/allocTracer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/workerDataArray.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/taskqueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/suspendibleThreadSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcCause.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/workerPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcLogPrecious.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcLocker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/genCollectedHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcTraceTime.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorage.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorageSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/ageTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcConfig.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/taskTerminator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorageSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/parallelCleaning.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcConfiguration.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/collectedHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/preservedMarks.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/workerDataArray.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/plab.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/locationPrinter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/generation.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/spaceDecorator.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/modRefBarrierSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorageSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/concurrentGCThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/space.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/suspendibleThreadSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcTimer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referencePolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/barrierSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcCause.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcLocker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcLogPrecious.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcName.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/collectorCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/barrierSetConfig.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcVMOperations.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/weakProcessor.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcUtil.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/objectCountEventSender.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/weakProcessorPhases.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/isGCActiveMark.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/objectCountEventSender.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/accessBarrierSupport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referenceProcessor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/hSpaceCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/weakProcessorPhaseTimes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcTrace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/collectedHeap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/barrierSetAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcStats.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcTraceTime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/generationCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/barrierSetNMethod.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/workerDataArray.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/generation.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referenceProcessorPhaseTimes.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/taskqueue.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/barrierSet.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardGeneration.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/barrierSetNMethod.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/softRefPolicy.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/modRefBarrierSetAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorage.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/weakProcessorPhases.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/spaceDecorator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/generationCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcTrace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/memset_with_concurrent_readers.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcUtil.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcBehaviours.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcTraceTime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/allocTracer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcPolicyCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/modRefBarrierSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/taskTerminator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/locationPrinter.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/copyFailedInfo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardTableRS.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/genArguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/vmStructs_gc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/blockOffsetTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/softRefGenPolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardGeneration.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcTraceSend.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcConfig.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcId.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/space.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/concurrentGCThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/barrierSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/preservedMarks.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/threadLocalAllocBuffer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/preservedMarks.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcInitLogger.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/weakProcessor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/markBitMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referenceProcessor.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/cardTableBarrierSetC2.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/cardTableBarrierSetC2.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/taskqueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/locationPrinter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupStat.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedup.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupQueue.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupStat.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedupThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/stringdedup/stringDedup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardTableBarrierSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/space.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referenceProcessorStats.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/threadLocalAllocBuffer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/ageTable.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/weakProcessorPhaseTimes.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/weakProcessor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/ageTableTracer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/jvmFlagConstraintsGC.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/blockOffsetTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/genCollectedHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcTimer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/genMemoryPools.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcLocker.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/collectorCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcWhen.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcVMOperations.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcBehaviours.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gc_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcOverheadChecker.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/referenceProcessorPhaseTimes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcArguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/ptrQueue.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/threadLocalAllocBuffer.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/markBitMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcOverheadChecker.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/generationSpec.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/strongRootsScope.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/memAllocator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/genMemoryPools.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardTableRS.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/isGCActiveMark.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/markBitMap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/adaptiveSizePolicy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/cardTableBarrierSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/spaceDecorator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/gcUtil.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/shared/verifyOption.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/defNewGeneration.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/tenuredGeneration.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/markSweep.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/tenuredGeneration.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/cSpaceCounters.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/defNewGeneration.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/cSpaceCounters.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/tenuredGeneration.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/serialArguments.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/markSweep.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/serial_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/defNewGeneration.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/serialHeap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/serialArguments.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/serialHeap.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/genMarkSweep.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/serialHeap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/markSweep.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/genMarkSweep.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/gc/serial/vmStructs_serial.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/unsafe.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jniFastGetField.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiManageCapabilities.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiGetLoadedClasses.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/whitebox.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/cdsoffsets.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/nativeLookup.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jniFastGetField.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiUtil.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiImpl.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jniCheck.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEventController.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExport.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTrace.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/stackwalk.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/methodComparator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/resolvedMethodTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/cdsoffsets.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiUtil.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTagMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiCodeBlobEvents.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jniExport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEventController.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/forte.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiThreadState.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiManageCapabilities.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/wbtestmethods/parserTests.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/wbtestmethods/parserTests.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/methodHandles.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jniCheck.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/resolvedMethodTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiGetLoadedClasses.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnter.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/methodComparator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiClassFileReconstituter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/whitebox.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvThreadState.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/stackwalk.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/perf.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiImpl.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiThreadState.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEventController.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTrace.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRawMonitor.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExport.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/whitebox.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRawMonitor.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvm_misc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/unsafe.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvThreadState.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiAgentThread.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/methodHandles.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiThreadState.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/nativeLookup.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/forte.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiCodeBlobEvents.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTagMap.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/templateTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/templateTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeHistogram.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeStream.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/interpreter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/linkResolver.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeHistogram.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeTracer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecode.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/rewriter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/interp_masm.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodes.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeStream.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/templateInterpreterGenerator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/invocationCounter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/rewriter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/interpreter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/abstractInterpreter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeTracer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeUtils.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/templateInterpreterGenerator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeUtils.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/interpreterRuntime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/zeroInterpreterGenerator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/bytecodeInterpreter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/zeroInterpreter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/bytecodeInterpreter.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/zeroInterpreterGenerator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/bytecodeInterpreter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/bytecodeInterpreterProfiling.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/abstractInterpreter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/oopMapCache.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/templateInterpreter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/templateInterpreter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/invocationCounter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/oopMapCache.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/interpreterRuntime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/interpreter/linkResolver.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/register.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/macroAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/codeBuffer.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/macroAssembler.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/assembler.inline.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/codeBuffer.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/assembler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/assembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/asm/register.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/c2compiler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/regalloc.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/live.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/rootnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/ifg.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/parse.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/library_call.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/mathexactnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/connode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/live.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/subtypenode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/rootnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/replacednodes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/convertnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/node.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/opcodes.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/callGenerator.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/coalesce.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/countbitsnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/block.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/escape.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/classes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/runtime.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/loopnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/connode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/macro.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/loopopts.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/memnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/phasetype.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/constantTable.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/superword.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/stringopts.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/adlcVMDeps.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/macroArrayCopy.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/stringopts.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/reg_split.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/mulnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/intrinsicnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/escape.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/optoreg.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/split_if.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/narrowptrnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/idealKit.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/cfgnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/multnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/vectornode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/output.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/generateOptoStub.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/c2compiler.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/countbitsnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/phase.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/locknode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/loopnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/c2_MacroAssembler.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/arraycopynode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/constantTable.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/parse2.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/doCall.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/narrowptrnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/ad.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/parse3.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/regmask.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/phaseX.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/indexSet.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/matcher.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/arraycopynode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/block.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/castnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/macro.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/domgraph.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/subnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/idealGraphPrinter.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/intrinsicnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/movenode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/output.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/type.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/classes.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/idealGraphPrinter.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/multnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/postaloc.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/loopTransform.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/loopUnswitch.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/coalesce.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/callnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/ifnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/subnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/divnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/gcm.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/subtypenode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/superword.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/indexSet.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/memnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/divnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/opaquenode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/mathexactnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/opaquenode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/machnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/compile.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/callnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/regalloc.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/addnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/matcher.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/addnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/vectornode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/cfgnode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/callGenerator.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/buildOopMap.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/replacednodes.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/c2_globals.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/node.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/idealKit.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/parse1.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/bytecodeInfo.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/runtime.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/castnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/mulnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/lcm.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/opcodes.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/regmask.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/phaseX.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/phase.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/movenode.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/machnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/parseHelper.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/loopPredicate.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/locknode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/opto/convertnode.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/include/cds.h
Examining data/openjdk-16-16~14/src/hotspot/share/include/jmm.h
Examining data/openjdk-16-16~14/src/hotspot/share/include/jvm.h
Examining data/openjdk-16-16~14/src/hotspot/share/libadt/vectset.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/libadt/dict.hpp
Examining data/openjdk-16-16~14/src/hotspot/share/libadt/dict.cpp
Examining data/openjdk-16-16~14/src/hotspot/share/libadt/vectset.cpp
Examining data/openjdk-16-16~14/make/langtools/test/HelloWorld.gold.h
Examining data/openjdk-16-16~14/make/src/native/fixpath.c

FINAL RESULTS:

data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:240:19:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res);
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:244:21:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:221:19:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:226:21:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:222:19:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    RESTARTABLE(::chmod(initial_path, S_IREAD|S_IWRITE), res);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:226:21:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
      RESTARTABLE(::chown(initial_path, geteuid(), getegid()), res);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1153:5:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    chmod(_full_path, _S_IREAD | _S_IWRITE);
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:179:23:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        if ((cmdlen = readlink(fn, cmdline, PATH_MAX)) > 0) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:293:20:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        if ((len = readlink(DEFAULT_ZONEINFO_FILE, linkbuf, sizeof(linkbuf)-1)) == -1) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/UnixFileSystem_md.c:216:25:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            RESTARTABLE(chmod(path, mode), res);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/UnixFileSystem_md.c:452:25:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
            RESTARTABLE(chmod(path, mode & ~(S_IWUSR | S_IWGRP | S_IWOTH)), res);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:584:19:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
        int len = readlink(self, buf, PATH_MAX);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:602:17:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
    RESTARTABLE(chmod(path, (mode_t)mode), err);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:628:17:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    RESTARTABLE(chown(path, (uid_t)uid, (gid_t)gid), err);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:939:13:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    int n = readlink(path, target, sizeof(target));
data/openjdk-16-16~14/src/java.prefs/unix/native/libprefs/FileSystemPreferences.c:50:19:  [5] (race) chmod:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchmod( ) instead.
        result =  chmod(fname, permission);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:899:15:  [5] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120). Risk is high,
  it appears that the size is given as bytes, but the function requires size
  as characters.
    int len = MultiByteToWideChar(CP_UTF8, 0, (LPCCH)tn.value, (int)tn.length,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:616:9:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
        strncat(buffer, "Old Accessible Child info:\r\n\r\n", sizeof(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:620:9:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
        strncat(buffer, "\r\n\r\n", sizeof(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:624:9:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
        strncat(buffer, "New Accessible Child info:\r\n\r\n", sizeof(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:628:9:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
        strncat(buffer, "\r\n\r\n", sizeof(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:656:9:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
        strncat(buffer, "Old Accessible ActiveDescendent info:\r\n\r\n", sizeof(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:660:9:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
        strncat(buffer, "\r\n\r\n", sizeof(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:664:9:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
        strncat( buffer, "New Accessible ActiveDescendent info:\r\n\r\n",
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:669:9:  [5] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is high; the length parameter
  appears to be a constant, instead of computing the number of characters
  left.
        strncat(buffer, "\r\n\r\n", sizeof(buffer));
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:296:17:  [5] (race) chown:
  This accepts filename arguments; if an attacker can move those files, a
  race condition results. (CWE-362). Use fchown( ) instead.
    RESTARTABLE(chown(_path, geteuid(), getegid()), rc);
data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/common/LinuxSysInfo.cpp:36:19:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    ssize_t len = readlink(path, buffer, sizeof(buffer));
data/openjdk-16-16~14/src/jdk.incubator.jpackage/macosx/native/common/MacSysInfo.cpp:50:19:  [5] (race) readlink:
  This accepts filename arguments; if an attacker can move those files or
  change the link content, a race condition results. Also, it does not
  terminate with ASCII NUL. (CWE-362, CWE-20). Reconsider approach.
    ssize_t len = readlink(in.data(), out.data(), PATH_MAX);
data/openjdk-16-16~14/make/src/native/fixpath.c:133:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(out + (p - in), "%s%s", rep, p + sub_len);
data/openjdk-16-16~14/make/src/native/fixpath.c:290:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(files_to_delete[num_files_to_delete], name);
data/openjdk-16-16~14/make/src/native/fixpath.c:294:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(atname+1, name);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:971:8:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  void system(int op0, int op1, int CRn, int CRm, int op2,
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:985:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b00, 0b011, 0b0010, 0b0000, imm);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1042:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b00, 0b011, 0b00011, imm, 0b100);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1046:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b00, 0b011, 0b00011, imm, 0b101);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1050:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b00, 0b011, 0b00011, SY, 0b110);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/assembler_aarch64.hpp:1055:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system(0b01, op1, CRn, CRm, op2, rt);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:62:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:63:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType bt = access.type();
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:64:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:65:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LIRGenerator *gen = access.gen();
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:67:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:67:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:67:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:76:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      LIR_Opr addr = access.resolved_addr()->as_address_ptr()->base();
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:83:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:86:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:87:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:88:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType type = access.type();
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:94:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:95:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:95:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:95:86:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:100:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  __ xchg(access.resolved_addr(), value_opr, result, tmp);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:102:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:103:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    result = load_reference_barrier(access.gen(), result, LIR_OprFact::addressConst(0), false);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:108:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:108:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/gc/shenandoah/c1/shenandoahBarrierSetC1_aarch64.cpp:108:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1502:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), "0x%" PRIX64, (uint64_t)imm64);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1565:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(buffer, sizeof(buffer), "0x%" PRIX64, imm64);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1678:7:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
      snprintf(buffer, sizeof(buffer), "0x%" PRIX32, imm32);
data/openjdk-16-16~14/src/hotspot/cpu/arm/interp_masm_arm.cpp:1745:35:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  InlinedAddress Lprintf((address)printf);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:71:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:73:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:74:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LIRGenerator* gen = access.gen();
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:76:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:76:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:76:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), access.decorators(), access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:85:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      LIR_Opr addr = access.resolved_addr()->as_address_ptr()->base();
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:92:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:95:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:96:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:97:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType type = access.type();
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:103:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:104:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:104:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:104:86:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value_opr = storeval_barrier(access.gen(), value_opr, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:111:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  __ xchg(access.resolved_addr(), result, result, LIR_OprFact::illegalOpr);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:113:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:114:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    result = load_reference_barrier(access.gen(), result, LIR_OprFact::addressConst(0), false);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:119:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:119:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/c1/shenandoahBarrierSetC1_x86.cpp:119:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), LIR_OprFact::illegalOpr,
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:194:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(valuebuf, buflen, PTR_FORMAT, *addr);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:272:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        snprintf(valuebuf, buflen, PTR_FORMAT " (bci %d)",
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:228:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(addr.sun_path, initial_path);
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.cpp:182:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pci->description, psct.description);
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.cpp:246:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(ppi->name, pspt.name);
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.cpp:296:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(pwi->name, pswt.name);
data/openjdk-16-16~14/src/hotspot/os/aix/misc_aix.hpp:40:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(stderr, fmt, ##__VA_ARGS__); \
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:593:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(ld_library_path, "%s%s" DEFAULT_LIBPATH, v, v_colon);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:598:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" EXTENSIONS_DIR, Arguments::get_java_home());
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1562:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1611:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1615:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 == access(buf, F_OK)) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:257:13:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        n = vsscanf(tmp, fmt, args);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:483:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, p->pw_name);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:538:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:540:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:573:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:575:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:599:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(oldest_user, user);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:1085:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:210:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(addr.sun_path, initial_path);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:414:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(ld_library_path, "%s%s" SYS_EXT_DIR "/lib/%s:" DEFAULT_LIBPATH, v, v_colon, cpu_arch);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:420:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" EXTENSIONS_DIR ":" SYS_EXT_DIR EXTENSIONS_DIR, Arguments::get_java_home());
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:507:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(ld_library_path, "%s%s%s%s%s" SYS_EXTENSIONS_DIR ":" SYS_EXTENSIONS_DIRS ":.",
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:518:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" SYS_EXTENSIONS_DIR ":%s" EXTENSIONS_DIR ":" SYS_EXTENSIONS_DIRS,
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1676:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1732:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1740:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1747:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 == access(buf, F_OK)) {
data/openjdk-16-16~14/src/hotspot/os/bsd/os_perf_bsd.cpp:329:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(path, buffer);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:491:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, p->pw_name);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:548:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:550:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:571:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:573:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:597:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(oldest_user, user);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:1106:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:211:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(addr.sun_path, initial_path);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:151:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(p, "%s %d %*d %d", name, &hierarchy_id, &enabled) != 3) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:270:25:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (is_cgroupsV2 && sscanf(p, "%*d %*d %*d:%*d %*s %s %*[^-]- %s cgroup2 %*s", tmp_mount_point, tmp_fs_type) == 2) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:292:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
    if (sscanf(p, "%*d %*d %*d:%*d %s %s %*[^-]- %s cgroup %s", tmproot, tmpmount, tmp_fs_type, tmpcgroups) == 4) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:117:23:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        int matched = sscanf(p, scan_fmt, returnval);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:123:25:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
          int matched = sscanf(p, scan_fmt, discard, returnval);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV2Subsystem_linux.cpp:205:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(limit_str, JULONG_FORMAT, &limit) != 1) {
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zMountPoint_linux.cpp:61:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access(line_mountpoint, R_OK|W_OK|X_OK) != 0) {
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.cpp:340:22:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  const int result = fscanf(file, SIZE_FORMAT, &actual_max_map_count);
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.cpp:384:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access(ZFILENAME_SHMEM_ENABLED, R_OK) == 0;
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:487:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(ld_library_path, "%s%s" SYS_EXT_DIR "/lib:" DEFAULT_LIBPATH, v, v_colon);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:493:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, "%s" EXTENSIONS_DIR ":" SYS_EXT_DIR EXTENSIONS_DIR, Arguments::get_java_home());
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1257:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        i = sscanf(s, "%c %d %d %d %d %d %lu %lu %lu %lu %lu %lu %lu %ld %ld %ld %ld %ld %ld " _UFM _UFM _DFM _UFM _UFM _UFM _UFM,
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2746:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2802:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 != access(buf, F_OK)) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2806:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (0 == access(buf, F_OK)) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:252:13:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        n = vsscanf(tmp, fmt, args);
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:410:11:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      if (vsscanf(line, fmt, args) == 1) {
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:504:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, p->pw_name);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:574:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:576:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:609:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:611:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:635:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(oldest_user, user);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:1188:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:380:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int os::vsnprintf(char* buf, size_t len, const char* fmt, va_list args) {
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:382:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = ::vsnprintf(buf, len, fmt, args);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:682:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(agent_entry_name, sym_name);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1334:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(outbuf, p);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:225:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(home_path, home_dir);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:231:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dll_path, home_dir);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:232:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(dll_path, bin);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:266:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, tmp);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:270:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, tmp);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:271:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, PACKAGE_DIR BIN_DIR);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:275:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, tmp);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:279:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(library_path, tmp);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:283:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(library_path, path_str);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:297:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf, "%s%s;%s%s%s", Arguments::get_java_home(), EXT_DIR,
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1140:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dirp->path, dirname);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1183:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dirp->dirent.d_name, dirp->find_data.cFileName);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1540:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int os::vsnprintf(char* buf, size_t len, const char* fmt, va_list args) {
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1543:18:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = ::vsnprintf(buf, len, fmt, args);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1873:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, saved_jvm_path);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4886:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    base = (char*)MapViewOfFileEx(hMap, access, 0, (DWORD)file_offset,
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5333:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(cmd_string, cmd_prefix);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5334:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(cmd_string, cmd);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5585:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(agent_entry_name, p);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5588:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(agent_entry_name, sym_name);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5593:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(agent_entry_name, sym_name);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:288:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(user_name, user);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:331:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(usrdir_name, tmpdirname);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:333:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(usrdir_name, dentry->d_name);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:364:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(filename, usrdir_name);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:366:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(filename, udentry->d_name);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:400:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(latest_user, user);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:489:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(path, dirname);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:491:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(path, filename);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1642:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(rfilename, filename);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1643:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(robjectname, objectname);
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:252:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(p, directory);
data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp:233:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buf, fmt, sig, info->si_addr);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlc.hpp:54:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/openjdk-16-16~14/src/hotspot/share/adlc/adlc.hpp:54:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:215:11:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
          sprintf(buf, "%s_%d", instr->_ident, match_rules_cnt++);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:2863:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(ec_name, "%s%s", prefix, inst._ident);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:3334:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(ec_name, "%s%s", prefix, inst._ident);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4467:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result, location);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4468:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(result, cppBlock);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4469:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(result, end_loc);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4556:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(result, location);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4557:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(result, token2);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4558:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(result, end_loc);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4654:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf, "(%s)", param);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:5262:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(location, "\n#line %d \"%s\"\n", line, file);
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:791:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(errfile, fmt, args);
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:818:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(regMask,"%s%s()", rc_name, mask);
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:911:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(result,"%s%s", stack_or, reg_mask_name);
data/openjdk-16-16~14/src/hotspot/share/adlc/dfa.cpp:218:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(Expr::buffer(), "_kids[0]->_cost[%s]", lchild_to_upper);
data/openjdk-16-16~14/src/hotspot/share/adlc/dfa.cpp:224:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(Expr::buffer(), "_kids[1]->_cost[%s]", rchild_to_upper);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1525:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(s,"/*%s*/(",(char*)i._key);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3449:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(subtree,"_%s_%s_%s", _opType, lstr, rstr);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3872:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf, "%s_%d", instr_ident, match_rules_cnt++);
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:469:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(fname,"%s%s",base,suffix);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:214:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    templen += sprintf(&operand_stages[templen], "  stage_%s%c\n",
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:288:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    templen += sprintf(&resource_stages[templen], "  stage_%s%-*s // %s\n",
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:361:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    templen += sprintf(&resource_cycles[templen], "  %*d%c // %s\n",
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:459:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(&resource_mask[templen], "  %s(0x%0*x, %*d, %*d, %s %s(",
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:499:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(&resource_mask[templen], "0x%08x%s", res_mask[j], j > 0 ? ", " : "");
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:2521:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ib += sprintf(ib, "  unsigned idx_%-5s = mach_constant_base_node_input(); \t// %s, \t%s\n",
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:2523:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      nb += sprintf(nb, "  Node    *n_%-7s = lookup(idx_%s);\n", name, name);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:2530:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ib += sprintf(ib, "  unsigned idx_%-5s = idx%d; \t// %s, \t%s\n",
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:2532:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      nb += sprintf(nb, "  Node    *n_%-7s = lookup(idx_%s);\n", name, name);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:2533:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      ob += sprintf(ob, "  %sOper *op_%s = (%sOper *)opnd_array(%d);\n", type, name, type, idx);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:310:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fp,is_ideal_bool ? "BoolTest::mask c%d" : "int32_t c%d", i);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1624:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type, patch_info, load_emit_info);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1625:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1626:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->BarrierSetC1::load_at(access, result);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1628:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->load_at(access, result);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1635:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, LIR_OprFact::illegalOpr, LIR_OprFact::illegalOpr, type);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1636:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(addr);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1637:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1638:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->BarrierSetC1::load(access, result);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1640:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->load(access, result);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1648:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type, patch_info, store_emit_info);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1649:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1650:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->BarrierSetC1::store_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1652:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _barrier_set->store_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1662:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1663:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1664:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC1::atomic_cmpxchg_at(access, cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1666:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_cmpxchg_at(access, cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1676:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1677:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1678:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC1::atomic_xchg_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1680:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_xchg_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1690:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRAccess access(this, decorators, base, offset, type);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1691:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1692:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC1::atomic_add_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_LIRGenerator.cpp:1694:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_add_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:203:9:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    if (sscanf(_bufptr, INTPTR_FORMAT "%n", &v, &read) != 1) {
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:883:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        if (sscanf(string_value, JLONG_FORMAT, &value) != 1) {
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:237:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(copy, path);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:1625:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(orig_copy, orig);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaAssertions.cpp:64:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(name_copy, name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2297:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(buf, "\tat %s.%s(", klass_name, method_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2302:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf + (int)strlen(buf), "%s@%s/", module_name, module_version);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2304:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(buf + (int)strlen(buf), "%s/", module_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2319:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf + (int)strlen(buf), "%s:%d)", source_file_name, line_number);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2322:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf + (int)strlen(buf), "%s)", source_file_name);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:919:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name_buffer, "%s CompilerThread%d", _compilers[1]->name(), i);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:998:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name_buffer, "%s CompilerThread%d", _compilers[1]->name(), i);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.cpp:50:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy((char*)_file, file_name);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:106:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(fillp, p);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:842:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&buf[jvm_offset], hsdis_library_name);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:843:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(&buf[jvm_offset], os::dll_file_extension());
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:848:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(&buf[lib_offset], hsdis_library_name);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:849:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(&buf[lib_offset], os::dll_file_extension());
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:859:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(&buf[lib_offset], hsdis_library_name);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:860:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(&buf[lib_offset], os::dll_file_extension());
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:868:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&buf[0], hsdis_library_name);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:869:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(&buf[0], os::dll_file_extension());
data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp:56:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(_name_space, cns);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:51:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void G1BarrierSetC1::pre_barrier(LIRAccess& access, LIR_Opr addr_opr,
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:53:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:54:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:110:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void G1BarrierSetC1::post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:111:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:112:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:178:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void G1BarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:179:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:183:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:185:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BarrierSetC1::load_at_resolved(access, result);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:187:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop() && (is_weak || is_phantom || is_anonymous)) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:192:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      generate_referent_check(access, Lcont_anonymous);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:194:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, LIR_OprFact::illegalOpr /* addr_opr */,
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.cpp:195:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                result /* pre_val */, access.patch_emit_info() /* info */);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:121:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void pre_barrier(LIRAccess& access, LIR_Opr addr_opr,
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:123:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c1/g1BarrierSetC1.hpp:125:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at_resolved(LIRAccess& access, LIR_Opr result);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:596:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* G1BarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:597:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:598:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:599:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* obj = access.base();
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:613:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load = CardTableBarrierSetC2::load_at_resolved(access, val_type);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:624:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop() || !need_read_barrier) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:628:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  assert(access.is_parse_access(), "entry not supported at optimization time");
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.cpp:629:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2ParseAccess& parse_access = static_cast<C2ParseAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/c2/g1BarrierSetC2.hpp:85:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1GCPhaseTimes.cpp:70:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(oop_storage_phase_name, it->name());
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1GCPhaseTimes.cpp:71:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(oop_storage_phase_name, phase_name_postfix);
data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psGenerationCounters.cpp:46:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-16-16~14/src/hotspot/share/gc/parallel/spaceCounters.cpp:43:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-16-16~14/src/hotspot/share/gc/serial/cSpaceCounters.cpp:43:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:42:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:43:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:47:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRItem& base = access.base().item();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:48:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr offset = access.offset().opr();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:49:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:53:84:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    addr_opr = LIR_OprFact::address(gen->emit_array_address(base.result(), offset, access.type()));
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:59:82:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    addr_opr = LIR_OprFact::address(new LIR_Address(base.result(), PATCHED_ADDR, access.type()));
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:61:88:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    addr_opr = LIR_OprFact::address(gen->generate_address(base.result(), offset, 0, 0, access.type()));
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:67:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      __ leal(addr_opr, resolved_addr, lir_patch_normal, access.patch_emit_info());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:68:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.clear_decorators(C1_NEEDS_PATCHING);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:72:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return LIR_OprFact::address(new LIR_Address(resolved_addr, access.type()));
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:78:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::store_at(LIRAccess& access, LIR_Opr value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:79:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:83:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, false);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:84:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:85:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  store_at_resolved(access, value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:88:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::load_at(LIRAccess& access, LIR_Opr result) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:89:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:93:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, false);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:94:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:95:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  load_at_resolved(access, result);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:98:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::load(LIRAccess& access, LIR_Opr result) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:99:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:102:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  load_at_resolved(access, result);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:105:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_cmpxchg_at(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:106:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:110:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.load_address();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:112:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, true);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:113:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:114:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:117:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_xchg_at(LIRAccess& access, LIRItem& value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:118:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:122:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.load_address();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:124:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, true);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:125:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:126:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_xchg_at_resolved(access, value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:129:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_add_at(LIRAccess& access, LIRItem& value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:130:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:134:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.load_address();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:136:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr resolved = resolve_address(access, true);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:137:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_resolved_addr(resolved);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:138:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_add_at_resolved(access, value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:141:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:142:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:146:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:149:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = gen->mask_boolean(access.base().opr(), value, access.access_emit_info());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:149:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = gen->mask_boolean(access.base().opr(), value, access.access_emit_info());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:158:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gen->volatile_field_store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:158:80:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gen->volatile_field_store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:160:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info(), patch_code);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:160:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ store(value, access.resolved_addr()->as_address_ptr(), access.access_emit_info(), patch_code);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:168:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:169:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:170:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:182:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ move_wide(access.resolved_addr()->as_address_ptr(), result);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:184:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gen->volatile_field_load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:184:80:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    gen->volatile_field_load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:186:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info(), patch_code);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:186:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    __ load(access.resolved_addr()->as_address_ptr(), result, access.access_emit_info(), patch_code);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:203:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:204:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:205:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_cmpxchg(access.type(), access.resolved_addr(), cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:205:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_cmpxchg(access.type(), access.resolved_addr(), cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:208:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:209:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:210:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_xchg(access.type(), access.resolved_addr(), value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:210:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_xchg(access.type(), access.resolved_addr(), value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:213:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr BarrierSetC1::atomic_add_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:214:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:215:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_add(access.type(), access.resolved_addr(), value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:215:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return gen->atomic_add(access.type(), access.resolved_addr(), value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:218:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC1::generate_referent_check(LIRAccess& access, LabelObj* cont) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:239:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator *gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:241:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRItem& base = access.base().item();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.cpp:242:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr offset = access.offset().opr();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:115:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:117:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void generate_referent_check(LIRAccess& access, LabelObj* cont);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:120:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void store_at_resolved(LIRAccess& access, LIR_Opr value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:121:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at_resolved(LIRAccess& access, LIR_Opr result);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:123:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:125:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:126:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_add_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:129:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void store_at(LIRAccess& access, LIR_Opr value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:130:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at(LIRAccess& access, LIR_Opr result);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:131:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load(LIRAccess& access, LIR_Opr result);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:133:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:135:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at(LIRAccess& access, LIRItem& value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/barrierSetC1.hpp:136:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_add_at(LIRAccess& access, LIRItem& value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:37:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void CardTableBarrierSetC1::post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:38:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.cpp:39:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/cardTableBarrierSetC1.hpp:32:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr, LIR_OprDesc* new_val);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:35:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ModRefBarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:36:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:40:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:41:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:41:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:42:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                LIR_OprFact::illegalOpr /* pre_val */, access.patch_emit_info());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:45:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BarrierSetC1::store_at_resolved(access, value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:47:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:49:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LIR_Opr post_addr = precise ? access.resolved_addr() : access.base().opr();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:49:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    LIR_Opr post_addr = precise ? access.resolved_addr() : access.base().opr();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:50:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, post_addr, value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:54:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ModRefBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:55:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:56:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:56:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:60:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr result = BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:62:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:63:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, access.resolved_addr(), new_value.result());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:63:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, access.resolved_addr(), new_value.result());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:69:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ModRefBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:70:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:71:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:71:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_barrier(access, access.resolved_addr(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:75:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIR_Opr result = BarrierSetC1::atomic_xchg_at_resolved(access, value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:77:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:78:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, access.resolved_addr(), value.result());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:78:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(access, access.resolved_addr(), value.result());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:86:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ModRefBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:87:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:93:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_in_register |= !needs_patching && is_write && access.is_oop() && precise;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.cpp:94:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::resolve_address(access, resolve_in_register);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:36:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void pre_barrier(LIRAccess& access, LIR_Opr addr_opr,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:38:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void post_barrier(LIRAccess& access, LIR_OprDesc* addr,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:41:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:43:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void store_at_resolved(LIRAccess& access, LIR_Opr value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:45:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c1/modRefBarrierSetC1.hpp:47:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:37:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC2::resolve_address(C2Access& access) const { }
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:79:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:80:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:88:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  assert(!in_native || (unsafe && !access.is_oop()), "not supported yet");
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:90:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:93:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_parse_access()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:94:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    C2ParseAccess& parse_access = static_cast<C2ParseAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:97:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access.type() == T_DOUBLE) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:102:50:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    store = kit->store_to_memory(kit->control(), access.addr().node(), val.node(), access.type(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:102:84:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    store = kit->store_to_memory(kit->control(), access.addr().node(), val.node(), access.type(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:103:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                     access.addr().type(), mo, requires_atomic_access, unaligned, mismatched, unsafe);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:106:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    assert(access.is_opt_access(), "either parse or opt access");
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:107:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    C2OptAccess& opt_access = static_cast<C2OptAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:111:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const TypePtr* adr_type = access.addr().type();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:115:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    StoreNode* st = StoreNode::make(gvn, ctl, mem, access.addr().node(), adr_type, val.node(), access.type(), mo);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:115:96:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    StoreNode* st = StoreNode::make(gvn, ctl, mem, access.addr().node(), adr_type, val.node(), access.type(), mo);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:127:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(store);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:132:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:133:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:135:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:136:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:148:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:152:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_parse_access()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:153:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    C2ParseAccess& parse_access = static_cast<C2ParseAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:162:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            adr_type, val_type, access.type(), mo, dep, unaligned,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:163:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            mismatched, unsafe, access.barrier_data());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:166:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      load = kit->make_load(control, adr, val_type, access.type(), adr_type, mo,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:168:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                            access.barrier_data());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:172:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    assert(access.is_opt_access(), "either parse or opt access");
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:173:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    C2OptAccess& opt_access = static_cast<C2OptAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:178:71:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    load = LoadNode::make(gvn, control, mem, adr, adr_type, val_type, access.type(), mo,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:179:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                          dep, unaligned, mismatched, unsafe, access.barrier_data());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:182:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:192:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence(C2Access& access) :
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:193:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _access(access), _leading_membar(NULL) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:195:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access.is_parse_access()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:196:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      C2ParseAccess& parse_access = static_cast<C2ParseAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:199:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:243:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access.needs_cpu_membar()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:252:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.set_memory();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:308:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::store_at(C2Access& access, C2AccessValue& val) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:309:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:310:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:311:28:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return store_at_resolved(access, val);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:314:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::load_at(C2Access& access, const Type* val_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:315:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:316:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:317:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return load_at_resolved(access, val_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:389:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void BarrierSetC2::pin_atomic_op(C2AtomicParseAccess& access) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:390:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.needs_pinning()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:396:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  assert(access.is_parse_access(), "entry not supported at optimization time");
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:397:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2ParseAccess& parse_access = static_cast<C2ParseAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:399:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load_store = access.raw_access();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:402:25:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  kit->set_memory(proj, access.alias_idx());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:410:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:412:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:413:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:414:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* mem = access.memory();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:416:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:417:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:421:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:433:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:455:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  load_store->as_LoadStore()->set_barrier_data(access.barrier_data());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:458:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load_store);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:459:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pin_atomic_op(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:462:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop() && adr->bottom_type()->is_ptr_to_narrowoop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:470:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:472:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:473:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:474:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:475:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* mem = access.memory();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:478:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:480:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:500:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch(access.type()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:538:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  load_store->as_LoadStore()->set_barrier_data(access.barrier_data());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:541:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load_store);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:542:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pin_atomic_op(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:547:66:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_xchg_at_resolved(C2AtomicParseAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:548:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:549:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* mem = access.memory();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:550:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:551:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:554:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:565:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access.type()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:583:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  load_store->as_LoadStore()->set_barrier_data(access.barrier_data());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:586:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load_store);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:587:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pin_atomic_op(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:590:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop() && adr->bottom_type()->is_ptr_to_narrowoop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:598:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_add_at_resolved(C2AtomicParseAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:600:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:601:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:602:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:603:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* mem = access.memory();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:605:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  switch(access.type()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:622:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  load_store->as_LoadStore()->set_barrier_data(access.barrier_data());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:625:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.set_raw_access(load_store);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:626:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pin_atomic_op(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:631:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_cmpxchg_val_at(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:633:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:634:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:635:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:638:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_cmpxchg_bool_at(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:640:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:641:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:642:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:645:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_xchg_at(C2AtomicParseAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:646:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:647:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:648:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_xchg_at_resolved(access, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:651:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* BarrierSetC2::atomic_add_at(C2AtomicParseAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:652:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AccessFence fence(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:653:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  resolve_address(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.cpp:654:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return atomic_add_at_resolved(access, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:217:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void resolve_address(C2Access& access) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:218:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:219:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:221:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:223:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:225:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at_resolved(C2AtomicParseAccess& access, Node* new_val, const Type* val_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:226:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_add_at_resolved(C2AtomicParseAccess& access, Node* new_val, const Type* val_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:227:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void pin_atomic_op(C2AtomicParseAccess& access) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:231:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* store_at(C2Access& access, C2AccessValue& val) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:232:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at(C2Access& access, const Type* val_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:234:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:236:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:238:53:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at(C2AtomicParseAccess& access, Node* new_val, const Type* value_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/barrierSetC2.hpp:239:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_add_at(C2AtomicParseAccess& access, Node* new_val, const Type* value_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:33:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ModRefBarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:34:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:36:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:37:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:45:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop() || tightly_coupled_alloc || (!in_heap && !anonymous)) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:46:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::store_at_resolved(access, val);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:49:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  assert(access.is_parse_access(), "entry not supported at optimization time");
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:50:61:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2ParseAccess& parse_access = static_cast<C2ParseAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:56:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  pre_barrier(kit, true /* do_load */, kit->control(), access.base(), adr, adr_idx, val.node(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:57:79:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
              static_cast<const TypeOopPtr*>(val.type()), NULL /* pre_val */, access.type());
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:58:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* store = BarrierSetC2::store_at_resolved(access, val);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:59:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), adr, adr_idx, val.node(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:59:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), adr, adr_idx, val.node(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:60:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access.type(), use_precise);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:65:79:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ModRefBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:67:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:69:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:70:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:77:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:79:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:79:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:80:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:80:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:85:80:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ModRefBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:87:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:89:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:90:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:97:68:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load_store = BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:112:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(kit, ideal.ctrl(), access.raw_access(), access.base(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:112:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    post_barrier(kit, ideal.ctrl(), access.raw_access(), access.base(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:113:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                 access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:113:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                 access.addr().node(), access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:121:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ModRefBarrierSetC2::atomic_xchg_at_resolved(C2AtomicParseAccess& access, Node* new_val, const Type* value_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:122:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:124:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_xchg_at_resolved(access, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:125:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:135:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:135:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:135:73:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  post_barrier(kit, kit->control(), access.raw_access(), access.base(), access.addr().node(),
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.cpp:136:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
               access.alias_idx(), new_val, T_OBJECT, true);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:55:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:57:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:59:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shared/c2/modRefBarrierSetC2.hpp:61:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at_resolved(C2AtomicParseAccess& access, Node* new_val, const Type* value_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/collectorCounters.cpp:40:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/generationCounters.cpp:40:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/hSpaceCounters.cpp:45:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:181:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ShenandoahBarrierSetC1::store_at_resolved(LIRAccess& access, LIR_Opr value) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:182:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:184:81:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(access.gen(), access.access_emit_info(), access.decorators(), access.resolved_addr(), LIR_OprFact::illegalOpr /* pre_val */);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:186:30:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:186:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:186:78:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    value = storeval_barrier(access.gen(), value, access.access_emit_info(), access.decorators());
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:188:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BarrierSetC1::store_at_resolved(access, value);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:191:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ShenandoahBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:195:37:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const bool patch_before_barrier = access.is_oop() && (access.decorators() & C1_NEEDS_PATCHING) != 0;
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:195:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const bool patch_before_barrier = access.is_oop() && (access.decorators() & C1_NEEDS_PATCHING) != 0;
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:196:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::resolve_address(access, resolve_in_register || patch_before_barrier);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:199:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ShenandoahBarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:201:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:202:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    BarrierSetC1::load_at_resolved(access, result);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:206:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  LIRGenerator* gen = access.gen();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:207:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:208:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType type = access.type();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:213:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    BarrierSetC1::load_at_resolved(access, tmp);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:215:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    tmp = load_reference_barrier(gen, tmp, access.resolved_addr(), is_native);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:218:36:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    BarrierSetC1::load_at_resolved(access, result);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:233:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        generate_referent_check(access, Lcont_anonymous);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.cpp:235:24:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      pre_barrier(gen, access.access_emit_info(), decorators, LIR_OprFact::illegalOpr /* addr_opr */,
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:224:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void store_at_resolved(LIRAccess& access, LIR_Opr value);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:225:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:226:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at_resolved(LIRAccess& access, LIR_Opr result);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:228:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c1/shenandoahBarrierSetC1.hpp:230:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:497:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::store_at_resolved(C2Access& access, C2AccessValue& val) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:498:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:500:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const TypePtr* adr_type = access.addr().type();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:501:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:506:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop() || (!on_heap && !anonymous)) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:507:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::store_at_resolved(access, val);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:510:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_parse_access()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:511:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    C2ParseAccess& parse_access = static_cast<C2ParseAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:519:79:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    shenandoah_write_barrier_pre(kit, true /* do_load */, /*kit->control(),*/ access.base(), adr, adr_idx, val.node(),
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:520:98:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                 static_cast<const TypeOopPtr*>(val.type()), NULL /* pre_val */, access.type());
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:522:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    assert(access.is_opt_access(), "only for optimization passes");
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:524:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    C2OptAccess& opt_access = static_cast<C2OptAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:532:42:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::store_at_resolved(access, val);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:535:58:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:537:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:538:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return BarrierSetC2::load_at_resolved(access, val_type);;
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:541:47:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* load = BarrierSetC2::load_at_resolved(access, val_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:542:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:543:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BasicType type = access.type();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:550:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access.is_parse_access()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:551:43:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      load = static_cast<C2ParseAccess &>(access).kit()->gvn().transform(load);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:553:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      load = static_cast<C2OptAccess &>(access).gvn().transform(load);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:560:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:562:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* obj = access.base();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:578:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    assert(access.is_parse_access(), "entry not supported at optimization time");
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:579:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    C2ParseAccess& parse_access = static_cast<C2ParseAccess&>(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:604:83:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:606:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:607:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:613:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:614:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* mem = access.memory();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:615:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:616:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    const TypePtr* adr_type = access.addr().type();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:638:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.set_raw_access(load_store);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:639:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pin_atomic_op(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:649:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:652:84:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:654:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:655:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:660:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:661:26:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    MemNode::MemOrd mo = access.mem_node_mo();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:662:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* mem = access.memory();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:665:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    Node* adr = access.addr().node();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:700:5:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    access.set_raw_access(load_store);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:701:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pin_atomic_op(access);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:704:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:707:76:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ShenandoahBarrierSetC2::atomic_xchg_at_resolved(C2AtomicParseAccess& access, Node* val, const Type* value_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:708:19:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  GraphKit* kit = access.kit();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:709:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:712:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* result = BarrierSetC2::atomic_xchg_at_resolved(access, val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.cpp:713:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_oop()) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:85:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:86:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* store_at_resolved(C2Access& access, C2AccessValue& val) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:87:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:89:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahBarrierSetC2.hpp:91:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at_resolved(C2AtomicParseAccess& access, Node* new_val, const Type* val_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp:44:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_name_space, cns);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:34:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
ZLoadBarrierStubC1::ZLoadBarrierStubC1(LIRAccess& access, LIR_Opr ref, address runtime_stub) :
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:35:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _decorators(access.decorators()),
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:36:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _ref_addr(access.resolved_addr()),
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:48:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    _tmp = access.gen()->new_pointer_register();
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:120:39:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static bool barrier_needed(LIRAccess& access) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:121:38:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return ZBarrierSet::barrier_needed(access.decorators(), access.type());
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:121:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return ZBarrierSet::barrier_needed(access.decorators(), access.type());
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:140:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define __ access.gen()->lir(__FILE__, __LINE__)->
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:142:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
#define __ access.gen()->lir()->
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:145:45:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ZBarrierSetC1::load_barrier(LIRAccess& access, LIR_Opr result) const {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:150:81:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const address runtime_stub = load_barrier_on_oop_field_preloaded_runtime_stub(access.decorators());
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:151:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  CodeStub* const stub = new ZLoadBarrierStubC1(access, result, runtime_stub);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:156:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ZBarrierSetC1::resolve_address(LIRAccess& access, bool resolve_in_register) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:160:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const bool patch_before_barrier = barrier_needed(access) && (access.decorators() & C1_NEEDS_PATCHING) != 0;
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:160:64:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  const bool patch_before_barrier = barrier_needed(access) && (access.decorators() & C1_NEEDS_PATCHING) != 0;
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:161:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::resolve_address(access, resolve_in_register || patch_before_barrier);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:166:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
void ZBarrierSetC1::load_at_resolved(LIRAccess& access, LIR_Opr result) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:167:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  BarrierSetC1::load_at_resolved(access, result);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:169:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (barrier_needed(access)) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:170:18:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    load_barrier(access, result);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:174:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static void pre_load_barrier(LIRAccess& access) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:175:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  DecoratorSet decorators = access.decorators();
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:184:3:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  access.gen()->access_load_at(decorators,
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:185:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.type(),
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:186:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.base().item(),
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:187:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.offset().opr(),
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:188:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.gen()->new_register(access.type()),
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:188:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                               access.gen()->new_register(access.type()),
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:193:59:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ZBarrierSetC1::atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:194:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (barrier_needed(access)) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:195:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_load_barrier(access);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:198:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::atomic_xchg_at_resolved(access, value);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:201:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
LIR_Opr ZBarrierSetC1::atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:202:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (barrier_needed(access)) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:203:22:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    pre_load_barrier(access);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.cpp:206:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC1::atomic_cmpxchg_at_resolved(access, cmp_value, new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:42:33:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ZLoadBarrierStubC1(LIRAccess& access, LIR_Opr ref, address runtime_stub);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:64:32:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  void load_barrier(LIRAccess& access, LIR_Opr result) const;
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:67:46:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr resolve_address(LIRAccess& access, bool resolve_in_register);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:68:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual void load_at_resolved(LIRAccess& access, LIR_Opr result);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:69:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_xchg_at_resolved(LIRAccess& access, LIRItem& value);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c1/zBarrierSetC1.hpp:70:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual LIR_Opr atomic_cmpxchg_at_resolved(LIRAccess& access, LIRItem& cmp_value, LIRItem& new_value);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:183:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
static void set_barrier_data(C2Access& access) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:184:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ZBarrierSet::barrier_needed(access.decorators(), access.type())) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:184:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (ZBarrierSet::barrier_needed(access.decorators(), access.type())) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:185:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if (access.decorators() & ON_WEAK_OOP_REF) {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:186:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.set_barrier_data(ZLoadBarrierWeak);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:188:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.set_barrier_data(ZLoadBarrierStrong);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:193:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::load_at_resolved(C2Access& access, const Type* val_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:194:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  set_barrier_data(access);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:195:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::load_at_resolved(access, val_type);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:198:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::atomic_cmpxchg_val_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:200:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  set_barrier_data(access);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:201:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::atomic_cmpxchg_val_at_resolved(access, expected_val, new_val, val_type);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:204:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::atomic_cmpxchg_bool_at_resolved(C2AtomicParseAccess& access, Node* expected_val,
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:206:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  set_barrier_data(access);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:207:56:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::atomic_cmpxchg_bool_at_resolved(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:210:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
Node* ZBarrierSetC2::atomic_xchg_at_resolved(C2AtomicParseAccess& access, Node* new_val, const Type* val_type) const {
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:211:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  set_barrier_data(access);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.cpp:212:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return BarrierSetC2::atomic_xchg_at_resolved(access, new_val, val_type);
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:66:44:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* load_at_resolved(C2Access& access, const Type* val_type) const;
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:67:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_val_at_resolved(C2AtomicParseAccess& access,
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:71:70:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_cmpxchg_bool_at_resolved(C2AtomicParseAccess& access,
data/openjdk-16-16~14/src/hotspot/share/gc/z/c2/zBarrierSetC2.hpp:75:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  virtual Node* atomic_xchg_at_resolved(C2AtomicParseAccess& access,
data/openjdk-16-16~14/src/hotspot/share/include/jvm.h:1259:20:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    jint (JNICALL *vfprintf)(FILE *fp, const char *format, va_list args);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1282:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system) ("Thread local allocation (native) for " SIZE_FORMAT
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1388:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system) ("%s", text);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1447:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("Allocation using C_HEAP_ARRAY for " SIZE_FORMAT
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1524:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("JfrClassAdapter: unable to create ClassFileStream");
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1530:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("JfrClassAdapter: unable to create InstanceKlass");
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1550:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("JfrClassAdapter: unable to create ClassFileStream");
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1556:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("JfrClassAdapter: unable to create InstanceKlass");
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:50:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("ERROR: JfrJvmtiAgent: " INT32_FORMAT " (%s): %s\n",
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:114:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("%s", error_buffer);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:146:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("GetObjectArrayElement threw an exception");
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:268:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)(illegal_state_msg);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:269:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)("JFR uses JVMTI RetransformClasses and requires the JVMTI state to have entered JVMTI_PHASE_LIVE.");
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:270:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)("Please initialize JFR in response to event JVMTI_EVENT_VM_INIT instead of JVMTI_EVENT_VM_START.");
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp:554:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("%s",error_msg);
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJavaSupport.cpp:556:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)("%s", "An irrecoverable error in Jfr. Shutting down VM...");
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJniMethodRegistration.cpp:101:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("RegisterNatives for JVM class failed!");
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:84:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("JfrUpcall failed");
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:102:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_error(jfr, system)("%s", error_buffer);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:57:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)(
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:87:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)(
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/bfsClosure.cpp:94:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)(
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:72:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("EdgeQueue reserved size total: " SIZE_FORMAT " [KB]", edge_queue.reserved_size() / K);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:73:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("EdgeQueue edges total: " SIZE_FORMAT, edge_queue.top());
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:74:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("EdgeQueue liveset total: " SIZE_FORMAT " [KB]", edge_queue.live_set() / K);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/chains/pathToGcRootsOperation.cpp:76:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("EdgeQueue commit reserve ratio: %f\n",
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp:55:48:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
                         OldObjectRoot::System system,
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp:62:21:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    _info._system = system;
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/rootResolver.cpp:148:43:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    ReferenceLocateClosure rlc(_callback, system, type, NULL);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:59:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Object sampling could not be started because the sampler could not be allocated");
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:63:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("Object sampling started");
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/leakProfiler.cpp:77:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("Object sampling stopped");
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.cpp:31:54:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
OopStorage* OldObjectRoot::system_oop_storage(System system) {
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.cpp:32:17:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  int val = int(system);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.cpp:45:54:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
const char* OldObjectRoot::system_description(System system) {
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.cpp:46:48:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  OopStorage* oop_storage = system_oop_storage(system);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.cpp:50:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  switch (system) {
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp:57:48:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  static OopStorage* system_oop_storage(System system);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/utilities/rootType.hpp:58:48:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  static const char* system_description(System system);
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:147:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("Unable to generate network utilization events");
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:157:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)( "Unable to generate requestable event CPUInformation");
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:186:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)( "Unable to generate requestable event CPULoad");
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:222:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)( "Unable to generate requestable event SystemProcesses");
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:266:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)( "Unable to generate requestable event ThreadContextSwitchRate");
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp:46:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("unable to create jfr event for DCMD %s", cmd);
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrThreadDumpEvent.cpp:47:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("exception type: %s", PENDING_EXCEPTION->klass()->external_name());
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:210:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(hash_buf, "/" UINTX_FORMAT, hash);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:216:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(hidden_or_anon_symbol + result_len, hash_buf);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:150:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("Starting a recording");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:153:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_debug(jfr, system)("Exception while starting a recording");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:157:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_trace(jfr, system)("Finished starting a recording");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:178:25:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  LogTarget(Error, jfr, system) lt_error;
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:418:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Recorder thread STOPPED");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:275:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("Unable to malloc memory during jfr emergency dump");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:288:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("Unable to open repository %s", repository_path);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:302:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_error(jfr, system)("Unable to malloc memory during jfr emergency dump");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:369:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("Unable to malloc memory during jfr emergency dump");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:370:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_error(jfr, system)("Unable to write jfr emergency dump file");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp:410:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Recording service STARTED");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderService.cpp:416:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Recording service STOPPED");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp:51:18:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  log_debug(jfr, system)("Recorder thread STARTED");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrRecorderThreadLoop.cpp:88:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        log_debug(jfr, system)("Request to STOP recorder");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:322:34:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (log_is_enabled(Debug, jfr, system)) {
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:325:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_debug(jfr, system)("Cleared " SIZE_FORMAT " full buffer(s) of " SIZE_FORMAT" bytes.", number_of_discards, amount);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:326:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_debug(jfr, system)("Current number of full buffers " SIZE_FORMAT "", number_of_discards);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:570:34:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  if (log_is_enabled(Debug, jfr, system)) {
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:572:22:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_debug(jfr, system)("%s " SIZE_FORMAT " full buffer(s) of " SIZE_FORMAT" B of data%s",
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:58:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Allocation: [" SIZE_FORMAT "] bytes", alloc_size);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:59:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Total alloc [" JLONG_FORMAT "] bytes", total_allocated);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:60:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Liveset:    [" JLONG_FORMAT "] bytes", current_live_set);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:68:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Deallocation: [" SIZE_FORMAT "] bytes", dealloc_size);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:69:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Total dealloc [" JLONG_FORMAT "] bytes", total_deallocated);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:70:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    log_trace(jfr, system)("Liveset:      [" JLONG_FORMAT "] bytes", current_live_set);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrAllocation.cpp:82:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
      log_warning(jfr, system)("Memory allocation failed for size [" SIZE_FORMAT "] bytes", alloc_size);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:50:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system) \
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:51:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, event) \
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:52:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, setting) \
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:53:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, bytecode) \
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:54:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, parser) \
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:55:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, metadata) \
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrLogTagSets.hpp:56:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  JFR_LOG_TAG(jfr, system, streaming) \
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrVersionSystem.hpp:83:30:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    Handle(JfrVersionSystem* system);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrVersionSystem.inline.hpp:140:59:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
inline JfrVersionSystem::Handle::Handle(JfrVersionSystem* system) : _system(system), _node(system->acquire()) {}
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrVersionSystem.inline.hpp:140:77:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
inline JfrVersionSystem::Handle::Handle(JfrVersionSystem* system) : _system(system), _node(system->acquire()) {}
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:300:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(name_buf, "%s::%s", vmField.typeName, vmField.fieldName);
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp:606:3:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  vsnprintf(msg, max_msg_size, format, ap);
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.cpp:640:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dest, name);
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:425:15:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    int ret = sscanf(outputstr + 1, SIZE_FORMAT, &idx);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:161:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(oldest_name, archive_name);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:435:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result + i, first);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:442:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result + i, second);
data/openjdk-16-16~14/src/hotspot/share/logging/logMessageBuffer.cpp:113:28:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    written += (size_t)os::vsnprintf(current_buffer_position, remaining_buffer_length, fmt, copy) + 1;
data/openjdk-16-16~14/src/hotspot/share/logging/logTag.hpp:168:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  LOG_TAG(system) \
data/openjdk-16-16~14/src/hotspot/share/logging/logTagSet.cpp:121:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ret = os::vsnprintf(buf + prefix_len, sizeof(buf) - prefix_len, fmt, args);
data/openjdk-16-16~14/src/hotspot/share/logging/logTagSet.cpp:124:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ret = os::vsnprintf(buf, sizeof(buf), fmt, args);
data/openjdk-16-16~14/src/hotspot/share/logging/logTagSet.cpp:131:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    ret = os::vsnprintf(newbuf + prefix_len, newbuf_len - prefix_len, fmt, saved_args);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:146:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(header_version, vm_version);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:296:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_name->data(), name);
data/openjdk-16-16~14/src/hotspot/share/oops/constantPool.cpp:1875:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf("long         " INT64_FORMAT, (int64_t) *(jlong *) &val);
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:2152:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  os::vsnprintf(msg_buffer, sizeof(msg_buffer), format, ap);
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:457:31:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                              access ? "" : "NOT ",
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:459:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access;
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:3097:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return (access & (~JVM_ACC_SUPER)) & JVM_ACC_WRITTEN_FLAGS;
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:713:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result + name_len, addr_buf);
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:179:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dest, klass_name);
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:181:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(&dest[klass_name_len + 1], method_name->as_C_string());
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:182:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(&dest[klass_name_len + 1 + method_name_len], signature->as_C_string());
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:409:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(trial_name_str, prefix);
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:410:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(trial_name_str, name_str);
data/openjdk-16-16~14/src/hotspot/share/opto/arraycopynode.cpp:155:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2OptAccess access(*phase, ctl, mem, decorators, bt, adr->in(AddPNode::Base), addr);
data/openjdk-16-16~14/src/hotspot/share/opto/arraycopynode.cpp:156:27:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  Node* res = bs->load_at(access, type);
data/openjdk-16-16~14/src/hotspot/share/opto/arraycopynode.cpp:157:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ctl = access.ctl();
data/openjdk-16-16~14/src/hotspot/share/opto/arraycopynode.cpp:168:15:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2OptAccess access(*phase, ctl, mem, decorators, bt, adr->in(AddPNode::Base), addr);
data/openjdk-16-16~14/src/hotspot/share/opto/arraycopynode.cpp:169:16:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  bs->store_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/opto/arraycopynode.cpp:170:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  ctl = access.ctl();
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2071:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, Matcher::regName[reg]);
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2073:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buf,"%s + #%d",OptoReg::regname(OptoReg::c_frame_pointer),
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1582:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2ParseAccess access(this, decorators | C2_WRITE_ACCESS, bt, obj, addr);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1583:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1584:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::store_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1586:35:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->store_at(access, value);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1601:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2ParseAccess access(this, decorators | C2_READ_ACCESS, bt, obj, addr);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1602:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1603:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::load_at(access, val_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1605:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->load_at(access, val_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1618:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2ParseAccess access(this, decorators | C2_READ_ACCESS, bt, NULL, addr);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1619:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1620:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::load_at(access, val_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1622:34:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->load_at(access, val_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1636:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AtomicParseAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS,
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1638:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1639:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::atomic_cmpxchg_val_at(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1641:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_cmpxchg_val_at(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1655:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AtomicParseAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS,
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1657:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1658:63:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::atomic_cmpxchg_bool_at(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1660:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_cmpxchg_bool_at(access, expected_val, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1673:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AtomicParseAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS,
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1675:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1676:55:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::atomic_xchg_at(access, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1678:41:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_xchg_at(access, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1691:23:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  C2AtomicParseAccess access(this, decorators | C2_READ_ACCESS | C2_WRITE_ACCESS, bt, obj, addr, alias_idx);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1692:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_raw()) {
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1693:54:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->BarrierSetC2::atomic_add_at(access, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:1695:40:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return _barrier_set->atomic_add_at(access, new_val, value_type);
data/openjdk-16-16~14/src/hotspot/share/opto/idealGraphPrinter.cpp:509:11:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
          sprintf(buffer, JLONG_FORMAT, value);
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1548:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "min+" INT32_FORMAT, n - min_jint);
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1552:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "max-" INT32_FORMAT, max_jint - n);
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1554:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, INT32_FORMAT, n);
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1809:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "%s+" JLONG_FORMAT, xname, n - x);
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1812:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "%s-" JLONG_FORMAT, xname, x - n);
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1824:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "min+" JLONG_FORMAT, n - min_jlong);
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1828:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, "max-" JLONG_FORMAT, max_jlong - n);
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1836:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, JLONG_FORMAT, n);
data/openjdk-16-16~14/src/hotspot/share/prims/cdsoffsets.cpp:37:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_name, name);
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:2945:20:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = os::vsnprintf(str, count, fmt, args);
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:2978:12:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    return vfprintf(f, fmt, args);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:1183:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(info_ptr->name, n);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:1427:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(info_ptr->name, name);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2384:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(result, class_sig);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2401:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(gen_result, gen_sig);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2450:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*source_name_ptr, sfncp);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2830:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(*source_debug_extension_ptr, sde);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2885:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*name_ptr, fieldName);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2894:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*signature_ptr, fieldSignature);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2906:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(*generic_ptr, gen_sig);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2962:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*name_ptr, utf8_name);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2969:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*signature_ptr, utf8_signature);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2982:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(*generic_ptr, gen_sig);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3140:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(name_buf, utf8_name);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3144:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sig_buf, utf8_signature);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3150:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(gen_sig_buf, utf8_gen_sign);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3576:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(*tmp_value, key);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3606:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(*value_ptr, value);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.cpp:463:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(prefix_copy, prefix);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.cpp:1143:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dup_str, str);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:113:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ext_funcs[i].id, id);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:121:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ext_funcs[i].short_description, desc);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:145:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(dst_params[j].name, src_params[j].name);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:201:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ext_events[i].id, id);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:209:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(ext_events[i].short_description, desc);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:233:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(dst_params[j].name, src_params[j].name);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRawMonitor.cpp:67:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  _name = strcpy(NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal), name);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3928:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
          strcpy(trial_name_str, prefix);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3929:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
          strcat(trial_name_str, name_str);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:126:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_value, value);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:146:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sp, _value);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:147:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(sp, os::path_separator());
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:148:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(sp, value);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:151:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sp, value);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:163:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_value, value);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:198:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_key, key);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:209:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_name, name);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:214:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(_options, options);
data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.cpp:2586:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(name, "%s/%s/%s",
data/openjdk-16-16~14/src/hotspot/share/runtime/frame.cpp:1238:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(fv.description, description);
data/openjdk-16-16~14/src/hotspot/share/runtime/memprofiler.cpp:128:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(_log_fp, UINTX_FORMAT_W(6) ",", CodeCache::capacity() / K);
data/openjdk-16-16~14/src/hotspot/share/runtime/memprofiler.cpp:130:3:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  fprintf(_log_fp, UINTX_FORMAT_W(6) "," UINTX_FORMAT_W(6) ",%6ld\n",
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:91:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
int os::snprintf(char* buf, size_t len, const char* fmt, ...) {
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:94:20:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = os::vsnprintf(buf, len, fmt, args);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:627:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(dup_str, str);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1235:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(q, home);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1261:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(modified_mode, "%s" LINUX_ONLY("e") BSD_ONLY("e") WINDOWS_ONLY("N"), mode);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1331:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(inpath, path);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.hpp:613:14:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  static int vsnprintf(char* buf, size_t len, const char* fmt, va_list args) ATTRIBUTE_PRINTF(3, 0);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.hpp:614:14:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  static int snprintf(char* buf, size_t len, const char* fmt, ...) ATTRIBUTE_PRINTF(3, 4);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:92:6:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
     strcpy(_name, name);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:103:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(_name, "%s.%s", prefix, name);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:155:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(cname, name());
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:366:4:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
   sprintf(result, "%s.%s", ns, name);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:625:51:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                      AccessFlags access,
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:643:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      access.is_public()) {
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:660:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_protected()) {
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:665:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access.is_static() || // static fields are ok, see 6622385
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:677:8:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (!access.is_private() && is_same_class_package(current_class, member_class)) {
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:683:7:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  if (access.is_private() && host_class == current_class) {
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:690:11:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
      if (access) {
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.hpp:94:52:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                       AccessFlags access,
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:101:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, next_str);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:114:10:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
      || sscanf(str, JLONG_FORMAT "%n", &_value, &scanned) != 1
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:215:14:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  int argc = sscanf(str, JLONG_FORMAT, &_value._time);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:315:13:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  int res = sscanf(str, UINT64_FORMAT "%c", &_value._val, &_value._multiplier);
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2017:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(str, error());
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2080:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(base_path, HeapDumpPath);
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2094:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(base_path, os::file_separator());
data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp:157:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(arg, INTX_FORMAT, &value) == 1) {
data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp:175:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(arg, UINTX_FORMAT, &value) == 1) {
data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp:193:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(arg, UINT64_FORMAT, &value) == 1) {
data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp:211:7:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  if (sscanf(arg, SIZE_FORMAT, &value) == 1) {
data/openjdk-16-16~14/src/hotspot/share/utilities/compilerWarnings_gcc.hpp:31:60:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ATTRIBUTE_PRINTF(fmt,vargs)  __attribute__((format(printf, fmt, vargs)))
data/openjdk-16-16~14/src/hotspot/share/utilities/compilerWarnings_gcc.hpp:34:59:  [4] (buffer) scanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function.
#define ATTRIBUTE_SCANF(fmt,vargs)  __attribute__((format(scanf, fmt, vargs)))
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:79:40:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
   functions that do not slow down the system too much and thus can be left in optimized code.
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:120:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(err, format, ap);
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:257:7:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    ::vfprintf(stderr, detail_fmt, detail_args_copy);
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:422:3:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
  sprintf(buffer, "printnm: " INTPTR_FORMAT, p);
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:120:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(_filepath, filepath);
data/openjdk-16-16~14/src/hotspot/share/utilities/exceptions.cpp:248:7:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  os::vsnprintf(msg, max_msg_size, format, ap);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:103:28:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    int required_len = os::vsnprintf(buffer, buflen, format, ap);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:455:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, force_directory);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:456:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(buf, os::file_separator());
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:496:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&buf[buf_pos + first], p1st);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:500:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(&buf[buf_pos + second - first - 2], p2nd);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:504:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(buf, tail);      // append rest of name, or all of name
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:107:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat(languageString, region);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:464:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(sProps->protocol##Port, buf);                                \
data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c:289:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(libName, cname+prefixLen);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:174:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(path, radical);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:175:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(path, replaced);
data/openjdk-16-16~14/src/java.base/share/native/libjli/args.c:36:34:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  #define JLI_ReportMessage(...) printf(__VA_ARGS__)
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:878:19:  [4] (buffer) sscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
  int args_read = sscanf(s, JLONG_FORMAT_SPECIFIER, &n);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:989:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(def, format, s);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1447:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(tmp, "-X%s", arg + 1); /* skip '-' */
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1779:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(envcp, "-Denv.class.path=%s", s);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1792:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(apphome, "-Dapplication.home=%s", home);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2093:7:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
      sprintf(cfgName, "%s-default", jvmCfgName);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2393:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, vl);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2406:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stdout, fmt, vl);
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.c:108:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf(fmt,vl);
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.h:76:33:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define JLI_StrCat(p1, p2)      strcat((p1), (p2))
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.h:77:33:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define JLI_StrCpy(p1, p2)      strcpy((p1), (p2))
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.h:103:41:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define JLI_Snprintf                    snprintf
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:117:12:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return access(filename, F_OK) == 0;
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:640:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bucket->name, name);
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:701:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(bucket->name, name);
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:1555:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        int access;
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:1571:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            if (access != -1) {
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:1581:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        } else if (access & JVM_ACC_PROTECTED) {
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:2624:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    if ((access != ACCESS_NONE) && (new_mask_count > 0)) {
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:131:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access,             /* Read and/or write permission */
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:155:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
            access,             /* Read and/or write permission */
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:816:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(buf, name);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1503:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(entryname, entry->name);
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:227:5:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execv(java, (char * const *) nargv);
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:292:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(buf, BIN_PATH);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:339:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(errmsg, fmtsize, IOE_FORMAT, errnum, detail);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:379:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(tty, format, ap);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:109:12:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    return strcat(strcat(strcpy(path, dir), "/"), name);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:109:26:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    return strcat(strcat(strcpy(path, dir), "/"), name);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:394:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapfilename, java_home_dir);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:553:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, (const char *)"GMT%c%02d:%02d",
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:578:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(buf, (const char *)"GMT%c%02d:%02d",
data/openjdk-16-16~14/src/java.base/unix/native/libjava/UnixFileSystem_md.c:167:21:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        RESTARTABLE(access(path, mode), res);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/UnixFileSystem_md.c:179:48:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                          jint access,
data/openjdk-16-16~14/src/java.base/unix/native/libjava/UnixFileSystem_md.c:189:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        switch (access) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:257:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(r + rn, p);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:262:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(out, path);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:221:9:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execvp(file, (char **) argv);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:238:9:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execvp(file, (char **) argv);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:133:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(temp, lc);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:159:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(temp, lc);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:185:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(encoding_variant, p); /* Copy the leading '.' */
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:188:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(encoding_variant, p); /* Copy the leading '@' */
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:203:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(temp, p);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:214:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(encoding_variant, p); /* Copy the leading '.' */
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:217:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(encoding_variant, p); /* Copy the leading '@' */
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:241:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(*std_language, language);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:249:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(*std_country, country);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:409:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(os_version, name.version);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:411:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(os_version, name.release);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/jni_util_md.c:55:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(jniEntryName, sym);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/jni_util_md.c:58:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(jniEntryName, cname);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:383:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(new_runpath, LD_LIBRARY_PATH "="
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:448:13:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
            execv(newexec, argv);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:451:9:  [4] (shell) execv:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        execv(newexec, argv);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:494:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(libjava, F_OK) == 0) {
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:505:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        if (access(libjava, F_OK) == 0) {
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:186:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, vl);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:206:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, fmt, vl);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:236:14:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    return ((access(buffer, X_OK) == 0) ? 1 : 0);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1269:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(addr6, "%s:%s:%s:%s:%s:%s:%s:%s",
data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c:224:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(buf, format, hostname, error_string);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:988:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RESTARTABLE(access(path, (int)amode), err);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:998:17:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    RESTARTABLE(access(path, F_OK), err);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:996:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(ret, fixes[!prefix][!positive][style][pattern]);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:534:9:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
        wcscat(domain, name);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessImpl_md.c:85:11:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        ? swprintf(utf16_javaMessage, MESSAGE_LENGTH, L"%s error=%d, %s", functionName, errnum, utf16_OSErrorMsg)
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessImpl_md.c:86:11:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        : swprintf(utf16_javaMessage, MESSAGE_LENGTH, L"%s failed, error=%d", functionName, errnum);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessImpl_md.c:486:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access,             /* Read and/or write permission */
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:368:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(winZoneName, subKeyName);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:436:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(mapFileName, java_home_dir);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:437:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(mapFileName, MAPPINGS_FILE);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:380:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                                 jobject file, jint access)
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:391:13:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
    switch (access) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:411:49:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
                                           jint access,
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:657:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(search_path, pathbuf);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:389:17:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                wcscpy(pathbuf, path );
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:393:17:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
                wcscat(pathbuf, path + 1);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:397:13:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
            wcscat(pathbuf, path );
data/openjdk-16-16~14/src/java.base/windows/native/libjava/dirent_md.c:72:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dirp->path, dirname);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/dirent_md.c:116:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(dirp->dirent.d_name, dirp->find_data.cFileName);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:140:17:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                wcscpy(pathbuf, path);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:167:26:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                         wcscpy(pathbuf, ps);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:190:25:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                        wcscpy(pathbuf, ps);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:247:9:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        access,             /* Read and/or write permission */
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:182:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ret, elems[0]);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:188:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(ret, elems[index]);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.c:37:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(path, name);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.c:44:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(path, name);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c:52:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(jniEntryName, cname);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c:53:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(jniEntryName, p);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c:56:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(jniEntryName, sym);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c:58:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(jniEntryName, cname);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c:61:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(jniEntryName, sym);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:496:10:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    rc = vsnprintf(buffer, size, format, vl);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:604:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, vl);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:668:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stderr, fmt, vl);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c:301:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(curr->name, dev_name);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:381:25:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                        strcpy (nif->name, newname);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:382:25:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
                        wcscpy ((PWCHAR)nif->displayName, ptr->FriendlyName);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:71:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(s1, s2);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1954:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(errmsg, "error getting socket option: %s", tmpbuf);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.c:192:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(exc, "%s%s", JNU_JAVANETPKG, excP);
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:978:9:  [4] (access) SetThreadToken:
  If this call fails, the program could fail to drop heightened privileges
  (CWE-250). Make sure the return value is checked, and do not continue if a
  failure is reported.
    if (SetThreadToken(hThread, hToken) == 0)
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1673:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(imserver,XIM_SERVER_CATEGORY);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:37:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:109:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer, "%s:%d,%d,%d",
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:113:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buffer, "%s:%d,%d",
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:125:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(buffer, ALSA_DEFAULT_DEVICE_NAME);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:101:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(devname, ALSA_HARDWARE_CARD, card);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:124:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(devname, ALSA_HARDWARE_CARD, card);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:78:17:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
                sprintf(devname, ALSA_HARDWARE_CARD, card);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:104:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(devname, ALSA_HARDWARE_CARD, card);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:88:13:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
            sprintf(devname, ALSA_HARDWARE_CARD, card);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:118:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(devname, ALSA_HARDWARE_CARD, (int) mixerIndex);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:130:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer, " [%s]", devname);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:152:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(devname, ALSA_HARDWARE_CARD, (int) mixerIndex);
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_mem.c:281:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(report, reportFormat, header->filename, header->linenumber, header->size, header->order);
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.c:68:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(info->file, file);
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.c:219:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(DTraceBuffer, fmt, arglist);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:566:69:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPBUFFERPROC) (GLenum target, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:586:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapBuffer (GLenum target, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:1229:114:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPBUFFERRANGEPROC) (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:1314:102:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapBufferRange (GLenum target, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:2174:134:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLBINDIMAGETEXTUREPROC) (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:2187:122:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glBindImageTexture (GLuint unit, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLenum format);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:2630:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPNAMEDBUFFERPROC) (GLuint buffer, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:2631:119:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPNAMEDBUFFERRANGEPROC) (GLuint buffer, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:2753:62:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapNamedBuffer (GLuint buffer, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:2754:107:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapNamedBufferRange (GLuint buffer, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:2940:87:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLMAKEIMAGEHANDLERESIDENTARBPROC) (GLuint64 handle, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:2957:75:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glMakeImageHandleResidentARB (GLuint64 handle, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:4774:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPBUFFERARBPROC) (GLenum target, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:4786:60:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapBufferARB (GLenum target, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:6916:77:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPNAMEDBUFFEREXTPROC) (GLuint buffer, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:7028:122:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPNAMEDBUFFERRANGEEXTPROC) (GLuint buffer, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:7172:65:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapNamedBufferEXT (GLuint buffer, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:7284:110:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapNamedBufferRangeEXT (GLuint buffer, GLintptr offset, GLsizeiptr length, GLbitfield access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:8187:138:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLBINDIMAGETEXTUREEXTPROC) (GLuint index, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLint format);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:8190:126:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glBindImageTextureEXT (GLuint index, GLuint texture, GLint level, GLboolean layered, GLint layer, GLenum access, GLint format);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:9214:95:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void *(APIENTRYP PFNGLMAPTEXTURE2DINTELPROC) (GLuint texture, GLint level, GLbitfield access, GLint *stride, GLenum *layout);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:9218:83:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void *APIENTRY glMapTexture2DINTEL (GLuint texture, GLint level, GLbitfield access, GLint *stride, GLenum *layout);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:9463:86:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLMAKEIMAGEHANDLERESIDENTNVPROC) (GLuint64 handle, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:9477:74:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glMakeImageHandleResidentNV (GLuint64 handle, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:10932:79:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLMAKEBUFFERRESIDENTNVPROC) (GLenum target, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:10935:84:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLMAKENAMEDBUFFERRESIDENTNVPROC) (GLuint buffer, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:10946:67:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glMakeBufferResidentNV (GLenum target, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:10949:72:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glMakeNamedBufferResidentNV (GLuint buffer, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:11320:90:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef void (APIENTRYP PFNGLVDPAUSURFACEACCESSNVPROC) (GLvdpauSurfaceNV surface, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/J2D_GL/glext.h:11331:78:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
GLAPI void APIENTRY glVDPAUSurfaceAccessNV (GLvdpauSurfaceNV surface, GLenum access);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:147:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(edge,
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:153:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, convolveShaderSource,
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:363:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, rescaleShaderSource,
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:595:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, lookupShaderSource,
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLPaints.c:581:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(cycleCode, noCycleCode, texCoordCalcCode);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLPaints.c:583:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(cycleCode, reflectCode, texCoordCalcCode);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLPaints.c:585:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(cycleCode, repeatCode, texCoordCalcCode);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLPaints.c:589:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, multiGradientShaderSource,
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_colors.c:43:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define jio_fprintf fprintf
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:50:21:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define jio_fprintf fprintf
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/Trace.c:65:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(j2dTraceFile, string, args);
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h:85:21:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
#define ft_strcat   strcat
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h:87:21:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
#define ft_strcpy   strcpy
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h:110:21:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
#define ft_sprintf  sprintf
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afhints.c:187:15:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
              printf varformat;       \
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/aftypes.h:497:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
          system,                                        \
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/aftypes.h:508:5:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    system,                                              \
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftdbgmem.c:217:5:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vprintf( fmt, ap );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftdbgmem.c:981:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf( fmt,
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftdebug.c:61:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( stderr, fmt, ap );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftdebug.c:76:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( stderr, fmt, ap );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/smooth/ftgrays.c:202:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf( stderr, fmt, ap );
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:37:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ERROR0(string)                        { fprintf(stdout, (string)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:38:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ERROR1(string, p1)                    { fprintf(stdout, (string), (p1)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:39:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ERROR2(string, p1, p2)                { fprintf(stdout, (string), (p1), (p2)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:40:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ERROR3(string, p1, p2, p3)            { fprintf(stdout, (string), (p1), (p2), (p3)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:41:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define ERROR4(string, p1, p2, p3, p4)        { fprintf(stdout, (string), (p1), (p2), (p3), (p4)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:53:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE0(string)                        { fprintf(stdout, (string)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:54:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE1(string, p1)                    { fprintf(stdout, (string), (p1)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:55:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE2(string, p1, p2)                { fprintf(stdout, (string), (p1), (p2)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:56:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE3(string, p1, p2, p3)            { fprintf(stdout, (string), (p1), (p2), (p3)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:57:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE4(string, p1, p2, p3, p4)        { fprintf(stdout, (string), (p1), (p2), (p3), (p4)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:58:49:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE5(string, p1, p2, p3, p4, p5)    { fprintf(stdout, (string), (p1), (p2), (p3), (p4), (p5)); fflush(stdout); }
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:71:41:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define VTRACE0(string)                 fprintf(stdout, (string));
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:72:41:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define VTRACE1(string, p1)             fprintf(stdout, (string), (p1));
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:73:41:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define VTRACE2(string, p1, p2)         fprintf(stdout, (string), (p1), (p2));
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:74:41:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define VTRACE3(string, p1, p2, p3)     fprintf(stdout, (string), (p1), (p2), (p3));
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Utilities.h:75:41:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define VTRACE4(string, p1, p2, p3, p4) fprintf(stdout, (string), (p1), (p2), (p3), (p4));
data/openjdk-16-16~14/src/java.desktop/share/native/liblcms/LCMS.c:93:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# ifndef snprintf
data/openjdk-16-16~14/src/java.desktop/share/native/liblcms/LCMS.c:94:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#       define snprintf  _snprintf
data/openjdk-16-16~14/src/java.desktop/share/native/liblcms/LCMS.c:94:26:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#       define snprintf  _snprintf
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:30:10:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
# ifndef snprintf
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:31:16:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#       define snprintf _snprintf
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:31:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#       define snprintf _snprintf
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:476:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(scaleImageName, scaledImageXName);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:485:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(scaleImageName, scaledImagePctName);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.h:192:19:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dbgprintf printf
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/CUPSfuncs.c:37:23:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DPRINTF(x, y) fprintf(stderr, x, y);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:248:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy ( onePath, fDirP->name[index] );
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:423:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(fontPath, fontdirs[i]);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11FontScaler_md.c:103:11:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
          fprintf(stderr, (pixel == 0) ? "  " : "XX");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c:777:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(new_env, ENV_PREFIX);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c:788:35:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        new_env = strcat(new_env, s);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.c:612:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(new_env, ENV_PREFIX);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.c:623:35:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        new_env = strcat(new_env, s);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:149:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(pkgInfoPath + pos, pkgFileName);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:65:28:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINT if (tracing) printf
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:66:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define PRINT2 if (tracing > 1) printf
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:82:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(pargs,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:147:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(array, "const DWORD *%sShaders[] =\n{\n", name);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:153:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(elem, "    %s%d,\n", name, i);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:155:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(array, elem);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:228:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, convolveShaderSource,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:286:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, rescaleShaderSource,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:360:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, lookupShaderSource,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:455:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, basicGradientShaderSource,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:668:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(cycleCode, noCycleCode, texCoordCalcCode);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:670:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(cycleCode, reflectCode, texCoordCalcCode);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:672:9:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        sprintf(cycleCode, repeatCode, texCoordCalcCode);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:676:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(finalSource, multiGradientShaderSource,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/J2D_GL/wglext.h:665:122:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef HANDLE (WINAPI * PFNWGLDXREGISTEROBJECTNVPROC) (HANDLE hDevice, void *dxObject, GLuint name, GLenum type, GLenum access);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/J2D_GL/wglext.h:667:76:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
typedef BOOL (WINAPI * PFNWGLDXOBJECTACCESSNVPROC) (HANDLE hObject, GLenum access);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/J2D_GL/wglext.h:674:103:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
HANDLE WINAPI wglDXRegisterObjectNV (HANDLE hDevice, void *dxObject, GLuint name, GLenum type, GLenum access);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/opengl/J2D_GL/wglext.h:676:57:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
BOOL WINAPI wglDXObjectAccessNV (HANDLE hObject, GLenum access);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:1076:30:  [4] (format) _stprintf:
  Potential format string problem (CWE-134). Make format string constant.
#define FMT_MSG(x,y) case x: _stprintf(szBuf, \
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:1335:13:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
            sprintf(szBuf, "0x%8.8x(%s):Unknown message 0x%8.8x\n",
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:1339:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(szBuf);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3660:53:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
                                   UINT flags, BOOL system)
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3670:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    InitMessage(&msg, (system ? WM_SYSKEYDOWN : WM_KEYDOWN),
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3702:51:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
                                 UINT flags, BOOL system)
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3713:24:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    InitMessage(&msg, (system ? WM_SYSKEYUP : WM_KEYUP),
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3759:82:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
MsgRouting AwtComponent::WmIMEChar(UINT character, UINT repCnt, UINT flags, BOOL system)
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3778:38:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
                                BOOL system)
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3793:20:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    UINT message = system ? WM_SYSCHAR : WM_CHAR;
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3802:9:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (system && alt_is_down) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3815:10:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    if (!system && alt_is_down) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.h:538:75:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    virtual MsgRouting WmKeyDown(UINT vkey, UINT repCnt, UINT flags, BOOL system);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.h:539:73:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    virtual MsgRouting WmKeyUp(UINT vkey, UINT repCnt, UINT flags, BOOL system);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.h:541:77:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    virtual MsgRouting WmChar(UINT character, UINT repCnt, UINT flags, BOOL system);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.h:542:80:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    virtual MsgRouting WmIMEChar(UINT character, UINT repCnt, UINT flags, BOOL system);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Debug.cpp:199:5:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _snprintf(assertMsg, ASSERT_MSG_SIZE, AssertFmt, expr, file, line, lastError, msgBuffer);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Desktop.cpp:88:26:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    HINSTANCE retval = ::ShellExecute(NULL, verb_c, fileOrUri_c, NULL, NULL, SW_SHOWNORMAL);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DesktopProperties.cpp:656:5:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    lstrcpy(valueNameBuf, valueName);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DesktopProperties.cpp:668:5:  [4] (buffer) lstrcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    lstrcpy(propKeyBuf, propKey);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:466:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(tmpname, name);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:474:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(&(logFont.lfFaceName[0]), tmpname);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1757:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(&(szSubKey[strlen(szSubKey)]), lpszCP);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1758:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(m_szCodePageSubkey, szSubKey);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1783:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(szFamilyName, GetFontName());
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1802:13:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
            wcscpy(lpszFileName, m_szDefaultEUDCFile);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1828:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        wcscpy(m_szDefaultEUDCFile, lpszFileName);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:2301:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        wcscpy(lf.lfFaceName, fontNameW);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:1970:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        wcscpy(iconResourceName, securityWarningIconName);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:1976:9:  [4] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120).
        wcscat(iconResourceName, strIndex);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:2960:5:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
    swprintf(szVer, 128, L"0x%x = %ld", version, version);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:2966:17:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
                swprintf(szVer + l, 128, L" (Windows Vista)");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:2968:17:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
                swprintf(szVer + l, 128, L" (Windows XP)");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:2971:13:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
            swprintf(szVer + l, 128, L" (Windows 2000)");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:2974:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        swprintf(szVer + l, 128, L" (Unknown)");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:3162:40:  [4] (shell) ShellExecute:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        int retVal = (int)((intptr_t)::ShellExecute(NULL, _T("open"),
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsEnv.cpp:279:16:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
            && swprintf(tmpPath, MAX_PATH, L"%s%s", systemRoot, fontPath + 12) != -1) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsEnv.cpp:289:13:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
            swprintf(tmpPath, MAX_PATH, L"%s\\FONTS\\EUDC.TTE", systemRoot);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:54:13:  [4] (format) _vsntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        if (_vsntprintf( szBuffer, DTRACE_BUF_LEN, lpszFormat, argList ) < 0) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:64:13:  [4] (format) _sntprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        if (_sntprintf(
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:76:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(fontpath,sysdir);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:79:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(fontpath,windir);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:155:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(lfw.lfFaceName, fullName);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:352:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(lfw.lfFaceName, lpelfe->elfLogFont.lfFaceName);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/lcdglyph.c:239:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        wcscpy(lf.lfFaceName, name);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:90:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(str, pos +1);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAgent.c:361:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(ourCopyOfAgentClassName, agentClassName);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAgent.c:363:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(ourCopyOfOptionsString, optionsString);
data/openjdk-16-16~14/src/java.management/share/native/libmanagement/management.c:60:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(errmsg, "errno: %d error: %s\n", errno, msg);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:1045:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        swprintf( (wchar_t *)month, 3, L"%2.2d", systemTime.wMonth);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:1046:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        swprintf( (wchar_t *)day, 3, L"%2.2d", systemTime.wDay);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:1047:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        swprintf( (wchar_t *)hour, 3, L"%2.2d", systemTime.wHour);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:1048:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        swprintf( (wchar_t *)minute, 3, L"%2.2d", systemTime.wMinute);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:1049:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        swprintf( (wchar_t *)second, 3, L"%2.2d", systemTime.wSecond);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:1050:9:  [4] (format) swprintf:
  Potential format string problem (CWE-134). Make format string constant.
        swprintf( (wchar_t *)timeString, 16,
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:43:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf(s) printf(s)
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:44:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf1(s, p1) printf(s, p1)
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:45:29:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf2(s, p1, p2) printf(s, p1, p2)
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:46:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf3(s, p1, p2, p3) printf(s, p1, p2, p3)
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:127:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buf, msg, argprt);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:132:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(buf);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:140:13:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            vfprintf(logFP, msg, args);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:155:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buf, msg, argprt);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:160:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(buf);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:168:13:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            vfprintf(logFP, msg, args);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:184:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buf, charmsg, argprt);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:189:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(buf);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:197:13:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            vfwprintf(logFP, msg, args);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:214:9:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
        vsprintf(buf, charmsg, argprt);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:219:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(buf);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:227:13:  [4] (format) vfwprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            vfwprintf(logFP, msg, args);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:231:17:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                fprintf(origFile, str);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:321:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(outputString);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeATInstance.cpp:127:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(memoryMappedView, AB_MEMORY_MAPPED_FILE_OK_ANSWER);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:197:20:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        DEBUG_CODE(sprintf(debugBuf, fireEventDebugString, #method, event, source, vmID)); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:252:20:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        DEBUG_CODE(sprintf(debugBuf, firePropertyChangeDebugString, #method, event, source)); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:281:20:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        DEBUG_CODE(sprintf(debugBuf, fireStringPropertyChangeDebugString, #method, event, source, oldValue, newValue)); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:310:20:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        DEBUG_CODE(sprintf(debugBuf, fireIntPropertyChangeDebugString, #method, event, source, oldValue, newValue)); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:339:20:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
        DEBUG_CODE(sprintf(debugBuf, fireACPropertyChangeDebugString, #method, event, source, oldValue, newValue)); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:134:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        DEBUG_CODE(sprintf(debugBuf, "  Failed to CreateFileMapping for %s, error: %X", memoryMappedFileName, errorCode));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:138:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        DEBUG_CODE(sprintf(debugBuf, "  CreateFileMapping worked - filename: %s\r\n", memoryMappedFileName));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:147:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        DEBUG_CODE(sprintf(debugBuf, "  Failed to MapViewOfFile for %s, error: %X", memoryMappedFileName, errorCode));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:157:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(memoryMappedView, AB_MEMORY_MAPPED_FILE_OK_QUERY);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:172:20:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        DEBUG_CODE(sprintf(debugBuf, "  JavaVM failed to deal with memory mapped file %s\r\n",
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:163:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf, "WinAccessBridge: %s", s);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:52:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(datebuf, "%.19s %s\n", asctime( newtime ), am_pm );
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:70:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(tmpbuf, msg, argprt);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:98:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(tmpbuf, msg, argprt);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:100:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(logfile, tmpbuf);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:122:5:  [4] (format) vsprintf:
  Potential format string problem (CWE-134). Make format string constant.
    vsprintf(tmpbuf, msg, argprt);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/j2secmod.h:40:20:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf(s) printf(s)
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/j2secmod.h:41:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf1(s, p1) printf(s, p1)
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/j2secmod.h:42:29:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf2(s, p1, p2) printf(s, p1, p2)
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/j2secmod.h:43:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define dprintf3(s, p1, p2, p3) printf(s, p1, p2, p3)
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_util.c:725:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy((char*)*ckpArray, pCharArray);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_util.c:1272:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(exceptionMsg, exceptionMsgPrefix);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_util.c:1273:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(exceptionMsg, classNameString);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_util.c:1317:9:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vfprintf(stdout, format, args);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11wrapper.h:214:21:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE0(s) { printf(s); fflush(stdout); }
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11wrapper.h:215:25:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE1(s, p1) { printf(s, p1); fflush(stdout); }
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11wrapper.h:216:29:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE2(s, p1, p2) { printf(s, p1, p2); fflush(stdout); }
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/pkcs11wrapper.h:217:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define TRACE3(s, p1, p2, p3) { printf(s, p1, p2, p3); fflush(stdout); }
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/p11_md.c:114:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(exceptionMessage, systemErrorMessage);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/p11_md.c:115:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(exceptionMessage, libraryNameStr);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/p11_md.c:117:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(exceptionMessage, (LPTSTR) lpMsgBuf);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/p11_md.c:118:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(exceptionMessage, libraryNameStr);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c:142:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(genenc, curveParams->genx);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c:143:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(genenc, curveParams->geny);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi-priv.h:60:20:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define DIAG(T,V) {fprintf(stderr,T);mp_print(V,stderr);fputc('\n',stderr);}
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi.c:2473:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(ofp, DIGIT_FMT, DIGIT(mp, ix));
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:71:13:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
            fprintf(stdout, fmt, ##__VA_ARGS__); \
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:1190:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(header, "%s %ls", #p, p); \
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:1197:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(header, "%s %ls (%ld)", #p, p, desc.cBuffers); \
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:99:6:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
     vfprintf(stderr, format, alist);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:108:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, alist);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:251:4:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
   strcpy(newlib->name, libname);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:180:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(debug_pathname, name);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:188:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(last_slash+1, debug_filename);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:197:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(last_slash, debug_filename);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:206:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(debug_pathname, debug_file_directory);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:207:3:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
  strcat(debug_pathname, name);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:209:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(last_slash+1, debug_filename);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:252:18:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  s = filename + sprintf (filename, "%s/.build-id/", debug_file_directory);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:53:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(alt_path, alt_root);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:54:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(alt_path, name);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:64:7:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
      strcpy(alt_path, alt_root);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:65:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(alt_path, strrchr(name, '/'));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:93:5:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    vfprintf(stderr, format, alist);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:102:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, alist);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:229:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(newlib->name, libname);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:538:3:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  vfprintf(stderr, format, alist);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:340:10:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
  return access(fname, F_OK) == 0;
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:361:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(rpath, filepath);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:438:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(rpath, filepath);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:78:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(tmp, symtab->symbols[i].name);
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:39:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf  _snprintf
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:39:19:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf  _snprintf
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:40:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define vsnprintf _vsnprintf
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:263:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  cnt = vsnprintf(denv->buffer, sizeof(denv->buffer), format, ap);
data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp:188:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(errmsg, "%s (hr: 0x%08X)", str, hr); \
data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp:314:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(m_msgBuffer, msg);
data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp:323:5:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    strcat(m_msgBuffer, msg);
data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/applauncher/Executor.cpp:35:21:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    FILE * stream = popen(cmd.c_str(), "r");
data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/tstrings.cpp:60:15:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        ret = vsnprintf(&*fmtout.begin(), fmtout.size(), format, args);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/SharedMemoryTransport.c:67:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf, "%s: %s\n", message, msg);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/SharedMemoryTransport.c:69:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(buf, "%s, error code = %d", message, errorCode);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:104:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(msg, newmsg);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:105:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(msg, join_str);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:106:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(msg, buf);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:111:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(msg, newmsg);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:192:17:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                strcpy(name2, name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:338:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*msgP, msg);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:193:12:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
           strcpy(msg, newmsg);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:244:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(nameBuffer, prefix);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:248:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(nameBuffer, buf);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:436:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(objectName, "%s.mutex", name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:443:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(objectName, "%s.hasData", name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:451:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(objectName, "%s.hasSpace", name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:574:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(connection->name, "%s.%" PRId64, transport->name, sysProcessGetID());
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:642:5:  [4] (format) sprintf:
  Potential format string problem (CWE-134). Make format string constant.
    sprintf(connection->name, "%s.%" PRId64, transport->name, otherPID);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:656:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(streamName, connection->name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:665:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(streamName, connection->name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:753:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(transport->name, address);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:810:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(transport->name, address);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:823:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(objectName, "%s.mutex", transport->name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:831:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(objectName, "%s.accept", transport->name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:839:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(objectName, "%s.attach", transport->name);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:1250:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(msg, errstr);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:1266:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(buffer, "Shared Memory Transport \"%s\" (%s), line %d: %s\n",
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:122:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(msg, newmsg);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:123:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(msg, join_str);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:124:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(msg, buf);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:129:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(msg, newmsg);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:227:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(msg, "handshake failed - received >%s< - expected >%s<", b, hello);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:698:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(*actualAddress, buf);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:861:17:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
                sprintf(ebuf, "ERROR: Peer not allowed to connect: %s\n",
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1247:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(*msgP, msg);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:973:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void)strcpy(combinedOptions, options);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:975:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(combinedOptions, new_options);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1058:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        (void)strcpy(gdata->options, options);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/error_messages.c:73:11:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void)vsnprintf((char*)utf8buf, sizeof(utf8buf), format, ap);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHandler.c:482:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void)strcpy(classname, signature);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHandler.c:501:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            (void)strcpy(durableSignature, signature);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:196:19:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            (void)vsnprintf(message, sizeof(message), format, ap);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:439:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void)strcpy(commandLine, command);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:441:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(commandLine, name);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:443:11:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
    (void)strcat(commandLine, address);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:524:15:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        (void)strcpy(info->name, name);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:532:19:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            (void)strcpy(info->address, address);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:551:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                (void)strcpy(info->allowed_peers, allowed_peers);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:578:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(prop_value, name);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:580:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(prop_value, retAddress);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:586:15:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        (void)strcat(threadName, name);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:640:16:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
         (void)strcat(threadName, name);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/util.c:1709:23:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
                (void)strcpy(value, utf);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/exec_md.c:66:11:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    (void)strcpy(args, cmdLine);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/exec_md.c:107:15:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
        (void)execvp(argv[0], argv);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c:52:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(paths_copy, paths);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c:61:37:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        size_t result_len = (size_t)snprintf(buffer, buflen, "%s/lib%s." LIB_SUFFIX, path, fname);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c:65:20:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        } else if (access(buffer, F_OK) == 0) {
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c:103:15:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        (void)snprintf(holder, holderlen, "lib%s." LIB_SUFFIX, fname);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libdt_socket/socket_md.c:403:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(buf, winsock_errors[i].errString);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:49:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(paths_copy, paths);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:121:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(holder, "%s.dll", fname);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/proc_md.h:42:9:  [4] (shell) popen:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
#define popen   _popen
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/util_md.h:39:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf        _snprintf
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/util_md.h:39:25:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf        _snprintf
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/util_md.h:40:9:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define vsnprintf       _vsnprintf
data/openjdk-16-16~14/src/jdk.management.agent/windows/native/libmanagement_agent/FileSystemImpl.c:223:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ACCESS_ALLOWED_ACE *access;
data/openjdk-16-16~14/src/jdk.management/linux/native/libmanagement_ext/UnixOperatingSystem.c:89:9:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
    n = fscanf(fh, "cpu " DEC_64 " " DEC_64 " " DEC_64 " " DEC_64 " " DEC_64 " "
data/openjdk-16-16~14/src/jdk.management/linux/native/libmanagement_ext/UnixOperatingSystem.c:101:17:  [4] (buffer) fscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
            if (fscanf(fh, "cpu%*d " DEC_64 " " DEC_64 " " DEC_64 " " DEC_64 " "
data/openjdk-16-16~14/src/jdk.management/linux/native/libmanagement_ext/UnixOperatingSystem.c:149:13:  [4] (buffer) vsscanf:
  The scanf() family's %s operation, without a limit specification, permits
  buffer overflows (CWE-120, CWE-20). Specify a limit to %s, or use a
  different input function. If the scanf format is influenceable by an
  attacker, it's exploitable.
        n = vsscanf(tmp, fmt, args);
data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/management_ext.c:60:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(errmsg, "errno: %d error: %s\n", errno, msg);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:439:9:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
        _snprintf(fullCounterPath,
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:475:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            _snprintf(fullCounterPath,
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:482:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            _snprintf(fullCounterPath,
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:720:13:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
            _snprintf(fullIDProcessCounterPath,
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:1061:5:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    _snprintf(pdhIDProcessCounterFmt,
data/openjdk-16-16~14/src/utils/hsdis/hsdis-demo.c:195:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(fmt, arg);
data/openjdk-16-16~14/src/utils/hsdis/hsdis-demo.c:199:9:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        printf(fmt, arg);
data/openjdk-16-16~14/src/utils/hsdis/hsdis-demo.c:233:47:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  (decode_instructions_printf_callback_ftype)&fprintf
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:243:3:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
  strcpy(buf, close);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:245:16:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  if (type)    sprintf(p += strlen(p), " type='%s'", type);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:376:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fp, "<"NS_PFX);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:377:5:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    fprintf(fp, event, arg);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:389:7:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
      fprintf(fp, argp, arg);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:398:57:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    int (*fprintf_callback)(FILE*, const char*, ...) = &fprintf;
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:454:47:  [4] (format) fprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
  if (printf_callback == (printf_callback_t) &fprintf)
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:52:11:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    float system;
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:150:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:156:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:164:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:180:30:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.5, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:185:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:192:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:203:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:210:30:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.5, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:215:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:222:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:232:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(1, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:237:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:244:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:255:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:262:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(1, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:267:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:274:32:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.125, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:289:31:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0.25, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:295:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/jfr/test_threadCpuLoad.cpp:301:28:  [4] (shell) system:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
  EXPECT_FLOAT_EQ(0, event.system);
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorators.cpp:176:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(input, "%s,%s", decorator_name_array[0], decorator_name_array[3]);
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp:149:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(data, "%s", start_marker);
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp:153:3:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
  sprintf(data + size - strlen(end_marker) - 1, "%s", end_marker);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:311:20:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  int result = os::vsnprintf(buf, len, fmt, args);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:316:13:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
TEST_VM(os, vsnprintf) {
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:320:13:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
TEST_VM(os, snprintf) {
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:321:21:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
  test_snprintf(os::snprintf, true);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:241:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strbuf, "Check #C0: unexpected export of %s from base to this", pkg);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:251:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strbuf, "Check #C1: error in add export of %s from base to this", pkg);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:260:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strbuf, "Check #C2: failed to export %s from base to this", pkg);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:269:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(strbuf, "Check #C3: unexpected export of %s from base to all modules", pkg);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:99:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(fieldName, name);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:100:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(fieldName, modified ? "_modify" : "_access");
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetThreadListStackTraces/libOneGetThreadListStackTraces.cpp:47:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(err_msg, sizeof(err_msg),
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetThreadListStackTraces/libOneGetThreadListStackTraces.cpp:52:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(err_msg, sizeof(err_msg),
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetThreadListStackTraces/libOneGetThreadListStackTraces.cpp:69:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(err_msg, sizeof(err_msg),
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HiddenClass/libHiddenClassSigTest.cpp:39:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define LOG0(str)             { printf(str); fflush(stdout); }
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HiddenClass/libHiddenClassSigTest.cpp:40:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define LOG1(str, arg)        { printf(str, arg); fflush(stdout); }
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HiddenClass/libHiddenClassSigTest.cpp:41:33:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define LOG2(str, arg1, arg2) { printf(str, arg1, arg2); fflush(stdout); }
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/SuspendWithCurrentThread/libSuspendWithCurrentThread.cpp:36:5:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    printf(__VA_ARGS__); \
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.cpp:77:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(mainThreadName, threadName);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.cpp:59:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(threadGroupName, groupInfo.name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw003/setfldw003.cpp:133:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(">>> setting access watch on fld%" PRIuPTR, i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw004/setfldw004.cpp:140:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(">>> setting access watch on fld%" PRIuPTR, i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw003/setfmodw003.cpp:153:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(">>> setting modification watch on fld%" PRIuPTR, i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw004/setfmodw004.cpp:151:17:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
                printf(">>> setting modification watch on fld%" PRIuPTR, i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.cpp:60:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name, "%s%d", prefix, eventsCount);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.cpp:59:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(name, "%s%d", prefix, eventsCount);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.cpp:54:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(filename,"%s/%s/%s.class",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.cpp:57:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(filename,"%s/%s.class",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp:393:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename,"%s/%s%02d/%s.class",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp:448:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(chbuffer, threadName);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp:475:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(chbuffer, className);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp:393:5:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
    sprintf(filename,"%s/%s/%s.class",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp:448:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(chbuffer, threadName);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp:475:5:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
    strcpy(chbuffer, className);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.cpp:292:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled ");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.cpp:301:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled ");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.cpp:302:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(kind, kind0);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.cpp:302:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(kind, threadsDesc[i].methodCompiled ? "compiled " : "not compiled ");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.cpp:303:9:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
        strcat(kind, kind0);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp:32:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp:33:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp:35:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp:37:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp:61:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp:35:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp:36:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp:38:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp:40:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp:64:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:32:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:33:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:35:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:37:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:60:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp:32:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp:33:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp:35:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp:37:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf(" unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp:55:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.cpp:32:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.cpp:33:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.cpp:55:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp:32:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp:33:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp:35:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp:37:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp:55:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.cpp:32:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.cpp:33:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.cpp:35:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.cpp:37:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.cpp:61:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp:31:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp:32:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp:34:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp:36:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp:60:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp:54:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp:55:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf(" unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp:57:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf(" %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp:59:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf(" unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp:84:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.cpp:41:67:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.cpp:42:73:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); return res; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.cpp:44:72:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_VOID(str,res) if (res != JVMTI_ERROR_NONE) { printf(str); printf("%d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.cpp:46:78:  [4] (format) printf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
#define JVMTI_ERROR_CHECK_EXPECTED_ERROR_VOID(str,res,err) if (res != err) { printf(str); printf("unexpected error %d\n",res); iGlobalStatus = 2; }
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.cpp:60:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.cpp:76:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(fmt, args);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.cpp:1153:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(error_msg, "JVMTIagent: getVerdict: %s event occured after VMDeath",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.cpp:1170:9:  [4] (format) vprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
        vprintf(format, ar);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/ExceptionCheckingJniEnv.cpp:187:7:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
      strcat(full_message, strs[i]);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.cpp:109:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(classNameBuffer, className);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.cpp:124:9:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
        strcpy(threadNameBuffer, info.name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.cpp:240:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file,"%s/%s.class",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:469:9:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
        sprintf(file,"%s/%s.class",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:556:4:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
   snprintf(buf, bufsize, PATH_FORMAT, DIR_NAME, redefineCnt, dir);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h:396:9:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.h:396:18:  [4] (format) _snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
#define snprintf _snprintf
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:150:12:  [4] (format) vsnprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    (void) vsnprintf(msg_buf, sizeof(msg_buf), format, ap);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:237:13:  [4] (format) vfprintf:
  If format strings can be influenced by an attacker, they can be exploited
  (CWE-134). Use a constant for the format specification.
    int x = vfprintf(stdout,format,ap);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:283:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(hex, buf);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.cpp:118:11:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    len = snprintf(NULL, 0, format, pMN->classSig, pMN->methodName, location) + 1;
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.cpp:131:5:  [4] (format) snprintf:
  If format strings can be influenced by an attacker, they can be exploited,
  and note that sprintf variations do not always \0-terminate (CWE-134). Use
  a constant for the format specification.
    snprintf(result, len, format, pMN->classSig, pMN->methodName, location);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.cpp:153:17:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                strcat(path, name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.cpp:166:25:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
                        strcat(path, name);
data/openjdk-16-16~14/test/jdk/java/nio/channels/spi/SelectorProvider/inheritedChannel/libInheritedChannel.c:184:5:  [4] (shell) execvp:
  This causes a new program to execute and is difficult to use safely
  (CWE-78). try using a library call that implements the same functionality
  if available.
    execvp(cmdv[0], cmdv);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:103:13:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
            wcscpy(testLocale, pName);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:134:9:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
        wcscpy(testUILang, pName);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:154:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(pName, lpLocaleStr);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:163:5:  [4] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer.
    wcscpy(pName, lpUILangStr);
data/openjdk-16-16~14/test/jdk/sun/management/jmxremote/bootstrap/exelauncher.c:65:6:  [4] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf.
     sprintf(cp_prop, "%s%s", CP_PROP, argv[2]);
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:156:13:  [4] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused).
            strcpy(s, domain);
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:158:13:  [4] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused).
            strcat(s, name);
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:345:29:  [4] (race) access:
  This usually indicates a security flaw. If an attacker can change anything
  along the path between the call to access() and the file's actual use
  (e.g., by moving files), the attacker can exploit the race condition
  (CWE-362/CWE-367!). Set up the correct permissions (e.g., using setuid())
  and try to open the file directly.
        ACCESS_ALLOWED_ACE *access;
data/openjdk-16-16~14/make/src/native/fixpath.c:250:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  tmpdir = getenv("TEMP");
data/openjdk-16-16~14/make/src/native/fixpath.c:391:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    debug_fixpath = (getenv("DEBUG_FIXPATH") != NULL);
data/openjdk-16-16~14/make/src/native/fixpath.c:550:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    rc = CreateProcess(NULL,
data/openjdk-16-16~14/make/src/native/fixpath.c:550:10:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    rc = CreateProcess(NULL,
data/openjdk-16-16~14/src/hotspot/os/aix/libo4.cpp:61:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
bool libo4::realpath(const char* file_name, char* resolved_name,
data/openjdk-16-16~14/src/hotspot/os/aix/libo4.hpp:80:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  static bool realpath(const char* file_name, char* resolved_name,
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:586:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *v = ::getenv("LIBPATH");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1325:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
               filename, ::getenv("LIBPATH"), ::getenv("LD_LIBRARY_PATH"), error_report);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1325:49:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
               filename, ::getenv("LIBPATH"), ::getenv("LD_LIBRARY_PATH"), error_report);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1424:35:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const ldr_cntrl = ::getenv("LDR_CNTRL");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1428:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const extshm = ::getenv("EXTSHM");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1435:46:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char* const aixthread_guardpages = ::getenv("AIXTHREAD_GUARDPAGES");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1569:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  char* rp = os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1588:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1600:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        rp = os::Posix::realpath(java_home_var, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1621:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
          rp = os::Posix::realpath((char *)dlinfo.dli_fname, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:2802:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4106:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = ::getenv("EXTSHM");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4130:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = ::getenv("XPG_SUS_ENV");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4144:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    p = ::getenv("QIBM_MULTI_THREADED");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4148:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = ::getenv("LDR_CNTRL");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4157:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  p = ::getenv("AIXTHREAD_GUARDPAGES");
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:729:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  return realpath(buffer, _exePath);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:295:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  const char *home_dir = ::getenv("HOME");
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:406:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *v = ::getenv("LD_LIBRARY_PATH");
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:487:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *l = ::getenv("JAVA_LIBRARY_PATH");
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:491:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *v = ::getenv("DYLD_LIBRARY_PATH");
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1687:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    rp = os::Posix::realpath(dli_fname, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1710:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1719:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        rp = os::Posix::realpath(java_home_var, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1753:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
          rp = os::Posix::realpath(dli_fname, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:2454:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:479:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *v = ::getenv("LD_LIBRARY_PATH");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2757:21:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    rp = os::Posix::realpath(dli_fname, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2779:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2791:25:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        rp = os::Posix::realpath(java_home_var, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2812:27:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
          rp = os::Posix::realpath(dli_fname, buf, buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:4668:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:789:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  return realpath(buffer, _exePath);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1318:18:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
char* os::Posix::realpath(const char* filename, char* outbuf, size_t outbuflen) {
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1331:15:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  char* p = ::realpath(filename, NULL);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1348:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
      p = ::realpath(filename, outbuf);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.hpp:109:16:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
  static char* realpath(const char* filename, char* outbuf, size_t outbuflen);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:204:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *alt_home_dir = ::getenv("_ALT_JAVA_HOME_DIR");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:257:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *path_str = ::getenv("PATH");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1365:19:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  void * result = LoadLibrary(name);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1883:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* java_home_var = ::getenv("JAVA_HOME");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:2862:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  int ran_num = os::random();
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:3708:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection((CRITICAL_SECTION*)pcrit_sect);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:3749:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
      EnterCriticalSection(&crit_sect);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5345:15:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
  BOOL rslt = CreateProcess(NULL,   // executable name - use command line
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5345:15:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
  BOOL rslt = CreateProcess(NULL,   // executable name - use command line
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.inline.hpp:85:3:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  InitializeCriticalSection(&_mutex);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.inline.hpp:101:3:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
  EnterCriticalSection(&_mutex);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:275:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* user = getenv("USERNAME");
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:969:10:  [3] (misc) AddAccessAllowedAce:
  This doesn't set the inheritance bits in the access control entry (ACE)
  header (CWE-732). Make sure that you set inheritance by hand if you wish it
  to inherit.
    if (!AddAccessAllowedAce(newACL, ACL_REVISION,
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:518:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
      ::EnterCriticalSection(&g_cs);
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:531:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  ::InitializeCriticalSection(&g_cs);
data/openjdk-16-16~14/src/hotspot/os/windows/windbghelp.cpp:95:20:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  g_dll_handle = ::LoadLibrary("DBGHELP.DLL");
data/openjdk-16-16~14/src/hotspot/os/windows/windbghelp.cpp:131:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
      ::EnterCriticalSection(&g_cs);
data/openjdk-16-16~14/src/hotspot/os/windows/windbghelp.cpp:144:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
  ::InitializeCriticalSection(&g_cs);
data/openjdk-16-16~14/src/hotspot/share/classfile/altHashing.cpp:39:45:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return hc != markWord::no_hash ? hc : os::random();
data/openjdk-16-16~14/src/hotspot/share/classfile/altHashing.cpp:49:24:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            (jint) os::random(),  // current thread isn't a java thread
data/openjdk-16-16~14/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp:804:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    i = os::random() % lgrp_spaces()->length();
data/openjdk-16-16~14/src/hotspot/share/gc/parallel/mutableNUMASpace.cpp:848:13:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    i = os::random() % lgrp_spaces()->length();
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp:67:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return (os::random() & 1) == 1;
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/heuristics/shenandoahAggressiveHeuristics.cpp:74:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return (os::random() & 1) == 1;
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeap.cpp:2972:62:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  if (ShenandoahAllocFailureALot && !cancelled_gc() && ((os::random() % 1000) > 950)) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp:272:12:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      (os::random() & 1) == 0) { // Simulate OOM every ~2nd slow-path call
data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/metaDebug.cpp:40:63:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      1+(long)((double)MetadataAllocationFailALotInterval*os::random()/(max_jint+1.0));
data/openjdk-16-16~14/src/hotspot/share/oops/symbol.cpp:52:59:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  _hash_and_refcount =  pack_hash_and_refcount((short)os::random(), refcount);
data/openjdk-16-16~14/src/hotspot/share/oops/symbol.cpp:102:59:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  _hash_and_refcount =  pack_hash_and_refcount((short)os::random(), PERM_REFCOUNT);
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:4471:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  return (os::random() & RANDOMIZED_DOMAIN_MASK) < (RANDOMIZED_DOMAIN / count);
data/openjdk-16-16~14/src/hotspot/share/prims/whitebox.cpp:296:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  int seed = os::random();
data/openjdk-16-16~14/src/hotspot/share/prims/whitebox.cpp:303:23:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    bool shrink = os::random() % 2L == 0;
data/openjdk-16-16~14/src/hotspot/share/prims/whitebox.cpp:306:32:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    size_t delta = (size_t)os::random() % magnitude;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3397:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char *buffer = ::getenv(name);
data/openjdk-16-16~14/src/hotspot/share/runtime/interfaceSupport.cpp:137:80:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        _fullgc_alot_counter = 1+(unsigned int)((double)FullGCALotInterval*os::random()/(max_jint+1.0));
data/openjdk-16-16~14/src/hotspot/share/runtime/interfaceSupport.cpp:155:86:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
          _scavenge_alot_counter = 1+(unsigned int)((double)ScavengeALotInterval*os::random()/(max_jint+1.0));
data/openjdk-16-16~14/src/hotspot/share/runtime/interfaceSupport.cpp:220:59:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    } else if (DeoptimizeRandom && (value & 0x1F) == (os::random() & 0x1F)) {
data/openjdk-16-16~14/src/hotspot/share/runtime/interfaceSupport.cpp:266:5:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    srand(ScavengeALotInterval * FullGCALotInterval);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:852:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
int os::random() {
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:948:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
      char *envvar = ::getenv(env_list[i]);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.hpp:758:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  static int random();                     // return 32bit pseudorandom number
data/openjdk-16-16~14/src/hotspot/share/runtime/synchronizer.cpp:1023:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    value = os::random();
data/openjdk-16-16~14/src/hotspot/share/runtime/synchronizer.cpp:2383:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  GVars.stw_random = os::random();
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:281:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  _hashStateX = os::random();
data/openjdk-16-16~14/src/hotspot/share/runtime/vmOperations.cpp:128:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    int tnum = os::random() & 0x3;
data/openjdk-16-16~14/src/hotspot/share/runtime/vmOperations.cpp:129:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    int fnum =  os::random() & 0x3;
data/openjdk-16-16~14/src/hotspot/share/services/memTracker.cpp:65:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  nmt_env_value = ::getenv(nmt_env_variable);
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:104:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* s = ::getenv("HOTSPOT_FATAL_ERROR_DURING_DYNAMIC_INITIALIZATION");
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:40:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        lc = getenv("LANG");
data/openjdk-16-16~14/src/java.base/share/native/launcher/main.c:146:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv(JLDEBUG_ENV_ENTRY) != NULL) {
data/openjdk-16-16~14/src/java.base/share/native/launcher/main.c:177:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            if (getenv(JLDEBUG_ENV_ENTRY)) {
data/openjdk-16-16~14/src/java.base/share/native/launcher/main.c:178:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                char *tmp = getenv("_JAVA_OPTIONS");
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:64:16:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
      handle = LoadLibrary("zip.dll");
data/openjdk-16-16~14/src/java.base/share/native/libjli/args.c:475:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *env = getenv(var_name);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:319:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char* cpath = getenv("CLASSPATH");
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:667:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *jvmtype = getenv("JDK_ALTERNATE_VM");
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:865:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                    envBuf = getenv(envName);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1073:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((env_in = getenv(ENV_ENTRY)) != NULL) {
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1773:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char *s = getenv("CLASSPATH");
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2237:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *jar_name = getenv(SPLASH_JAR_ENV_ENTRY);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2238:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *file_name = getenv(SPLASH_FILE_ENV_ENTRY);
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.c:116:8:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   if (getenv(JLDEBUG_ENV_ENTRY) != 0) {
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:322:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv(JLDEBUG_ENV_ENTRY) != 0)
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:199:13:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        if (realpath(jarfile, jarPath) == NULL) {
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:278:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (realpath(path, buf) != NULL) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:239:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char *s = getenv("PATH");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:482:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    tz = getenv("TZ");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:204:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (realpath(orig, out)) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:228:17:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
            r = realpath(path, out);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:330:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char* env_lang = getenv("LANG");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:331:34:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char* env_lc_all = getenv("LC_ALL");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:332:36:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        const char* env_lc_ctype = getenv("LC_CTYPE");
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:238:11:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    llp = getenv("LD_LIBRARY_PATH");
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:362:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        runpath = getenv(LD_LIBRARY_PATH);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:96:22:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
        char *path = realpath(info.dli_fname, buf);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:128:10:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (!realpath(name, real))
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:157:12:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    path = getenv("PATH");
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:969:9:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    if (realpath(path, resolved) == NULL) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.c:38:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        handle = LoadLibrary(path);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.c:45:22:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            handle = LoadLibrary(path);
data/openjdk-16-16~14/src/java.base/windows/native/libjimage/osSupport_windows.cpp:121:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&critical_section);
data/openjdk-16-16~14/src/java.base/windows/native/libjimage/osSupport_windows.cpp:129:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&critical_section);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/cmdtoargs.c:215:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv(JLDEBUG_ENV_ENTRY)) {
data/openjdk-16-16~14/src/java.base/windows/native/libjli/cmdtoargs.c:216:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            char *tmp = getenv("_JAVA_OPTIONS");
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:247:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                if (LoadLibrary(crtpath) == 0) {
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:264:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                if (LoadLibrary(crtpath) == 0) {
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:281:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                if (LoadLibrary(crtpath) == 0) {
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:388:19:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    if ((handle = LoadLibrary(jvmpath)) == 0) {
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:725:22:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        hSplashLib = LoadLibrary(libraryPath);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:784:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envValue = getenv("J2D_D3D");
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:789:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envValue = getenv("J2D_D3D_PRELOAD");
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:916:23:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            hVerify = LoadLibrary(libraryPath);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:925:21:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            hJava = LoadLibrary(libraryPath);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:934:27:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            hPreloadAwt = LoadLibrary(libraryPath);
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:863:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("IBMJAVA_PASSIVE") == NULL) {
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1669:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (!(immodifiers = getenv("XMODIFIERS"))) return True;
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:58:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        enumerate = getenv(ENV_ENUMERATE_PCM_SUBDEVICES);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiIn.c:93:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("JAVASOUND_ENABLE_MIDIIN") == NULL) {
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c:879:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        getenv("J2D_OGL_TEXRECT") != NULL)
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:1774:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("IMLIB_DEBUG")) {
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:1782:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("IMLIB_PRINT")) {
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:1785:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((start = getenv("IMLIB_START")) != NULL) {
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:1789:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv ("IMLIB_NOMLIB")) {
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/Trace.c:78:33:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *j2dTraceLevelString = getenv("J2D_TRACE_LEVEL");
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/Trace.c:91:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    j2dTraceFileName = getenv("J2D_TRACE_FILE");
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/TransformHelper.c:300:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("TXSTUB") != 0) {
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/TransformHelper.c:303:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        } else if (getenv("TXNOVIS") != 0) {
data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/HBShaper.c:222:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (!aat && (getenv("HB_NODEVTX") != NULL)) {
data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/freetypeScaler.c:262:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* props = getenv("FREETYPE_PROPERTIES");
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h:146:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
#define ft_getenv  getenv
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/cfftypes.h:330:16:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    FT_UInt32  random;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/cff/cffload.c:2131:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      if ( !subfont->random )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/cffdecode.c:1729:69:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            FT_UInt32*  randval = in_dict ? &decoder->cff->top_font.random
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/cffdecode.c:1730:72:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                                          : &decoder->current_subfont->random;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psintrp.c:2100:61:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                              ( ( decoder->current_subfont->random & 0xFFFF ) + 1 );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psintrp.c:2103:65:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                          cff_random( decoder->current_subfont->random );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psintrp.c:2239:57:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                          ( ( decoder->current_subfont->random & 0xFFFF ) + 1 );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psintrp.c:2242:61:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
                      cff_random( decoder->current_subfont->random );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/psobjs.c:2556:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    if ( !subfont->random )
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:326:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    forcemono = getenv("FORCEMONO");
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:327:17:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    forcegray = getenv("FORCEGRAY");
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:449:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("NOFSDITHER") == NULL) {
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:464:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("NOFSDITHER") == NULL) {
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:653:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            char *gammastr = getenv("HJGAMMA");
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:734:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        if (getenv("CMAPSIZE") != 0) {
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:735:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
            cmapsize = atoi(getenv("CMAPSIZE"));
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:757:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("VIRTCUBESIZE") != 0) {
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:758:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        k = atoi(getenv("VIRTCUBESIZE"));
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:536:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *useFC = getenv("USE_J2D_FONTCONFIG");
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:582:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    homeEnv = getenv("HOME");
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:955:31:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char* debugMinGlyphsStr = getenv("J2D_DEBUG_MIN_GLYPHS");
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/systemscale/systemScale.c:192:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *uiScale = getenv(name);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/OGLFuncs_md.h:117:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char *libGLPath = getenv("J2D_ALT_LIBGL_PATH"); \
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11SurfaceData.c:116:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("NO_AWT_MITSHM") == NULL &&
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11SurfaceData.c:117:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        getenv("NO_J2D_MITSHM") == NULL) {
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11SurfaceData.c:119:29:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char * permission = getenv("J2D_MITSHM_PERMISSION");
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11SurfaceData.c:130:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
          force = getenv("J2D_PIXMAPS");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt/awt/awt_LoadLibrary.c:124:5:  [3] (buffer) realpath:
  This function does not protect against buffer overflows, and some
  implementations can overflow internally (CWE-120/CWE-785!). Ensure that the
  destination buffer is at least of size MAXPATHLEN, andto protect against
  implementation problems, the input argument should also be checked to
  ensure it is no larger than MAXPATHLEN.
    realpath((char *)dlinfo.dli_fname, buf);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:232:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if ((forcedVisualStr = getenv("FORCEDEFVIS"))) {
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:684:9:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    if (getenv("_AWT_IGNORE_XKB") != NULL &&
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:685:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        strlen(getenv("_AWT_IGNORE_XKB")) > 0) {
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:696:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                     (getenv("DISPLAY") == NULL) ? ":0.0" : getenv("DISPLAY"));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:696:61:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
                     (getenv("DISPLAY") == NULL) ? ":0.0" : getenv("DISPLAY"));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c:766:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    gtk_modules_env = getenv ("GTK_MODULES");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.c:601:23:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    gtk_modules_env = getenv ("GTK_MODULES");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:444:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    value = getenv("_AWT_MAX_POLL_TIMEOUT");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:453:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    value = getenv("_AWT_FLUSH_TIMEOUT");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:461:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    value = getenv("_AWT_POLL_TRACING");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:466:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    value = getenv("_AWT_STATIC_POLL_TIMEOUT");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:475:13:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    value = getenv("_AWT_POLL_ALG");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:764:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        ptr = getenv(keystr);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XWindow.c:1180:10:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
   ptr = getenv("_AWT_USE_TYPE4_PATCH");
data/openjdk-16-16~14/src/java.desktop/windows/native/common/awt/systemscale/systemScale.cpp:40:25:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char *uiScale = getenv("J2D_UISCALE");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPipelineManager.cpp:39:27:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
static BOOL bNoHwCheck = (getenv("J2D_D3D_NO_HWCHECK") != NULL);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPipelineManager.cpp:601:18:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *pRas = getenv("J2D_D3D_RASTERIZER");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:98:15:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
        val = CreateProcess(0, pargs, 0, 0, TRUE,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:98:15:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
        val = CreateProcess(0, pargs, 0, 0, TRUE,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/WindowsFlags.cpp:75:24:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        char *d3dEnv = getenv("J2D_D3D");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Palette.cpp:263:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    } else if (getenv("FORCEGRAY")) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:696:32:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        HMODULE hUser32Dll = ::LoadLibrary(_T("user32.dll"));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.h:99:35:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    INLINE  CriticalSection() { ::InitializeCriticalSection(&rep); }
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.h:123:11:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        ::EnterCriticalSection(&rep);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Window.cpp:241:7:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    ::InitializeCriticalSection(&contentBitmapCS);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Window.cpp:2754:11:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        ::EnterCriticalSection(&contentBitmapCS);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Window.cpp:2765:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    ::EnterCriticalSection(&contentBitmapCS);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Window.cpp:2947:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    ::EnterCriticalSection(&contentBitmapCS);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_new.cpp:202:9:  [3] (random) srand:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        srand((unsigned int)time(NULL));
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:459:7:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    ::InitializeCriticalSection(&crit_sect);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:467:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    ::EnterCriticalSection(&crit_sect);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:505:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    ::EnterCriticalSection(&data.crit_sect);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiIn.cpp:177:7:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    ::InitializeCriticalSection(&crit_sect);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiIn.cpp:185:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    ::EnterCriticalSection(&crit_sect);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiIn.cpp:219:7:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    ::EnterCriticalSection(&data.crit_sect);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Util.c:60:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(lock);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Util.c:75:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection((CRITICAL_SECTION*) lock);
data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_sys.c:431:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&splash->lock);
data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_sys.c:446:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&splash->lock);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/EncodingSupport_md.c:77:28:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* env_lang = getenv("LANG");
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/EncodingSupport_md.c:78:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* env_lc_all = getenv("LC_ALL");
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/EncodingSupport_md.c:79:32:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const char* env_lc_ctype = getenv("LC_CTYPE");
data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/NativeFunc.h:33:25:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
#define GETLIB(libName) LoadLibrary(libName)
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:68:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char* trace = getenv("SSPI_BRIDGE_TRACE");
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/bridge/AccessBridgeCalls.c:65:35:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        theAccessBridgeInstance = LoadLibrary("WINDOWSACCESSBRIDGE-32");
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/bridge/AccessBridgeCalls.c:68:43:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                theAccessBridgeInstance = LoadLibrary("WINDOWSACCESSBRIDGE-64");
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/bridge/AccessBridgeCalls.c:70:35:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        theAccessBridgeInstance = LoadLibrary("WINDOWSACCESSBRIDGE");
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:46:30:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    const auto envfilePath = getenv(var);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:68:13:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
            InitializeCriticalSection(&receiveMemoryIPCLock);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:398:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection(&receiveMemoryIPCLock);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:83:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&sendMemoryIPCLock);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:262:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&sendMemoryIPCLock);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:257:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&sendMemoryIPCLock);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/j2secmod_md.c:68:15:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    hModule = LoadLibrary(libName);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/p11_md.c:98:15:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    hModule = LoadLibrary(libraryNameStr);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:386:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const unsigned char *random, int randomlen, int kmflag)
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:409:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    memcpy(privKeyBytes, random, randomlen);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:444:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const unsigned char* random, int randomlen, int kmflag)
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:457:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        random, randomlen, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:852:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const unsigned char* random, int randomLen, int kmflag, int timing)
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:866:9:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        random, randomLen, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecc_impl.h:258:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const unsigned char* random, int randomlen, int);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecc_impl.h:261:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const unsigned char* random, int randomlen, int, int timing);
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:78:15:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
char* trace = getenv("CAPI_TRACE");
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:127:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  if (init_libproc(getenv("LIBSAPROC_DEBUG") != NULL) != true) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:47:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    alt_root = getenv(SA_ALTROOT);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:37:16:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    alt_root = getenv(SA_ALTROOT);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:406:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* java_home = getenv("JAVA_HOME");
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:428:20:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  char* dyldpath = getenv("DYLD_LIBRARY_PATH");
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:144:18:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
  hsdis_handle = LoadLibrary(libname);
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:147:20:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    hsdis_handle = LoadLibrary(buffer);
data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/UnixSysInfo.cpp:34:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *value = ::getenv(name.c_str());
data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/UnixSysInfo.cpp:46:21:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    char *value = ::getenv(name.c_str());
data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/UnixSysInfo.cpp:55:14:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
    return ::getenv(name.c_str()) != 0;
data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/applauncher/WinLauncher.cpp:90:25:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    HMODULE dllHandle = LoadLibraryEx(dllFullPath.c_str(), NULL,
data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/msiwrapper/Executor.cpp:118:32:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
        JP_THROW(SysError(msg, CreateProcess));
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1040:22:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
        envOptions = getenv("_JAVA_JDWP_OPTIONS");
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/exec_md.c:45:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    ret = CreateProcess(0,                /* executable name */
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/exec_md.c:45:11:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    ret = CreateProcess(0,                /* executable name */
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:130:20:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
    void *result = LoadLibrary(name);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/mutex_md.h:47:25:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
#define mutexInit(m)    InitializeCriticalSection(m)
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/mutex_md.h:49:25:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
#define mutexLock(m)    EnterCriticalSection(m)
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:253:5:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
    InitializeCriticalSection(&criticalSection->cs);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:261:5:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
    EnterCriticalSection(&criticalSection->cs);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:1219:22:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
            if ((h = LoadLibrary("pdh.dll")) == NULL) {
data/openjdk-16-16~14/src/jdk.security.auth/windows/native/libjaas/nt.c:670:19:  [3] (misc) LoadLibraryEx:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
        hModule = LoadLibraryEx(TEXT("netmsg.dll"),
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logOutputList.cpp:79:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    size_t output_idx = os::random() % TestOutputCount;
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logOutputList.cpp:80:27:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    size_t levelnum = os::random() % LogLevel::Count;
data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:106:50:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const Metaspace::MetaspaceType msType = (os::random() % 100 < 10) ?
data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:123:33:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    const int start_index = os::random() % metaspaces;
data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:174:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
            int r = os::random() % 1000;
data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:176:27:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
              size = (os::random() % _chunk_geometry.medium_chunk_word_size) + _chunk_geometry.medium_chunk_word_size;
data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:178:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
              size = os::random() % 64;
data/openjdk-16-16~14/test/hotspot/gtest/memory/test_metaspace_allocation.cpp:218:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        allocating = os::random() % 5 < 4;
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:123:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    num = os::random();
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:207:66:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  bool allow_sep_change = (mods_filter & Allow_Sep_Mods) && (os::random() & 1) == 0;
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:208:66:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  bool allow_dot_change = (mods_filter & Allow_Dot_Path) && (os::random() & 1) == 0;
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:209:73:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  bool allow_dotdot_change = (mods_filter & Allow_Dot_Dot_Path) && (os::random() & 1) == 0;
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:218:36:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
      if (allow_sep_change && (os::random() & 3) == 3) {
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:219:21:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        int i = os::random() % (sizeof(sep_replacements) / sizeof(sep_replacements[0]));
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:226:68:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        if (allow_dotdot_change && (src > path_start + 1) && ((os::random() & 7) == 7)) {
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:237:72:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        } else if (allow_dot_change && (src > path_start + 1) && ((os::random() & 7) == 7)) {
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:244:26:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  while (is_dir && ((os::random() & 15) == 1)) {
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_bitMap_popcnt.cpp:85:20:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    int from = os::random() % range;
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_bitMap_popcnt.cpp:86:18:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    int to = os::random() % range;
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_bitMap_popcnt.cpp:94:14:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    if ((os::random() % 10) > 5) {
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_ostream.cpp:44:15:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    len = os::random() % 10;
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_ostream.cpp:46:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    len = MAX2(1, (int)(os::random() % len_lorem));
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_population_count.cpp:62:22:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
  for (T value = os::random() % step; value < max_val - step; value += step) {
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_quicksort.cpp:175:17:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
TEST(QuickSort, random) {
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_quicksort.cpp:177:25:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
    size_t length = os::random() % 100;
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_quicksort.cpp:182:29:  [3] (random) random:
  This function is not sufficiently random for security-related functions
  such as key and nonce creation (CWE-327). Use a more secure technique for
  acquiring random values.
        test_array[j] = os::random() % (length * 2);
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c:38:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             "-Djava.class.path=%s", getenv("CLASSPATH"));
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:233:19:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
  javaclasspath = getenv("CLASSPATH");
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/TLS/exestack-tls.c:45:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             "-Djava.class.path=%s", getenv("CLASSPATH"));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.cpp:69:17:  [3] (misc) InitializeCriticalSection:
  Exceptions can be thrown in low-memory situations. Use
  InitializeCriticalSectionAndSpinCount instead.
                InitializeCriticalSection((PCRITICAL_SECTION)mutex);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_mutex.cpp:76:9:  [3] (misc) EnterCriticalSection:
  On some versions of Windows, exceptions can be thrown in low-memory
  situations. Use InitializeCriticalSectionAndSpinCount instead.
        EnterCriticalSection((PCRITICAL_SECTION)mutex);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.cpp:154:27:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                dbghelp = LoadLibrary(path);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.cpp:167:35:  [3] (misc) LoadLibrary:
  Ensure that the full path to the library is specified, or current directory
  may be used (CWE-829, CWE-20). Use registry entry or GetWindowsDirectory to
  find library path, if you aren't already.
                        dbghelp = LoadLibrary(path);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:66:9:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    if (CreateProcess(NULL, launcher, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi)==0) {
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:66:9:  [3] (shell) CreateProcess:
  This causes a new process to execute and is difficult to use safely
  (CWE-78). Specify the application path in the first argument, NOT as part
  of the second, or embedded spaces could allow an attacker to force a
  different program to run.
    if (CreateProcess(NULL, launcher, NULL, NULL, FALSE, 0, NULL, NULL, &si, &pi)==0) {
data/openjdk-16-16~14/test/lib-test/jdk/test/lib/process/exejvm-test-launcher.c:36:38:  [3] (buffer) getenv:
  Environment variables are untrustable input if they can be set by an
  attacker. They can have any content and length, and the same variable can
  be set more than once (CWE-807, CWE-20). Check environment variables
  carefully before using them.
             "-Djava.class.path=%s", getenv("CLASSPATH"));
data/openjdk-16-16~14/make/src/native/fixpath.c:108:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*b+*u, add, addlen);
data/openjdk-16-16~14/make/src/native/fixpath.c:225:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char *files_to_delete[1024];
data/openjdk-16-16~14/make/src/native/fixpath.c:231:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[2048];
data/openjdk-16-16~14/make/src/native/fixpath.c:240:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char block[2048];
data/openjdk-16-16~14/make/src/native/fixpath.c:244:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  atin = fopen(in+1, "r");
data/openjdk-16-16~14/make/src/native/fixpath.c:266:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  atout = fopen(name, "w");
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/frame_aarch64.cpp:668:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1501:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[64];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1564:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[64];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:1677:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[64];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:2063:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char regs[32];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:2093:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char regs[32];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:2125:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char regs[32];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:2167:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char regs[32];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:4513:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char comment[64];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/macroAssembler_aarch64.cpp:4714:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char comment[64];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:171:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:176:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if (FILE *f = fopen("/proc/cpuinfo", "r")) {
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:178:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024], *p;
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:286:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "0x%02x:0x%x:0x%03x:%d", _cpu, _variant, _model, _revision);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:287:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (_model2) sprintf(buf+strlen(buf), "(0x%03x)", _model2);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:288:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_ASIMD) strcat(buf, ", simd");
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:289:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_CRC32) strcat(buf, ", crc");
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:290:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_AES)   strcat(buf, ", aes");
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:291:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_SHA1)  strcat(buf, ", sha1");
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:292:27:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_SHA2)  strcat(buf, ", sha256");
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:293:28:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_SHA512) strcat(buf, ", sha512");
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:294:29:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if (auxv & HWCAP_ATOMICS) strcat(buf, ", lse");
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp:40:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.hpp:41:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/arm/macroAssembler_arm.cpp:852:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[64];
data/openjdk-16-16~14/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp:45:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const static unsigned char Si[256] =
data/openjdk-16-16~14/src/hotspot/cpu/arm/stubRoutinesCrypto_arm.cpp:81:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const unsigned char S[256]={
data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_arm_32.cpp:278:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_ext_arm.hpp:40:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_ext_arm.hpp:41:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/ppc/copy_ppc.hpp:50:18:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  default: (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp:407:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_round_consts, sha256_round_consts, sizeof(sha256_round_table));
data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc_sha.cpp:962:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_round_consts, sha512_round_consts, sizeof(sha512_round_table));
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp:47:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ext_ppc.hpp:48:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ppc.cpp:176:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[(num_features+1) * 16]; // Max 16 chars per feature.
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ppc.cpp:434:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[500];
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ppc.cpp:435:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(info_file, "r");
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ppc.cpp:816:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char test_area[BUFFER_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/s390/assembler_s390.hpp:1543:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pc, ((unsigned char *)&instr)+sizeof(unsigned long)-len, len);
data/openjdk-16-16~14/src/hotspot/cpu/s390/copy_s390.hpp:861:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count);
data/openjdk-16-16~14/src/hotspot/cpu/s390/frame_s390.cpp:346:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[ 150 ];
data/openjdk-16-16~14/src/hotspot/cpu/s390/frame_s390.cpp:451:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char demangled_name[256];
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_ext_s390.hpp:47:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_ext_s390.hpp:48:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:316:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:327:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:647:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[buf_len];
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:649:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buf, march, hdr_len);
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:675:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(buf, &march[hdr_len], strlen(march)-hdr_len);
data/openjdk-16-16~14/src/hotspot/cpu/x86/assembler_x86.cpp:52:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char tuple_table[Assembler::EVEX_ETUP + 1][Assembler::AVX_512bit + 1] = {
data/openjdk-16-16~14/src/hotspot/cpu/x86/assembler_x86.cpp:8917:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(popa_code, begin_popa, popa_len);
data/openjdk-16-16~14/src/hotspot/cpu/x86/assembler_x86.cpp:8921:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(pusha_code, end_popa, pusha_len);
data/openjdk-16-16~14/src/hotspot/cpu/x86/assembler_x86.cpp:8926:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(vzup_code, end_pusha, vzup_len);
data/openjdk-16-16~14/src/hotspot/cpu/x86/assembler_x86.cpp:8941:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(end, src, src_len);
data/openjdk-16-16~14/src/hotspot/cpu/x86/bytes_x86.hpp:50:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&x, p, sizeof(T));
data/openjdk-16-16~14/src/hotspot/cpu/x86/bytes_x86.hpp:63:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, &x, sizeof(T));
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3926:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char f[9];
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3963:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char c[5];
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3970:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char f[9];
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4080:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char f[8];
data/openjdk-16-16~14/src/hotspot/cpu/x86/nativeInst_x86.cpp:228:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char patch[4];
data/openjdk-16-16~14/src/hotspot/cpu/x86/nativeInst_x86.cpp:510:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char code_buffer[5];
data/openjdk-16-16~14/src/hotspot/cpu/x86/nativeInst_x86.cpp:525:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char patch[4];
data/openjdk-16-16~14/src/hotspot/cpu/x86/nativeInst_x86.cpp:604:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   unsigned char patch[4];
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:6382:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst + 32 * ii,      src + 16 * ii, 16);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:6383:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst + 32 * ii + 16, src + 16 * ii, 16);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:552:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char               vendor_id[VENDOR_LENGTH];
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:618:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cpu_type_desc[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:631:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char cpu_detailed_desc_buffer[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:773:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[512];
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:1820:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char signature[13] = {0};
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:1827:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(signature, &registers[1], 12);
data/openjdk-16-16~14/src/hotspot/cpu/zero/copy_zero.hpp:47:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, from, count * HeapWordSize);
data/openjdk-16-16~14/src/hotspot/cpu/zero/vm_version_ext_zero.hpp:40:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_name[CPU_TYPE_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/cpu/zero/vm_version_ext_zero.hpp:41:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char              _cpu_desc[CPU_DETAILED_DESC_BUF_SIZE];
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:66:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _path[UNIX_PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:199:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[UNIX_PATH_MAX];          // socket file
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:200:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char initial_path[UNIX_PATH_MAX];  // socket file during setup
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:269:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ver_str[8];
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:270:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER);
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:282:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[max_len];
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:313:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              (atoi(buf) != ATTACH_PROTOCOL_VER)) {
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:314:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[32];
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:315:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION);
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:448:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[32];
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:449:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(msg, "%d\n", result);
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:493:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[UNIX_PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:566:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[PATH_MAX + 1];
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:569:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fn, ".attach_pid%d", os::current_process_id());
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:54:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH]; /* name of the identifier */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:96:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IDENTIFIER_LENGTH];  /* processor description (type/official name) */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IDENTIFIER_LENGTH];  /* processor description (type/official name) */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:259:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IDENTIFIER_LENGTH];  /* processor description (type/official name) */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:347:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char description[IDENTIFIER_LENGTH]; /* processor description (type/official name) */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:468:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:503:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:562:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:628:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:691:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hardwareid[CEC_ID_LEN];          /* CEC Identifier */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:707:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[IDENTIFIER_LENGTH];         /* name of the logical partition */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:770:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char hardwareid[CEC_ID_LEN];          /* CEC Identifier */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:813:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char name[MAXCORRALNAMELEN+1]; /* name of the Workload Partition */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:824:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char name[MAXCORRALNAMELEN+1]; /* name of the Workload Partition */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:847:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char wparname[MAXCORRALNAMELEN+1];  /* WPAR NAME */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:849:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[IDENTIFIER_LENGTH]; /* name of the structure element identifier */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:922:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IDENTIFIER_LENGTH];     /* name of the logical partition */
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:940:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char description[IDENTIFIER_LENGTH];  // processor description (type/official name)
data/openjdk-16-16~14/src/hotspot/os/aix/libperfstat_aix.hpp:953:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAXCORRALNAMELEN+1];  /* name of the Workload Partition */
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:912:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:916:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1550:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAXPATHLEN] = {0};
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:3308:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:3659:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:3688:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:3908:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy[1];
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4011:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4018:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4054:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int major = atoi(uts.version);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4056:23:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    const int minor = atoi(uts.release);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4059:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ver_str[20] = {0};
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:241:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2048];
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:243:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(procfile, "r")) == NULL) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:585:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exeName[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:586:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exePath[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:641:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:644:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (atoi(entry->d_name) != 0) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:662:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:666:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:677:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(_exeName, start, len);
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:689:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:694:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:725:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/aix/os_perf_aix.cpp:744:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  process_info->set_pid(atoi(_entry->d_name));
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:101:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IREAD|S_IWRITE),
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:302:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:369:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(".", O_RDONLY), result);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:790:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IREAD|S_IWRITE), result);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:847:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(filename, oflags, 0), result);
data/openjdk-16-16~14/src/hotspot/os/aix/porting_aix.cpp:367:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char funcname[256] = "";
data/openjdk-16-16~14/src/hotspot/os/aix/porting_aix.cpp:838:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dummy[1]; // Just needed to satisfy pthread_getthrds_np.
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:65:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _path[UNIX_PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:181:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[UNIX_PATH_MAX];          // socket file
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char initial_path[UNIX_PATH_MAX];  // socket file during setup
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ver_str[8];
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:251:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:263:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[max_len];
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:292:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              (atoi(buf) != ATTACH_PROTOCOL_VER)) {
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:293:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[32];
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:294:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[32];
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:418:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(msg, "%d\n", result);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:461:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[UNIX_PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[PATH_MAX + 1];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:456:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(buf, "/lib");
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:747:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1134:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char temp_path_storage[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char localbuf[MACH_MAXSYMLEN];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1307:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int file_descriptor= ::open(filename, O_RDONLY | O_NONBLOCK);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char os[100];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1547:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char release[100];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1556:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char osproductversion[100];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1560:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char build[100];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1605:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char model[100];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1612:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char machine[100];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1664:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAXPATHLEN] = {0};
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1680:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dli_fname[MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:2963:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3214:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXTHREADNAMESIZE];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3354:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3361:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = ::open(path, oflag, mode);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3422:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ::open(path, oflags, S_IREAD | S_IWRITE);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3603:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3610:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3636:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char * argv[4] = {"sh", "-c", cmd, NULL};
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3702:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char coreinfo[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_perf_bsd.cpp:322:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[PROC_PIDPATHINFO_MAXSIZE];
data/openjdk-16-16~14/src/hotspot/os/bsd/os_perf_bsd.cpp:451:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name_buf[128];
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:100:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IREAD|S_IWRITE),
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:307:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:373:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(".", O_RDONLY), result);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:795:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IREAD|S_IWRITE), result);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:873:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(filename, oflags), result);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:66:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _path[UNIX_PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:182:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[UNIX_PATH_MAX];          // socket file
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:183:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char initial_path[UNIX_PATH_MAX];  // socket file during setup
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ver_str[8];
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:251:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(ver_str, "%d", ATTACH_PROTOCOL_VER);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:263:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[max_len];
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:292:16:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
              (atoi(buf) != ATTACH_PROTOCOL_VER)) {
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:293:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[32];
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:294:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(msg, "%d\n", ATTACH_ERROR_BADVERSION);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[32];
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:418:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(msg, "%d\n", result);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:461:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[UNIX_PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:534:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fn[PATH_MAX + 1];
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:537:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fn, ".attach_pid%d", os::current_process_id());
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:122:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:137:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  cgroups = fopen(proc_cgroups, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:195:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  cgroup = fopen(proc_self_cgroup, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:212:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    hierarchy_id = atoi(hierarchy_id_str);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:246:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  mntinfo = fopen(proc_self_mountinfo, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_mount_point[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp_fs_type[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:260:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmproot[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:261:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpmount[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.cpp:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpcgroups[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:89:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char discard[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:110:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(file, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:167:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char variable[bufsize];                                                 \
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV2Subsystem_linux.cpp:223:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[MAXPATHLEN+1];
data/openjdk-16-16~14/src/hotspot/os/linux/decoder_linux.cpp:61:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = fopen(filepath, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zMountPoint_linux.cpp:73:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fd = fopen(PROC_SELF_MOUNTINFO, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.cpp:203:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.cpp:238:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  const int fd_anon = os::open(mountpoint.get(), O_TMPFILE|O_EXCL|O_RDWR|O_CLOEXEC, S_IRUSR|S_IWUSR);
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.cpp:260:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.cpp:264:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  const int fd = os::open(filename, O_CREAT|O_EXCL|O_RDWR|O_CLOEXEC, S_IRUSR|S_IWUSR);
data/openjdk-16-16~14/src/hotspot/os/linux/gc/z/zPhysicalMemoryBacking_linux.cpp:332:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* const file = fopen(filename, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:262:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fh = fopen("/proc/stat", "r")) == NULL) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fname[32];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:369:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fp = fopen(fname, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:943:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1121:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen("/proc/self/maps", "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1230:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stat[2048];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1233:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen("/proc/self/stat", "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1832:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int file_descriptor= ::open(filename, O_RDONLY | O_NONBLOCK);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2064:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_RDONLY);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2073:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[33];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2095:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[32];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2254:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2286:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(file, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2356:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* f = ::fopen("/proc/self/status", "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2357:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2553:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen("/proc/cpuinfo", "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2592:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf_level[60];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2593:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf_type[60];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2594:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf_size[60];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2595:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char hbuf_coherency_line_size[80];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2657:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen("/proc/cpuinfo", "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2660:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[256];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2734:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAXPATHLEN] = {0};
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2750:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char dli_fname[MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2972:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX+1];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2979:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(buf, O_CREAT | O_RDWR, S_IRWXU);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3477:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char vec[1];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3520:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char vec[stripe + 1];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3619:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char vec[1];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3810:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *fp = fopen("/proc/self/maps", "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3813:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char chars[257];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3854:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen("/proc/self/coredump_filter", "r+")) == NULL) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3908:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen("/proc/meminfo", "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3912:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[16];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:4202:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[128];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5163:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5613:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf [16]; // according to glibc manpage, 16 chars incl. '/0'
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5707:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[16];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5736:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5966:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stat[2048];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5968:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char proc_name[64];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5977:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(proc_name, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6033:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6040:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6060:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char * argv[4] = {"sh", "-c", cmd, NULL};
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6065:11:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
    pid = vfork();
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char core_pattern[core_pattern_len] = {0};
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6125:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int core_pattern_file = ::open("/proc/sys/kernel/core_pattern", O_RDONLY);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cwd[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6182:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int core_uses_pid_file = ::open("/proc/sys/kernel/core_uses_pid", O_RDONLY);
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:236:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2048];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:238:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen(procfile, "r")) == NULL) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:275:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((f = fopen("/proc/stat", "r")) == NULL) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[80];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:645:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exeName[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:646:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exePath[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:701:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:704:7:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  if (atoi(entry->d_name) != 0) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:722:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:726:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:737:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(_exeName, start, len);
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:749:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  buffer[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:754:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((fp = fopen(buffer, "r")) != NULL) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:785:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:804:25:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  process_info->set_pid(atoi(_entry->d_name));
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:986:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:990:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(buf, O_RDONLY, 0);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:100:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IRUSR|S_IWUSR),
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:161:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[TMP_BUFFER_LEN];
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:320:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:385:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(::open(".", O_RDONLY), result);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:537:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[MAXPATHLEN + 1];
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:655:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[24];
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:659:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen(fname, "r");
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:874:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IRUSR|S_IWUSR), result);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:952:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  RESTARTABLE(os::open(filename, oflags, 0), result);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char core_path[PATH_MAX];
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:189:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fd = os::open(dir, O_TMPFILE | O_RDWR, S_IRUSR | S_IWUSR);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:209:10:  [2] (tmpfile) mkstemp:
  Potential for temporary file vulnerability in some circumstances. Some
  older Unix-like systems create temp files with permission to write by all
  by default, so be sure to set the umask to override this. Also, some older
  Unix systems might fail to use O_EXCL when opening the file, so make sure
  that O_EXCL is used by the library (CWE-377).
    fd = mkstemp(fullname);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:614:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE* os::open(int fd, const char* mode) {
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:913:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[30];
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:997:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[NUM_IMPORTANT_SIGS + 1];
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1061:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[0x100];
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[20];
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:135:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pipe[pipe_name_max + 1];
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[32];
data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zSyscall_windows.cpp:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/os/windows/gc/z/zSyscall_windows.cpp:61:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/os/windows/include/jvm_md.h:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char d_name[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:369:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char counter_path[PDH_MAX_COUNTER_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:969:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char instanceIndexBuffer[32];
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:1289:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char           _exePath[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:1500:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char home_dir[MAX_PATH + 1];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:256:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:286:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(library_path, ";.");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:294:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:295:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[2 * MAX_PATH + 2 * sizeof(EXT_DIR) + sizeof(PACKAGE_DIR) + 1];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:666:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1115:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alt_dirname[4] = { 0, 0, 0, 0 };
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1160:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(dirp->path, "*.*");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1162:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(dirp->path, "\\*.*");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1214:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char path_buf[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1392:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(name, O_RDONLY | O_BINARY, 0);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1488:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char filename[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1599:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[1024];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1618:3:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  TCHAR kernel32_path[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1823:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tmp[64];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1825:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(tmp, "EXCEPTION_??");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1861:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char saved_jvm_path[MAX_PATH] = {0};
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:3221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:3401:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:3659:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4135:26:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  int unicode_path_len = MultiByteToWideChar(CP_ACP,
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4145:16:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
  int result = MultiByteToWideChar(CP_ACP,
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4437:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
int os::open(const char *path, int oflag, int mode) {
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4455:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE* os::open(int fd, const char* mode) {
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4473:5:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
    wcscat(wide_path, L"\\*");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4504:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return ::open(path, oflags, _S_IREAD | _S_IWRITE);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4970:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char filename[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4977:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(filename, O_WRONLY | O_CREAT | O_TRUNC, 0666);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5376:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:276:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[UNLEN+1];
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:543:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char root_path[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:544:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fs_type[MAX_PATH];
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:185:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr(), other.ptr(), other._num * sizeof(HMODULE));
data/openjdk-16-16~14/src/hotspot/os/windows/windbghelp.cpp:113:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&g_version, p, sizeof(API_VERSION));
data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/copy_bsd_x86.inline.hpp:86:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp:806:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[8];
data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp:895:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char kern_osrelease[256];
data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/os_bsd_x86.cpp:900:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        if (atoi(kern_osrelease) >= OS_X_10_9_0_KERNEL_MAJOR_VERSION) {
data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/os_bsd_zero.cpp:231:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/copy_linux_aarch64.inline.hpp:113:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to, from, count * sizeof(HeapWord));
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/copy_linux_x86.inline.hpp:86:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/os_linux_x86.cpp:625:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char data[2048] = {0}; // lines should fit in 2K buf
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/os_linux_x86.cpp:627:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE *fp = fopen("/proc/cpuinfo", "r");
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp:243:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/os_linux_zero.cpp:245:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "caught unhandled signal %d", sig);
data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp:45:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/copy_windows_x86.inline.hpp:49:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  (void)memcpy(to, from, count * HeapWordSize);
data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp:156:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ExceptionHandlerInstr[16];  // jmp HandleExceptionFromCodeCache
data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/os_windows_x86.cpp:264:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4590:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[32];
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4593:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "[...]");
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4790:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    result = atoi(start);         // Convert the string to an integer
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:5300:12:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  intval = atoi(token);
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:982:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ident = (char *)NodeClassNames[i];
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:987:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *ident = (char *)NodeClassNames[j];
data/openjdk-16-16~14/src/hotspot/share/adlc/arena.cpp:158:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( new_ptr, c_old, old_size );
data/openjdk-16-16~14/src/hotspot/share/adlc/dfa.cpp:622:77:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  if( debug_output1 ) { fprintf(fp, "// top level chain rules for: %s \n", (char *)NodeClassNames[i]); } // %%%%% Explanation
data/openjdk-16-16~14/src/hotspot/share/adlc/dfa.cpp:624:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  chain_rule(fp, "   ", (char *)NodeClassNames[i], zeroCost, "Invalid",
data/openjdk-16-16~14/src/hotspot/share/adlc/dict2.cpp:36:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char shft[MAXID + 1] = {1,2,3,4,5,6,7,1,2,3,4,5,6,7,1,2,3,4,5,6,7};
data/openjdk-16-16~14/src/hotspot/share/adlc/dict2.cpp:142:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( _bin, d._bin, sizeof(bucket)*_size );
data/openjdk-16-16~14/src/hotspot/share/adlc/dict2.cpp:146:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( _bin[i]._keyvals, d._bin[i]._keyvals,_bin[i]._cnt*2*sizeof(void*));
data/openjdk-16-16~14/src/hotspot/share/adlc/forms.hpp:549:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char string_buffer[STRING_BUFFER_LENGTH];
data/openjdk-16-16~14/src/hotspot/share/adlc/forms.hpp:550:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char external_buffer[STRING_BUFFER_LENGTH];
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1498:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[buflen], *s=buf;
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1521:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(s," && ");
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1529:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(s," == "); s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3416:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if( !cnt ) strcpy( buf, "_kids[0]->" );
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3421:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if( !cnt ) strcpy( buf, "_kids[1]->" );
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3428:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    if( !cnt ) strcpy(buf,"_leaf");
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:368:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      (ADF._fp = fopen(ADF._name, action)) == NULL) {
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:342:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char temp[32];
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:347:15:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    templen = sprintf(temp, "%d", res_cycles[i]);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:529:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(args, "0x%0*x, 0x%0*x, %*d",
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:1069:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(inst_prefix, "inst%d_",   inst_position);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:1071:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(receiver,    "inst%d->", inst_position);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:1167:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(left_reg_index,",inst%d_idx%d", (int)left_index, left_op_index);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:1176:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char right_reg_index[18] = ",instXXXX_idxXXXX";
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:1180:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(right_reg_index,",inst%d_idx%d", (int)right_index, right_op_index);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:2507:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char idxbuf[buflen]; char *ib = idxbuf; idxbuf[0] = '\0';
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:2508:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nbuf  [buflen]; char *nb = nbuf;   nbuf[0]   = '\0';
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:2509:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char opbuf [buflen]; char *ob = opbuf;  opbuf[0]  = '\0';
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:412:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(full_name, "AOT ", 4);
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:413:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(full_name+4, stub_name, len);
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:654:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(meta_name, klass_name, klass_len);
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:656:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&meta_name[klass_len + 1], method_name, method_name_len);
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:657:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&meta_name[klass_len + 1 + method_name_len], signature_name, signature_name_len);
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:998:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char * const descriptors[2] = {descriptor1, descriptor2};
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:1008:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:1098:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-16-16~14/src/hotspot/share/aot/aotLoader.cpp:154:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(cp, AOTLibrary, len);
data/openjdk-16-16~14/src/hotspot/share/aot/aotLoader.cpp:171:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char library[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/aot/aotLoader.cpp:262:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/c1/c1_CFGPrinter.cpp:65:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char file_name[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/c1/c1_Compilation.cpp:698:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fileStream stream(fopen("c1_compile_only", "wt"));
data/openjdk-16-16~14/src/hotspot/share/c1/c1_Compilation.cpp:712:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fileStream stream(fopen(".hotspot_compiler", "at"));
data/openjdk-16-16~14/src/hotspot/share/c1/c1_Runtime1.cpp:660:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[2 * jintAsStringSize + len];
data/openjdk-16-16~14/src/hotspot/share/c1/c1_Runtime1.cpp:661:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(message, "Index %d out of bounds for length %d", index, a->length());
data/openjdk-16-16~14/src/hotspot/share/c1/c1_Runtime1.cpp:668:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[16];
data/openjdk-16-16~14/src/hotspot/share/c1/c1_Runtime1.cpp:669:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(message, "%d", index);
data/openjdk-16-16~14/src/hotspot/share/ci/ciEnv.cpp:1264:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/ci/ciEnv.cpp:1267:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = os::open(buffer, O_RDWR | O_CREAT | O_TRUNC, 0666);
data/openjdk-16-16~14/src/hotspot/share/ci/ciEnv.cpp:1269:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE* replay_data_file = os::open(fd, "w");
data/openjdk-16-16~14/src/hotspot/share/ci/ciEnv.cpp:1282:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/ci/ciEnv.cpp:1285:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = os::open(buffer, O_RDWR | O_CREAT | O_TRUNC, 0666);
data/openjdk-16-16~14/src/hotspot/share/ci/ciEnv.cpp:1287:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      FILE* inline_data_file = os::open(fd, "w");
data/openjdk-16-16~14/src/hotspot/share/ci/ciMethod.cpp:203:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_code, me->code_base(), code_size());
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:128:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _stream = fopen(filename, "rt");
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:154:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(_buffer, "1 2 foo 4 bar 0x9 \"this is it\"");
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:867:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:870:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:873:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:876:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:879:21:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        int value = atoi(string_value);
data/openjdk-16-16~14/src/hotspot/share/ci/ciTypeFlow.cpp:834:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.cpp:2827:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(m->compressed_linenumber_table(),
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.cpp:4054:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_nonstatic_oop_maps, blocks, sizeof(OopMapBlock) * nof_blocks);
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.cpp:4081:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dst, _nonstatic_oop_maps, sizeof(OopMapBlock) * _nonstatic_oop_map_count);
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.cpp:5223:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[1000];
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.cpp:6058:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char addr_buf[20];
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileStream.cpp:52:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_buffer_start, _buffer_start, length());
data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.cpp:54:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(file, O_RDONLY, S_IREAD);
data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.cpp:58:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _file = os::open(fd, "r");
data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.cpp:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errmsg[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.hpp:59:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char                _line[_line_buf_size];  // The buffer that holds the current line. Some characters in
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:163:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char version_string[10] = "";
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:252:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int file_handle = os::open(path, 0, 0);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:298:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_buf[128];
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:793:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char canonical_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:957:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[256] = "";
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:984:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:985:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:1004:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:1005:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:1500:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char modules_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderHierarchyDCmd.cpp:84:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _branches[max_depth];
data/openjdk-16-16~14/src/hotspot/share/classfile/compactHashtable.cpp:241:13:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _fd = os::open(filename, O_RDONLY | O_BINARY, 0);
data/openjdk-16-16~14/src/hotspot/share/classfile/compactHashtable.cpp:268:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char info[100];
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2311:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(buf, "Redefined)");
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2315:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(buf, "Native Method)");
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2325:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf + (int)strlen(buf), "Unknown Source)");
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2329:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf + (int)strlen(buf), "(nmethod " INTPTR_FORMAT ")", (intptr_t)nm);
data/openjdk-16-16~14/src/hotspot/share/classfile/loaderConstraints.cpp:339:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(new_loaders, p->loaders(), sizeof(ClassLoaderData*) * p->num_loaders());
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:319:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:521:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:690:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-16-16~14/src/hotspot/share/classfile/symbolTable.cpp:417:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stack_buf[ON_STACK_BUFFER_LENGTH];
data/openjdk-16-16~14/src/hotspot/share/classfile/symbolTable.cpp:433:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stack_buf[ON_STACK_BUFFER_LENGTH];
data/openjdk-16-16~14/src/hotspot/share/classfile/verifier.cpp:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/classfile/verifier.cpp:86:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/code/codeBlob.cpp:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stub_id[256];
data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.cpp:866:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                      memcpy((void*)&TopSizeArray[used_topSizeBlocks], (void*)&TopSizeArray[i], sizeof(TopSizeBlk));
data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.cpp:908:27:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                          memcpy((void*)&TopSizeArray[j], (void*)&TopSizeArray[i], sizeof(TopSizeBlk));
data/openjdk-16-16~14/src/hotspot/share/code/compressedStream.cpp:78:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_new_buffer, _buffer, _position);
data/openjdk-16-16~14/src/hotspot/share/code/dependencies.cpp:782:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char xn[12]; sprintf(xn, "x%d", j);
data/openjdk-16-16~14/src/hotspot/share/code/dependencies.cpp:782:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      char xn[12]; sprintf(xn, "x%d", j);
data/openjdk-16-16~14/src/hotspot/share/code/nmethod.cpp:832:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(speculations_begin(), speculations, speculations_len);
data/openjdk-16-16~14/src/hotspot/share/code/nmethod.cpp:2059:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(scopes_pcs_begin(), pcs, size);
data/openjdk-16-16~14/src/hotspot/share/code/nmethod.cpp:2078:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(scopes_data_begin(), buffer, size);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:554:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[2000];
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:911:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name_buffer[256];
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:940:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name_buffer, "C1 CompilerThread%d", i);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:997:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name_buffer[256];
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:1928:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  file_name[4*K];
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:1942:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fp = fopen(file_name, "wt");
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:2385:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char current_method[CompilerCounters::cmname_buffer_length];
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:2625:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tier_name[256];
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:2628:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(tier_name, "Tier%d", tier);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.hpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char _current_method[cmname_buffer_length];
data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.cpp:210:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int partial_fd = open(partial_file, O_RDONLY);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.cpp:304:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[4 * K];
data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.hpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          _context_buffer[100];
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerDirectives.cpp:519:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(set->_modified, src->_modified, sizeof(src->_modified));
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:382:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char command[33];
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:452:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char flag[256];
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:511:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char value[256];
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:528:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buffer[2][256];
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:532:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char value[512] = "";
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:611:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char option[256]; // stores flag for Type (1) and type of Type (2)
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:635:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errorbuf[1024] = {0};
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:703:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* stream = fopen(cc_file(), "rt");
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:706:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char token[1024];
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:726:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char token[1024];
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:770:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[1024];
data/openjdk-16-16~14/src/hotspot/share/compiler/directivesParser.cpp:93:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int file_handle = os::open(filename, 0, 0);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:70:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char          _option_buf[512];
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:272:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if ((fp = fopen(file, "r")) == NULL) {
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:278:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char line[500]; // don't write lines that are too long in your source files!
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:571:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buffer[64] = { 0, };
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:649:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[buflen];
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:807:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:808:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:815:3:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  strcat(p, "/lib/");
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:248:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char class_name[256] = {0};
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:249:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char method_name[256] = {0};
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:250:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char sig[1024] = {0};
data/openjdk-16-16~14/src/hotspot/share/compiler/oopMap.cpp:119:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(addr, write_stream()->buffer(), write_stream()->position());
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.cpp:417:85:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
G1ArchiveAllocator* G1ArchiveAllocator::create_allocator(G1CollectedHeap* g1h, bool open) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.cpp:420:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  G1ArchiveAllocator* result =  new G1ArchiveAllocator(g1h, open);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.hpp:254:49:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  G1ArchiveAllocator(G1CollectedHeap* g1h, bool open) :
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.hpp:255:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _open(open),
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.hpp:270:74:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static G1ArchiveAllocator* create_allocator(G1CollectedHeap* g1h, bool open);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.hpp:297:62:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static inline void set_range_archive(MemRegion range, bool open);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:138:73:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
inline void G1ArchiveAllocator::set_range_archive(MemRegion range, bool open) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:141:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                     open ? "open" : "closed",
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Allocator.inline.hpp:144:25:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  uint8_t const value = open ? G1ArchiveRegionMap::OpenArchive : G1ArchiveRegionMap::ClosedArchive;
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:510:54:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
void G1CollectedHeap::begin_archive_alloc_range(bool open) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:513:69:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _archive_allocator = G1ArchiveAllocator::create_allocator(this, open);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:559:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                                            bool open) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:633:11:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      if (open) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.cpp:654:55:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    G1ArchiveAllocator::set_range_archive(curr_range, open);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1CollectedHeap.hpp:721:67:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  bool alloc_archive_regions(MemRegion* range, size_t count, bool open);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp:947:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[BufLen];
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad0[DEFAULT_CACHE_LINE_SIZE];
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad1[DEFAULT_CACHE_LINE_SIZE - sizeof(TaskQueueEntryChunk*)];
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:152:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad2[DEFAULT_CACHE_LINE_SIZE - sizeof(TaskQueueEntryChunk*) - sizeof(size_t)];
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.hpp:155:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad4[DEFAULT_CACHE_LINE_SIZE - sizeof(size_t)];
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HotCardCache.hpp:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_before[DEFAULT_CACHE_LINE_SIZE];
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1HotCardCache.hpp:82:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_after[DEFAULT_CACHE_LINE_SIZE];
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1RemSetSummary.cpp:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_rs_threads_vtimes, other->_rs_threads_vtimes, sizeof(double) * _num_vtimes);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/sparsePRT.cpp:74:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(cards, _cards, cards_num() * sizeof(card_elem_t));
data/openjdk-16-16~14/src/hotspot/share/gc/shared/ageTable.cpp:51:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char age_name[10];
data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorage.cpp:738:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[256];
data/openjdk-16-16~14/src/hotspot/share/gc/shared/plab.hpp:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      head[32];
data/openjdk-16-16~14/src/hotspot/share/gc/shared/plab.hpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char      tail[32];
data/openjdk-16-16~14/src/hotspot/share/gc/shared/ptrQueue.hpp:264:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[DEFAULT_CACHE_LINE_SIZE - sizeof(size_t)]; // Use name as padding.
data/openjdk-16-16~14/src/hotspot/share/gc/shared/satbMarkQueue.cpp:295:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[SATB_PRINTER_BUFFER_SIZE];
data/openjdk-16-16~14/src/hotspot/share/gc/shared/taskqueue.cpp:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dashes[max_width + 1];
data/openjdk-16-16~14/src/hotspot/share/gc/shared/taskqueue.hpp:92:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char * const _names[last_stat_id];
data/openjdk-16-16~14/src/hotspot/share/gc/z/zStat.cpp:909:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         _buffer[_buffer_size];
data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp:226:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char what[20];
data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp:230:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(what, "indy#%d", decode_indy_index());
data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp:232:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(what, "condy");
data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp:246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char argbuf[80];
data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp:251:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(argbuf + pos, "...");
data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp:255:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(argbuf+pos, "%d", arg_index(i));
data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeTracer.cpp:196:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[40];
data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeTracer.cpp:210:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[40];
data/openjdk-16-16~14/src/hotspot/share/interpreter/interpreterRuntime.cpp:622:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1000];
data/openjdk-16-16~14/src/hotspot/share/interpreter/interpreterRuntime.cpp:1313:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(handler, buffer->insts_begin(), insts_size);
data/openjdk-16-16~14/src/hotspot/share/interpreter/linkResolver.cpp:742:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-16-16~14/src/hotspot/share/interpreter/linkResolver.cpp:848:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-16-16~14/src/hotspot/share/interpreter/linkResolver.cpp:909:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-16-16~14/src/hotspot/share/interpreter/linkResolver.cpp:1005:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg[200];
data/openjdk-16-16~14/src/hotspot/share/interpreter/linkResolver.cpp:1270:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[500];
data/openjdk-16-16~14/src/hotspot/share/interpreter/linkResolver.cpp:1465:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-16-16~14/src/hotspot/share/interpreter/oopMapCache.cpp:405:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)_bit_mask, (void *)from->_bit_mask,
data/openjdk-16-16~14/src/hotspot/share/interpreter/oopMapCache.cpp:420:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*) _bit_mask[0], (void*) from->_bit_mask[0],
data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/bytecodeInterpreter.cpp:1567:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char message[jintAsStringSize];                                          \
data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/bytecodeInterpreter.cpp:1570:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(message, "%d", index);                                       \
data/openjdk-16-16~14/src/hotspot/share/interpreter/zero/bytecodeInterpreter.cpp:2475:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[200];
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1124:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_buffer, orig_stream->buffer(), orig_stream_length);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1452:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(p->data, new_stream->buffer(), stream_len);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:110:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error_buffer[ERROR_MSG_BUFFER_SIZE];
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrJniMethod.cpp:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pid_buf[32] = { 0 };
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:75:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(old_byte_array->byte_at_addr(0), class_data, class_data_len);
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:99:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char error_buffer[ERROR_MSG_BUFFER_SIZE];
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:141:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_bytes, new_byte_array->byte_at_addr(0), (size_t)new_bytes_length);
data/openjdk-16-16~14/src/hotspot/share/jfr/jni/jfrUpcalls.cpp:177:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_bytes, new_byte_array->byte_at_addr(0), (size_t)new_bytes_length);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:43:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[20];
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.hpp:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _buffer[OBJECT_SAMPLE_DESCRIPTION_BUFFER_SIZE];
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrPeriodic.cpp:216:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char pid_buf[16];
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hash_buf[40];
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp:49:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return path != NULL ? os::open(path, O_CREAT | O_RDWR, S_IREAD | S_IWRITE) : invalid_fd;
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.cpp:275:22:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool JfrChunkWriter::open() {
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunkWriter.hpp:46:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  bool open();
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:61:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char _path_buffer[JVM_MAXPATHLEN] = { 0 };
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:82:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return os::open(path, O_CREAT | O_RDWR, S_IREAD | S_IWRITE);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:387:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char date_time_buffer[32] = { 0 };
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:167:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  return _chunkwriter->open();
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/stacktrace/jfrStackTrace.cpp:40:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*lhs_frames, rhs_frames, length * sizeof(JfrStackFrame));
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrBuffer.cpp:159:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(to->pos(), current_top, actual_size);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrMemorySpace.inline.hpp:646:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_node->pos(), old->pos(), used);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:420:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(cur->pos(), (void*)cur_pos, used);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:458:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(shelved->pos(), (void*)cur_pos, (size_t)used);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrStorage.cpp:493:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer->pos(), (void*)cur_pos, used);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/storage/jfrVirtualMemory.cpp:528:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(const_cast<u1*>(_reserved_low), low, block_size);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrBlob.cpp:34:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(const_cast<u1*>(_data), checkpoint, size);
data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrEncoders.hpp:98:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, len);
data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrEncoders.hpp:120:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, src, len);
data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrMemoryWriterHost.inline.hpp:34:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, buf, (size_t)len); // no encoding
data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrStorageAdapter.hpp:207:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_storage, _start, previous_pos_offset + used);
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmci.cpp:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmci.cpp:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCodeInstaller.hpp:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _static_buffer[stack_size];
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompilerToVM.cpp:276:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(reconstituted_code + (bci + 1), s.bcp()+1, len-1);
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp:113:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(serialized_properties, ba->byte_at_addr(0), serialized_properties_len);
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp:203:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char message[256];
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp:312:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char message[256];
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp:453:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest, HotSpotJVMCI::resolve(src)->byte_at_addr(offset), length);
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp:464:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(HotSpotJVMCI::resolve(dest)->byte_at_addr(offset), src, length);
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp:476:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(HotSpotJVMCI::resolve(dest)->long_at_addr(offset), src, length * sizeof(jlong));
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciEnv.cpp:605:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[max_msg_size];
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.cpp:464:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.cpp:542:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.hpp:304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256]; \
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.hpp:313:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256]; \
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.hpp:322:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256]; \
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.hpp:331:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256]; \
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmci_globals.cpp:79:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/libadt/dict.cpp:38:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char shft[MAXID] = {1,2,3,4,5,6,7,1,2,3,4,5,6,7,1,2,3,4,5,6};
data/openjdk-16-16~14/src/hotspot/share/libadt/dict.cpp:150:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( (void*)_bin, (void*)d._bin, sizeof(bucket)*_size );
data/openjdk-16-16~14/src/hotspot/share/libadt/dict.cpp:154:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy( _bin[i]._keyvals, d._bin[i]._keyvals,_bin[i]._cnt*2*sizeof(void*));
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:373:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char errbuf[512];
data/openjdk-16-16~14/src/hotspot/share/logging/logDecorations.cpp:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/openjdk-16-16~14/src/hotspot/share/logging/logDecorations.hpp:35:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _decorations_buffer[DecorationsBufferSize];
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:272:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _stream = os::fopen(_file_name, FileOpenMode);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:361:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _stream = os::fopen(_file_name, FileOpenMode);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.hpp:47:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char         _pid_str[PidBufferSize];
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.hpp:48:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char         _vm_start_time_str[StartTimeBufferSize];
data/openjdk-16-16~14/src/hotspot/share/logging/logFileStreamOutput.cpp:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stdoutmem[sizeof(LogStdoutOutput)];
data/openjdk-16-16~14/src/hotspot/share/logging/logFileStreamOutput.cpp:38:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char stderrmem[sizeof(LogStderrOutput)];
data/openjdk-16-16~14/src/hotspot/share/logging/logOutput.cpp:136:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(result[*result_size], subset, sizeof(*subset) * LogTag::MaxTags);
data/openjdk-16-16~14/src/hotspot/share/logging/logOutput.cpp:233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-16-16~14/src/hotspot/share/logging/logSelection.cpp:347:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/hotspot/share/logging/logSelectionList.cpp:46:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[256];
data/openjdk-16-16~14/src/hotspot/share/logging/logStream.cpp:69:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(newbuf, _buf, _pos + 1); // ..including trailing zero
data/openjdk-16-16~14/src/hotspot/share/logging/logStream.cpp:94:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_buf + _pos, s, len);
data/openjdk-16-16~14/src/hotspot/share/logging/logStream.hpp:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char _smallbuf[64];
data/openjdk-16-16~14/src/hotspot/share/logging/logTagSet.cpp:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[vwrite_buffer_size];
data/openjdk-16-16~14/src/hotspot/share/logging/logTagSet.cpp:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TagSetBufferSize];
data/openjdk-16-16~14/src/hotspot/share/logging/logTagSet.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[TagSetBufferSize];
data/openjdk-16-16~14/src/hotspot/share/memory/allocation.inline.hpp:140:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_addr, old_addr, MIN2(old_length, new_length) * sizeof(E));
data/openjdk-16-16~14/src/hotspot/share/memory/archiveBuilder.cpp:476:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dest, src, bytes);
data/openjdk-16-16~14/src/hotspot/share/memory/arena.cpp:383:16:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    if (n > 0) memcpy(copy, old_ptr, n);
data/openjdk-16-16~14/src/hotspot/share/memory/arena.cpp:411:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( new_ptr, c_old, old_size );
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:157:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(&header_version[JVM_IDENT_MAX-9], "%08x", hash);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:312:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, ent->manifest(), ent->manifest_size());
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:619:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p, manifest, manifest_size);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:930:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(archive_name, O_RDONLY | O_BINARY, 0);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:972:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(archive_name, O_RDONLY | O_BINARY, 0);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1066:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expected_ident[JVM_IDENT_MAX];
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1120:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(_full_path, O_RDONLY | O_BINARY, 0);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1159:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = os::open(_full_path, O_RDWR | O_CREAT | O_TRUNC | O_BINARY, 0444);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1281:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((char*)buffer) + curr_offset, oopmaps->at(i)._oopmap, oopmaps->at(i)._oopmap_size_in_bytes);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.hpp:209:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  _jvm_ident[JVM_IDENT_MAX];  // identifier string of the jvm that created this dump
data/openjdk-16-16~14/src/hotspot/share/memory/guardedMemory.cpp:36:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(innerp, ptr, len);
data/openjdk-16-16~14/src/hotspot/share/memory/heap.cpp:151:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, &segmap_template[0], end - beg);
data/openjdk-16-16~14/src/hotspot/share/memory/heap.cpp:156:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, &segmap_template[1], n_bulk);
data/openjdk-16-16~14/src/hotspot/share/memory/heap.cpp:159:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(p, &segmap_template[1], q-p);
data/openjdk-16-16~14/src/hotspot/share/memory/heap.hpp:111:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char  segmap_template[free_sentinel+1];
data/openjdk-16-16~14/src/hotspot/share/memory/heapShared.cpp:216:70:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                                           GrowableArray<MemRegion> *open) {
data/openjdk-16-16~14/src/hotspot/share/memory/heapShared.cpp:239:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    copy_open_archive_heap_objects(open);
data/openjdk-16-16~14/src/hotspot/share/memory/heapShared.hpp:275:67:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                                        GrowableArray<MemRegion> *open);
data/openjdk-16-16~14/src/hotspot/share/memory/metaspace/virtualSpaceNode.cpp:221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char err[256];
data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceShared.cpp:710:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dstvtable, srcvtable, sizeof(intptr_t) * n);
data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceShared.cpp:1308:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char class_list_path_str[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/memory/padded.hpp:46:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_buf_[PADDING_SIZE(T, alignment)];
data/openjdk-16-16~14/src/hotspot/share/memory/padded.hpp:56:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_buf_[PADDING_SIZE(T, alignment)];
data/openjdk-16-16~14/src/hotspot/share/memory/padded.hpp:63:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _pad_buf[pad_size];
data/openjdk-16-16~14/src/hotspot/share/oops/constMethod.cpp:78:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)_stackmap_data->adr_at(0), (void*)sd, length);
data/openjdk-16-16~14/src/hotspot/share/oops/constMethod.cpp:376:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)a->adr_at(0), (void*)from->adr_at(0), length);
data/openjdk-16-16~14/src/hotspot/share/oops/constMethod.hpp:477:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(code_base(), code, code_size());
data/openjdk-16-16~14/src/hotspot/share/oops/constantPool.cpp:1851:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char str[128];
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:649:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_state, bb->_state, _state_len*sizeof(CellTypeState));
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:2151:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg_buffer[512];
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:2154:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg_buffer2[512];
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:2746:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char hash_buf[40];
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:706:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char addr_buf[20];
data/openjdk-16-16~14/src/hotspot/share/oops/metadata.cpp:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1537:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)newm(), (void*)m(), sizeof(Method));
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1540:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newcm, m->constMethod(), sizeof(ConstMethod));
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1552:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(newm->code_base(), new_code, new_code_length);
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1555:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->compressed_linenumber_table(),
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1561:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->method_parameters_start(),
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1567:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->checked_exceptions_start(),
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1573:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->exception_table_start(),
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1579:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newm->localvariable_table_start(),
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:1588:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void*)stackmap_data->adr_at(0),
data/openjdk-16-16~14/src/hotspot/share/oops/methodData.cpp:102:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[100];
data/openjdk-16-16~14/src/hotspot/share/oops/methodData.cpp:132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-16-16~14/src/hotspot/share/oops/methodData.cpp:803:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(data(), speculation, speculation_len);
data/openjdk-16-16~14/src/hotspot/share/oops/objArrayKlass.cpp:111:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&new_str[idx], name_str, len * sizeof(char));
data/openjdk-16-16~14/src/hotspot/share/oops/oop.cpp:64:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100];
data/openjdk-16-16~14/src/hotspot/share/oops/symbol.cpp:60:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_body, name, length);
data/openjdk-16-16~14/src/hotspot/share/opto/block.cpp:1360:8:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  case open:
data/openjdk-16-16~14/src/hotspot/share/opto/block.cpp:1511:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (e->state() != CFGEdge::open) continue;
data/openjdk-16-16~14/src/hotspot/share/opto/block.cpp:1554:32:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (e->state() != CFGEdge::open) continue;
data/openjdk-16-16~14/src/hotspot/share/opto/block.cpp:1608:39:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    } else if (e->state() == CFGEdge::open) {
data/openjdk-16-16~14/src/hotspot/share/opto/block.hpp:752:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    open,               // initial edge state; unprocessed
data/openjdk-16-16~14/src/hotspot/share/opto/block.hpp:759:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _state(open), _from_pct(from_pct), _to_pct(to_pct) {
data/openjdk-16-16~14/src/hotspot/share/opto/buildOopMap.cpp:188:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( _callees, flow->_callees, sizeof(short)*max_size);
data/openjdk-16-16~14/src/hotspot/share/opto/buildOopMap.cpp:189:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy( _defs   , flow->_defs   , sizeof(Node*)*max_size);
data/openjdk-16-16~14/src/hotspot/share/opto/callnode.cpp:361:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[50];
data/openjdk-16-16~14/src/hotspot/share/opto/callnode.cpp:524:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[500];
data/openjdk-16-16~14/src/hotspot/share/opto/callnode.cpp:1036:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[100];
data/openjdk-16-16~14/src/hotspot/share/opto/callnode.hpp:104:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char * const names[TypeFunc::Parms+1];
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2069:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "<OptoReg::%d>", (int)reg);
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2087:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf,"L%d",lidx);  // No register binding yet
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2089:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(buf,"Special");
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2095:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buf,"L%d",lidx); // No register binding yet
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2102:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf,"L%d",lidx); // No register binding yet
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:218:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_worked) != 0)    strcat(buf, ",worked");
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:219:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_failed) != 0)    strcat(buf, ",failed");
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:220:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_disabled) != 0)  strcat(buf, ",disabled");
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:221:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_virtual) != 0)   strcat(buf, ",virtual");
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:222:53:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
  if ((flags & Compile::_intrinsic_both) != 0)      strcat(buf, ",nonvirtual");
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char flagsbuf[100];
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:4558:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char output[1024];
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:2065:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-16-16~14/src/hotspot/share/opto/graphKit.cpp:2075:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-16-16~14/src/hotspot/share/opto/idealGraphPrinter.cpp:438:40:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      print_prop("idealOpcode", (const char *)NodeClassNames[node->as_Mach()->ideal_Opcode()]);
data/openjdk-16-16~14/src/hotspot/share/opto/idealGraphPrinter.cpp:479:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer, "P%d", index);
data/openjdk-16-16~14/src/hotspot/share/opto/idealGraphPrinter.cpp:495:11:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
          sprintf(buffer, "%d", value);
data/openjdk-16-16~14/src/hotspot/share/opto/idealGraphPrinter.hpp:90:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128];
data/openjdk-16-16~14/src/hotspot/share/opto/indexSet.cpp:244:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(new_block->words(), block->words(), sizeof(uint32_t) * words_per_block);
data/openjdk-16-16~14/src/hotspot/share/opto/library_call.cpp:397:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/openjdk-16-16~14/src/hotspot/share/opto/library_call.cpp:467:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1000];
data/openjdk-16-16~14/src/hotspot/share/opto/machnode.cpp:783:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[100];
data/openjdk-16-16~14/src/hotspot/share/opto/output.cpp:1957:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_bundle_use_elements, Pipeline_Use::elaborated_elements, sizeof(Pipeline_Use::elaborated_elements));
data/openjdk-16-16~14/src/hotspot/share/opto/output.cpp:2007:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_bundle_use_elements,
data/openjdk-16-16~14/src/hotspot/share/opto/parse2.cpp:1339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prob_str_buf[30];
data/openjdk-16-16~14/src/hotspot/share/opto/parse2.cpp:2848:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[256];
data/openjdk-16-16~14/src/hotspot/share/opto/phaseX.cpp:391:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)this, (void*)&nh, sizeof(*this));
data/openjdk-16-16~14/src/hotspot/share/opto/superword.cpp:3680:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char blanks[101];
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1559:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[40], buf2[40];
data/openjdk-16-16~14/src/hotspot/share/opto/type.cpp:1841:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[80], buf2[80];
data/openjdk-16-16~14/src/hotspot/share/opto/type.hpp:813:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char * const ptr_msg[lastPTR];
data/openjdk-16-16~14/src/hotspot/share/prims/jniCheck.cpp:429:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(orig_result, carray, sz);
data/openjdk-16-16~14/src/hotspot/share/prims/jniCheck.cpp:490:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/prims/jniCheck.cpp:498:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char as_chars[256];
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:2624:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(code, method->code_base(), method->code_size());
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:3575:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:3582:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[1024];
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:352:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(writeable_address(length), annos->adr_at(0), length);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:648:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:984:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(p+1, bcp+1, len-1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:807:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*name_ptr, name, len);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3422:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(*function_table,(JavaThread::current())->get_jni_functions(),sizeof(jniNativeInterface));
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.cpp:494:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&_event_callbacks, callbacks, byte_cnt);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.cpp:1228:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(si, &(sin->info), sizeof(jvmtiStackInfo));
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.cpp:1232:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(fi, sin->info.frame_buffer, frames_size);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExport.cpp:986:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p->data, _curr_data, _curr_len);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExport.cpp:1011:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(*_data_ptr, _curr_data, _curr_len);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExport.cpp:2636:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024] = {0};
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExport.cpp:2637:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExport.hpp:428:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[64];
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:165:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(ext_funcs[i].errors, _ext_functions->at(i)->errors,
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.hpp:335:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char data[1];
data/openjdk-16-16~14/src/hotspot/share/prims/nativeLookup.cpp:313:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dll_name[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/prims/nativeLookup.cpp:316:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char ebuf[32];
data/openjdk-16-16~14/src/hotspot/share/prims/unsafe.cpp:667:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-16-16~14/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:173:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[VALUE_MAXLEN];
data/openjdk-16-16~14/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:177:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(buf, "<null>");
data/openjdk-16-16~14/src/hotspot/share/runtime/abstract_vm_version.cpp:295:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char line[500];
data/openjdk-16-16~14/src/hotspot/share/runtime/abstract_vm_version.cpp:296:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, "r");
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:423:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[bufsz];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:664:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char version_str[256];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1006:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char version[256];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1028:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char tagset_buffer[max_tagset_size];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1066:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[BUFLEN+1];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1144:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value[BUFLEN + 1];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1145:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value2[BUFLEN + 1];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1298:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stripped_argname[BUFLEN+1]; // +1 for '\0'
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1301:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char version[256];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1323:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char locked_message_buf[BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1367:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* stream = fopen(file_name, "rb");
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1378:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char token[1024];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2067:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1024];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2386:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(module_name, patch_mod_tail, module_len);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2528:28:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          options = (char*)memcpy(NEW_C_HEAP_ARRAY(char, len2, mtArguments), pos+1, len2);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2588:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
          memcpy(name, tail, len);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2749:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char version[256];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3148:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char from[3] = {separator, separator, '\0'};
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3149:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char to  [2] = {separator, '\0'};
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3162:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3420:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = ::open(file_name, O_RDONLY);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3567:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char jvm_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.cpp:1876:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[100];
data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.cpp:2476:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[20];
data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.cpp:2477:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "reason%d", reason);
data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.cpp:2486:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[20];
data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.cpp:2487:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(buf, "action%d", action);
data/openjdk-16-16~14/src/hotspot/share/runtime/deoptimization.cpp:2582:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char name[1*K];
data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlag.cpp:526:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kind[buffer_size];
data/openjdk-16-16~14/src/hotspot/share/runtime/memprofiler.cpp:76:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    _log_fp = fopen(log_name , "w+");
data/openjdk-16-16~14/src/hotspot/share/runtime/mutex.cpp:278:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(_name, "UNKNOWN");
data/openjdk-16-16~14/src/hotspot/share/runtime/mutex.hpp:81:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[MUTEX_NAME_LEN];            // Name of mutex/monitor
data/openjdk-16-16~14/src/hotspot/share/runtime/mutex.hpp:214:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _padding[PADDING_LEN];
data/openjdk-16-16~14/src/hotspot/share/runtime/mutex.hpp:226:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _padding[PADDING_LEN];
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:433:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char klass_name[256];
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:434:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmp_sig_name[16];
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:536:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:780:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ptr, memblock, MIN2(size, memblock_size));
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1258:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
FILE* os::fopen(const char* path, const char* mode) {
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1259:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char modified_mode[20];
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1262:18:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* file = ::fopen(path, modified_mode);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.hpp:510:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static int open(const char *path, int oflag, int mode);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.hpp:511:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static FILE* open(int fd, const char* mode);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.hpp:512:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  static FILE* fopen(const char* path, const char* mode);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:372:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char intbuf[40];
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:378:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char intbuf[40];
data/openjdk-16-16~14/src/hotspot/share/runtime/relocator.cpp:463:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst_addr, src_addr, where);
data/openjdk-16-16~14/src/hotspot/share/runtime/relocator.cpp:464:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dst_addr + where + hole_sz,
data/openjdk-16-16~14/src/hotspot/share/runtime/relocator.cpp:584:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_code_array, code_array(), code_length());
data/openjdk-16-16~14/src/hotspot/share/runtime/relocator.cpp:587:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_code_array, method()->code_base(), code_length());
data/openjdk-16-16~14/src/hotspot/share/runtime/relocator.cpp:619:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_overwrite, addr_at(bci + ilen + delta), -delta);
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2742:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char blob_id[256];
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2798:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(_saved_code, buffer, length);
data/openjdk-16-16~14/src/hotspot/share/runtime/synchronizer.cpp:127:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         _pad_prefix[OM_CACHE_LINE_SIZE];
data/openjdk-16-16~14/src/hotspot/share/runtime/synchronizer.cpp:921:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char         _pad_prefix[OM_CACHE_LINE_SIZE];
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:1091:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char java_runtime_name[128] = "";
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:1092:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char java_runtime_version[128] = "";
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:1093:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char java_runtime_vendor_version[128] = "";
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:1094:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char java_runtime_vendor_vm_bug_url[128] = "";
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:2920:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[8];
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ebuf[1024] = "";
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4805:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[32];
data/openjdk-16-16~14/src/hotspot/share/runtime/vframeArray.hpp:154:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char                _valid[RegisterMap::reg_count];
data/openjdk-16-16~14/src/hotspot/share/runtime/vm_version.cpp:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1024];
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp:146:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _name[name_length_max+1];
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp:147:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _arg[arg_count_max][arg_length_max+1];
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp:156:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(_name, name, len);
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp:174:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(_arg[i], arg, len);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:231:7:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
      strcpy(_value._unit, "ns");
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:276:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(_value._unit, "ns");
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.hpp:52:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _unit[3];
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticCommand.cpp:754:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char comma[2] = {0,0};
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.cpp:207:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[buflen];
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.cpp:208:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char argbuf[argbuflen];
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.cpp:237:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[buflen];
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:470:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer() + position(), s, len);
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:489:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer() + position(), s, to_write);
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:496:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer() + position(), s, len);
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2053:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char base_path[JVM_MAXPATHLEN] = {'\0'};
data/openjdk-16-16~14/src/hotspot/share/services/heapDumperCompression.cpp:75:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/hotspot/share/services/heapDumperCompression.cpp:76:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/services/heapDumperCompression.cpp:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/hotspot/share/services/management.cpp:178:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(support, &_optional_support, sizeof(jmmOptionalSupport));
data/openjdk-16-16~14/src/hotspot/share/services/memTracker.cpp:57:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char nmt_env_variable[buffer_size];
data/openjdk-16-16~14/src/hotspot/share/services/memTracker.cpp:62:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char value[buffer_size];
data/openjdk-16-16~14/src/hotspot/share/services/memoryManager.cpp:304:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest->before_gc_usage_array(), _last_gc_stat->before_gc_usage_array(), len);
data/openjdk-16-16~14/src/hotspot/share/services/memoryManager.cpp:305:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dest->after_gc_usage_array(), _last_gc_stat->after_gc_usage_array(), len);
data/openjdk-16-16~14/src/hotspot/share/services/runtimeService.cpp:71:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char capabilities[65];
data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp:68:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[TEMP_BUF_SIZE] = {'\0'};
data/openjdk-16-16~14/src/hotspot/share/utilities/bitMap.cpp:688:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(buffer, _map, size_in_bytes());
data/openjdk-16-16~14/src/hotspot/share/utilities/copy.cpp:152:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&tmp, cur_src, sizeof(T));
data/openjdk-16-16~14/src/hotspot/share/utilities/copy.cpp:162:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cur_dst, &tmp, sizeof(T));
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:199:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char buf[16];
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:421:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[256];
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:661:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:678:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:740:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&g_stored_assertion_context, context, sizeof(ucontext_t));
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.hpp:186:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  typedef char PASTE_TOKENS(STATIC_ASSERT_DUMMY_TYPE_, __LINE__)[ \
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:58:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((void*)&_section_hdr, (const void*)&shdr, sizeof(shdr));
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:171:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _file = fopen(filepath, "r");
data/openjdk-16-16~14/src/hotspot/share/utilities/exceptions.cpp:247:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char msg[max_msg_size];
data/openjdk-16-16~14/src/hotspot/share/utilities/formatBuffer.hpp:66:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _buffer[bufsz];
data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions.cpp:200:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char type2char_tab[T_CONFLICT+1] = {
data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions.hpp:676:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char type2char_tab[T_CONFLICT+1];     // Map a BasicType to a jchar
data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp:114:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open _open
data/openjdk-16-16~14/src/hotspot/share/utilities/nativeCallStack.cpp:102:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char    buf[1024];
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:116:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(buffer, result, result_len);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:126:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:222:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[40];
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:247:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[buffer_length];
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:350:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer + buffer_pos, s, write_len);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:414:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  pid_text[32];
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:513:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char timestr[32];
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:520:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _file = fopen(file_name, "w");
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:530:11:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  _file = fopen(file_name, opentype);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:958:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char buf[4096];
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:1028:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer + buffer_pos, s, len);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:1106:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(&server.sin_addr, host->h_addr_list[0], host->h_length);
data/openjdk-16-16~14/src/hotspot/share/utilities/utf8.cpp:223:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(p, "\\u%04x", c);
data/openjdk-16-16~14/src/hotspot/share/utilities/utf8.cpp:280:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
              char utf8_buffer[4];
data/openjdk-16-16~14/src/hotspot/share/utilities/utf8.cpp:515:7:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      sprintf(p, "\\u%04x", c);
data/openjdk-16-16~14/src/hotspot/share/utilities/virtualizationSupport.cpp:40:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char host_information[300];
data/openjdk-16-16~14/src/hotspot/share/utilities/virtualizationSupport.cpp:41:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char extended_resource_info_at_startup[600];
data/openjdk-16-16~14/src/hotspot/share/utilities/virtualizationSupport.cpp:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ebuf[1024];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char signame_buf[64];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:246:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:434:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1088:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1253:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(buf, mode, 0666);
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1354:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1444:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msgbuf[64];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1486:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char signal_name[64];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1571:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE* replay_data_file = os::open(fd, "w");
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1658:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char buffer[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.hpp:42:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char        _detail_msg[1024];
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.hpp:74:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char coredump_message[O_BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[BUFLEN];
data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp:168:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(new_ptr, old_ptr, old_len);
data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp:176:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(push_ptr, tag, tag_len);
data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp:351:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[200];
data/openjdk-16-16~14/src/java.base/aix/native/libjli/java_md_aix.c:31:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char dladdr_buffer[0x8000];
data/openjdk-16-16~14/src/java.base/aix/native/libnio/ch/AixPollPort.c:164:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-16-16~14/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stack_buf[1024];
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[2048];
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fn[32];
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:91:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(fn, "r");
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:140:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fn[32];
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:156:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fd = open(fn, O_RDONLY)) < 0) {
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:215:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(args, cmdline, cmdlen + 1);
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:254:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen("/proc/stat", "r");
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:103:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[BUFLEN];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:126:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[BUFLEN];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:261:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[BUFLEN];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:516:29:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                            char buf[BUFLEN];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:574:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                char buf[BUFLEN];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:627:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFLEN];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:642:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[BUFLEN];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/HostLocaleProviderAdapter_md.c:761:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[BUFLEN];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char languageString[LOCALEIDLENGTH];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char localeString[LOCALEIDLENGTH];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:178:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char tmpScript[4];
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:181:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmpScript, scriptRegion + 1, 4);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:183:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(atMark + 1, tmpScript, 4);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:337:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char dst[16]; // big enough for INET6
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:405:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];    /* Used for %d of an int - 16 is plenty */
data/openjdk-16-16~14/src/java.base/macosx/native/libnet/DefaultProxySelector.c:197:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uri, cproto, protoLen);
data/openjdk-16-16~14/src/java.base/macosx/native/libnet/DefaultProxySelector.c:198:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uri + protoLen, "://", 3);
data/openjdk-16-16~14/src/java.base/macosx/native/libnet/DefaultProxySelector.c:199:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uri + protoLen + 3, chost, hostLen + 1);
data/openjdk-16-16~14/src/java.base/macosx/native/libnet/DefaultProxySelector.c:257:37:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                    char hostNameBuffer[BUFFER_SIZE];
data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/MacOSXNativeDispatcher.c:50:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char chars_buf[(PATH_MAX + 1) * 2];     // utf16 + zero padding
data/openjdk-16-16~14/src/java.base/share/native/include/jvmticmlr.h:112:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char message[50];
data/openjdk-16-16~14/src/java.base/share/native/libjava/Class.c:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/java.base/share/native/libjava/ClassLoader.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/java.base/share/native/libjava/ClassLoader.c:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sourceBuf[1024];
data/openjdk-16-16~14/src/java.base/share/native/libjava/ClassLoader.c:160:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/java.base/share/native/libjava/ClassLoader.c:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sourceBuf[1024];
data/openjdk-16-16~14/src/java.base/share/native/libjava/ClassLoader.c:227:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/java.base/share/native/libjava/ClassLoader.c:279:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c:157:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char msg[256];
data/openjdk-16-16~14/src/java.base/share/native/libjava/check_version.c:36:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/openjdk-16-16~14/src/java.base/share/native/libjava/check_version.c:37:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "JVM interface version mismatch: expecting %d, got %d.",
data/openjdk-16-16~14/src/java.base/share/native/libjava/io_util.c:78:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stackBuf[BUF_SIZE];
data/openjdk-16-16~14/src/java.base/share/native/libjava/io_util.c:150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char stackBuf[BUF_SIZE];
data/openjdk-16-16~14/src/java.base/share/native/libjava/io_util.c:207:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.c:106:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.c:132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:186:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uncompressed, decompressed_resource, (size_t) uncompressed_size);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:222:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uncompressed_resource, data, header_size + 2); //+ cp count
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:241:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uncompressed_resource, string, str_length);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:282:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                memcpy(fullpkg, pkg, str_length);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:285:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                                memcpy(uncompressed_resource, pkg_base, len);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:295:29:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                            memcpy(uncompressed_resource, clazz, clazz_length);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:304:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(uncompressed_resource, desc_string, desc_length);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:317:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uncompressed_resource, data, len);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:334:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(uncompressed_resource, data, size);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:347:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uncompressed_resource, data, (size_t) remain);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:285:35:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
ImageFileReader* ImageFileReader::open(const char* name, bool big_endian) {
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:293:36:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (reader == NULL || !reader->open()) {
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:375:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
bool ImageFileReader::open() {
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.hpp:453:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    static ImageFileReader* open(const char* name, bool big_endian = Endian::is_big_endian());
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.hpp:468:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bool open();
data/openjdk-16-16~14/src/java.base/share/native/libjimage/jimage.cpp:62:47:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    ImageFileReader* jfile = ImageFileReader::open(name);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/jimage.cpp:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullpath[IMAGE_MAX_PATH];
data/openjdk-16-16~14/src/java.base/share/native/libjimage/jimage.cpp:131:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&fullpath[index], module_name, moduleNameLen);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/jimage.cpp:134:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&fullpath[index], name, nameLen);
data/openjdk-16-16~14/src/java.base/share/native/libjli/args.c:51:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(rv, begin, len);
data/openjdk-16-16~14/src/java.base/share/native/libjli/args.c:309:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4096];
data/openjdk-16-16~14/src/java.base/share/native/libjli/args.c:378:12:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fptr = fopen(arg, "r");
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:245:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jvmpath[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:246:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jrepath[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:247:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jvmcfg[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:929:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmp, options, numOptions * sizeof(JavaVMOption));
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1050:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    env_entry[MAXNAMELEN + 24] = ENV_ENTRY "=";
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1677:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, arg, optLen);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1678:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p + optLen, value, valueLen);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1736:33:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    *nargv++ = (char *) JLI_WildcardExpandClasspath(argv[i+1]);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:1768:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char home[MAXPATHLEN]; /* application home */
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2077:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[MAXPATHLEN+30];
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2090:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    jvmCfg = fopen(jvmCfgName, "r");
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2092:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char cfgName[strlen(jvmCfgName)+10];
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2094:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      jvmCfg = fopen(cfgName, "r");
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2197:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(newKnownVMs, knownVMs, knownVMsLimit * sizeof(struct vmdesc));
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.c:180:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(str, beg, len);
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.c:200:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, sl->elements[i], len);
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.c:223:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, sl->elements[i], len);
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.h:104:41:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define JLI_Open                        open
data/openjdk-16-16~14/src/java.base/share/native/libjli/manifest_info.h:65:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CH(b, n) (((unsigned char *)(b))[n])
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:290:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            (void) memcpy(eb, cp, ENDHDR);
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:248:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(filename, wildcard, wildlen-1);
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:249:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(filename+wildlen-1, basename, baselen+1);
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:2032:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[257];           /* for holding manufactured argument lists */
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:2602:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(new_registers, registers,
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:2697:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[5], *p;         /* actually [2] is big enough */
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:3468:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result[i].modifies, masks[i].modifies, bitmask_size * sizeof(int));
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:3484:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result[i].modifies, masks[i].modifies, bitmask_size * sizeof(int));
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:3505:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char space[CCSegSize];
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:3811:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buffer_space[256];
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:3827:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(buffer, p, length);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:139:26:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        int wfname_len = MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS,
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:147:13:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        if (MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS,
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:166:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return open(fname, flags, 0);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:320:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[4];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[READBLOCKSZ];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:370:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(endbuf, buf + i, ENDHDR);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:415:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loc64[ZIP64_LOCHDR];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:518:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(zip->metanames[i], name, length);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:588:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char endbuf[ENDHDR];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:608:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char end64buf[ZIP64_ENDHDR];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:798:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:851:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errbuf[256];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1054:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ze->name, cen + CENHDR, nlen);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1064:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ze->extra+2, extra, elen);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1104:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ze->comment, cen + CENHDR + nlen + elen, clen);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1323:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char loc[LOCHDR];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1414:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[BUF_SIZE];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1496:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[1024];
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.h:68:30:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
#define CH(b, n) (((unsigned char *)(b))[n])
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char          java[PATH_MAX + 1];    /* path to java binary  */
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:197:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char jarPath[PATH_MAX + 1];
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:317:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(path, O_RDONLY);
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:319:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[CHUNK_SIZE];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:569:38:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            pid_t childpid = (pid_t) atoi(ptr->d_name);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:624:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fn[32];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:631:10:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fp = fopen(fn, "r");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:673:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fn[32];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:674:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char exePath[PATH_MAX];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:675:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char prargs[PRARGSZ + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:266:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(p, path, pathsize);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:325:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[1024];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:354:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ebuf[128];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:376:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *tty = fopen("/dev/tty", "w");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:432:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, *a, len);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:458:17:  [2] (race) vfork:
  On some old systems, vfork() permits race conditions, and it's very
  difficult to use correctly (CWE-362). Use fork() instead.
    resultPid = vfork();
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:491:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *buf, buf1[16];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:492:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *hlpargs[2];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:549:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf+offset, c->pdir, sp.dirlen);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:52:25:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define fileopen        fopen
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:212:21:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        RESTARTABLE(open(pathname, O_RDONLY), fd);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:255:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(ETC_TIMEZONE_FILE, "r")) != NULL) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:256:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char line[256];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:290:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char linkbuf[PATH_MAX+1];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:312:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    RESTARTABLE(open(DEFAULT_ZONEINFO_FILE, O_RDONLY), fd);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:350:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[256];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:353:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(ETC_ENVIRONMENT_FILE, "r")) != NULL) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:373:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mapfilename[PATH_MAX + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:374:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[256];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:386:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tz_buf, tz, tz_len);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:395:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(mapfilename, "/lib/tzmappings");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:396:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((tzmapf = fopen(mapfilename, "r")) == NULL) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sign, buf[32];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:564:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sign, buf[32];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/UnixFileSystem_md.c:98:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char canonicalPath[PATH_MAX];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:212:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[PATH_MAX + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aix_fd_dir[32];     /* the pid has at most 19 digits */
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:251:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char expanded_file[PATH_MAX];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:262:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(expanded_file, dir, dirlen);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:265:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(expanded_file + dirlen, file, filelen);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/io_util_md.c:157:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int devnull = open("/dev/null", O_WRONLY);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/io_util_md.h:70:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open64 open
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:366:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char tmp_path[PATH_MAX];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:379:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char list[258];
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:499:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/unix/native/libjimage/osSupport_unix.cpp:41:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return ::open(path, 0);
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:167:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[PATH_MAX + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:228:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char jpath[PATH_MAX + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:488:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char libjava[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:583:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX+1];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:610:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char jrePath[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md.c:611:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char splashPath[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:122:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[PATH_MAX + 2], *real;
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:139:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cwdbuf[PATH_MAX+2];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:152:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[PATH_MAX+2];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:170:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char dir[2*PATH_MAX];
data/openjdk-16-16~14/src/java.base/unix/native/libjli/java_md_common.c:230:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    buffer[PATH_MAX];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:250:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char *tmpbuf[512];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:363:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uri, cproto, protoLen);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:364:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uri + protoLen, "://", 3);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:365:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(uri + protoLen + 3, chost, hostLen + 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet4AddressImpl.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[NI_MAXHOST + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet4AddressImpl.c:65:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(hostname, "localhost");
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet4AddressImpl.c:148:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(next, iterator, sizeof(struct addrinfo));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet4AddressImpl.c:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[NI_MAXHOST + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet4AddressImpl.c:340:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sendbuf[1500], recvbuf[1500];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet4AddressImpl.c:380:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(icmp->icmp_data, &tv, sizeof(tv));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[NI_MAXHOST + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:66:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(hostname, "localhost");
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:80:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char myhostname[NI_MAXHOST + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:300:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(next, iterator, sizeof(struct addrinfo));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[NI_MAXHOST + 1];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:428:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:544:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sendbuf[1500], recvbuf[1500];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:592:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sendbuf + sizeof(struct icmp6_hdr), &tv, sizeof(tv));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:683:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/Inet6AddressImpl.c:694:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&inf.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:208:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char searchName[IFNAMESIZE];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:581:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char mac[16];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:928:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[IFNAMESIZE], vname[IFNAMESIZE];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:951:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(addrP->addr, ifr_addrP, addr_size);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:961:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(addrP->brdcast, ifr_broadaddrP, addr_size);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1043:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(tmpaddr, addrP, sizeof(netaddr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1047:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmpaddr->addr, addrP->addr, addr_size);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1053:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tmpaddr->brdcast, addrP->brdcast, addr_size);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1210:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&addr, &(ifreqP->ifr_addr), sizeof(struct sockaddr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1217:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1220:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&broadaddr, &(ifreqP->ifr_broadaddr),
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1227:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1257:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[21], addr6p[8][5];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1260:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen(_PATH_PROCNET_IFINET6, "r")) != NULL) {
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1266:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char addr6[40];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1335:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buf, &ifr.ifr_hwaddr.sa_data, IFHWADDRLEN);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1451:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&addr, &(ifreqP->ifr_addr), sizeof(struct sockaddr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1458:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1461:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&broadaddr, &(ifreqP->ifr_broadaddr),
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1468:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(ifreqP->ifr_addr), &addr, sizeof(struct sockaddr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1539:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&(if6.ifr_Addr), &(ifreqP->ifr_addr),
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1616:13:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            bcopy(nddp->ndd_addr, buf, 6);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1816:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(buf, (sadl->sdl_data + sadl->sdl_nlen), ETHER_ADDR_LEN);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:332:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:460:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:527:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:690:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:874:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[1024];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:1537:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char errmsg[255];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:1538:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(errmsg,
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainDatagramSocketImpl.c:2070:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&(mname6.ipv6mr_multiaddr), caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/PlainSocketImpl.c:861:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char fullMsg[128];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/ResolverConfigurationImpl.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXDNAME];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/SocketInputStream.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/SocketOutputStream.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullMsg[512];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c:159:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        FILE *fP = fopen("/proc/net/if_inet6", "r");
data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c:160:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[255];
data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c:297:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&sa->sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/portconfig.c:55:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        f = fopen("/proc/sys/net/ipv4/ip_local_port_range", "r");
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/IOUtil.c:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/IOUtil.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/InheritedChannel.c:175:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        int fd = open(str, oflag_actual);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/Net.c:108:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        major = atoi(uts.version);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/Net.c:109:17:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        minor = atoi(uts.release);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixCopyFile.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[8192];
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:64:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define open64 open
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:320:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[PATH_MAX+1];
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[1024];
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:935:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char target[PATH_MAX+1];
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:965:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char resolved[PATH_MAX+1];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/Console_md.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/Console_md.c:59:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "ms%d", cp);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/Console_md.c:61:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "cp%d", cp);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:499:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char token_buf[TOKEN_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessImpl_md.c:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  utf8_javaMessage[MESSAGE_LENGTH*2];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char val[MAX_ZONE_CHAR];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:104:35:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    ret = RegQueryValueExA(hKey, (char *) keyNames[keyIndex + 1], NULL,
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:113:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    len = MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS,
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:137:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buffer, "GMT%c%02d:%02d",
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:142:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(buffer, "GMT");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:230:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR subKeyName[MAX_ZONE_CHAR];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:231:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szValue[MAX_ZONE_CHAR];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *items[TZ_NITEMS];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:414:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char lineBuffer[MAX_ZONE_CHAR * 4];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:417:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char region[MAX_REGION_LENGTH];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:439:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen(mapFileName, "r")) == NULL) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:518:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char winZoneName[MAX_ZONE_CHAR];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:546:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char zonename[32];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:683:9:  [2] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
        wcscat(search_path, L"\\*");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:337:17:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    wpath_len = MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS,
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:347:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS,
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:392:17:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
                wcscpy(pathbuf, L"\\\\?\\UNC\0");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:396:13:  [2] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant string.
            wcscpy(pathbuf, L"\\\\?\\\0");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/dirent_md.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char alt_dirname[4] = { 0, 0, 0, 0 };
data/openjdk-16-16~14/src/java.base/windows/native/libjava/dirent_md.c:92:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(dirp->path, "*.*");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/dirent_md.c:94:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(dirp->path, "\\*.*");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:76:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(ret+2, "1252");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:78:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        codepage = atoi(ret+2);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:83:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(ret, "UTF-8");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:94:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(ret, "GBK");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:97:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(ret, "GB18030");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:110:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR  mbChar[2] = {(char)0xfa, (char)0x41};
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:112:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP, 0, mbChar, 2, &unicodeChar, 1);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:114:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(ret, "MS950_HKSCS_XP");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:122:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char systemPath[MAX_PATH + 1];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:127:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                strcat(systemPath, "\\FONTS\\SimSun18030.ttc");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:128:26:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                if ((f = fopen(systemPath, "r")) != NULL) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:130:21:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
                    strcpy(ret, "GB18030");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:148:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "ms%d", cp);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:150:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "cp%d", cp);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char * elems[5]; // lang, script, ctry, variant, encoding
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmp[SNAMESIZE];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:326:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(*language, "en");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:327:13:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
            strcpy(*country, "US");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:339:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*language, "no");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:340:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*country , "NO");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:342:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*language, "no");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:343:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*country , "NO");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:344:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(*variant, "NY");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:379:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[100];
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:566:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d.%d", majorVersion, minorVersion);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.c:33:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[MAX_PATH];
data/openjdk-16-16~14/src/java.base/windows/native/libjimage/osSupport_windows.cpp:42:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return ::open(path, O_BINARY | O_NOINHERIT, O_RDONLY);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char crtpath[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:300:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char javadll[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:518:24:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    unicode_path_len = MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS,
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:532:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (MultiByteToWideChar(CP_ACP, MB_ERR_INVALID_CHARS,
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:714:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char libraryPath[MAXPATHLEN]; /* some extra space for JLI_StrCat'ing SPLASHSCREEN_SO */
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:886:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char libraryPath[MAXPATHLEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:39:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:259:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/DualStackPlainDatagramSocketImpl.c:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet4AddressImpl.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[256];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet4AddressImpl.c:46:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(hostname, "localhost");
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet4AddressImpl.c:120:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(next, iterator, sizeof(struct addrinfo));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet4AddressImpl.c:185:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[NI_MAXHOST + 1];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet4AddressImpl.c:311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SendData[32] = {0};
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[256];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c:47:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(hostname, "localhost");
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c:146:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(next, iterator, sizeof(struct addrinfo));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c:254:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char host[NI_MAXHOST + 1];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c:274:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c:389:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char SendData[32] = {0};
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c:470:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)&sa.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/Inet6AddressImpl.c:481:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&inf.sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c:147:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(ret, ifrowP, sizeof(MIB_IFROW));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c:219:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char dev_name[8];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c:270:20:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            wlen = MultiByteToWideChar(CP_OEMCP, 0, ifrowP->bDescr,
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c:309:17:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            if (MultiByteToWideChar(CP_OEMCP, 0, ifrowP->bDescr,
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:122:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char error_msg_buf[100];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:191:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char error_msg_buf[100];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:224:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ret, ptr, sizeof(IP_ADAPTER_ADDRESSES));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:347:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char newname [128];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:370:33:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                sprintf (newname, "tun%d", tun);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:373:33:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                                sprintf (newname, "net%d", net);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char result[MAX_STR_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:193:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char searchlist[MAX_STR_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:194:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char nameservers[MAX_STR_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/SocketInputStream.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/SocketOutputStream.c:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:425:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:569:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:675:6:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
     char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:952:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char BUF[MAX_BUFFER_LEN];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1854:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char errmsg[255];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1855:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(errmsg,
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1950:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char tmpbuf[255];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/TwoStacksPlainDatagramSocketImpl.c:1952:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errmsg[255 + 31];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.c:141:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char exc[256];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fullMsg[256];
data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.c:175:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        excP = (char *)winsock_errors[i].exc;
data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.c:177:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                     (char *)winsock_errors[i].errString, msg);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.c:866:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)&sa->sa6.sin6_addr, caddr, sizeof(struct in6_addr));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.h:74:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy ((DST), (SRC), sizeof (struct sockaddr_in6));    \
data/openjdk-16-16~14/src/java.base/windows/native/libnet/net_util_md.h:76:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy ((DST), (SRC), sizeof (struct sockaddr_in));     \
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramChannelImpl.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[1];
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:105:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        bufs[i].buf = (char *)iovp[i].iov_base;
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:198:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        bufs[i].buf = (char *)iovp[i].iov_base;
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/IOUtil.c:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:109:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        bufs[i].buf = (char *)iovp[i].iov_base;
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:230:26:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char* ptr = (char *)iovp[next_index].iov_base;
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c:171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bytes[WAKEUP_SOCKET_BUF_SIZE];
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/WindowsSelectorImpl.c:198:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[8];
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt/porting_aix.c:34:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char dladdr_buffer[0x8000];
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:115:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t  status[MAX_STATUS_LEN + 1]; /*status text       */
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mbbuf[INITIAL_LOOKUP_BUF_SIZE];
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1341:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                &((char *)temp)[size*offset],
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1344:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&temp[size*offset], insert, size*ins_len);
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1357:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&((char *)source)[size*offset], insert, size*ins_len);
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1357:23:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            memcpy(&((char *)source)[size*offset], insert, size*ins_len);
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1361:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            memmove(&((char *)source)[size*offset],
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1362:24:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    &((char *)source)[size*(offset+del_len)],
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1458:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&cur_attr[chg_1st], text->feedback,
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:135:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char ALSAVersionString[ALSAVersionString_LENGTH];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:142:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        file = fopen(ALSA_VERSION_PROC_FILE, "r");
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiIn.c:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[1];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiIn.c:276:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(jdk_message->data.l.data, alsa_message.data.ext.ptr, alsa_message.data.ext.len);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiOut.c:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[3];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:63:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[16];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[300];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:377:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devicename[100];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[16];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:172:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[300];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:216:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[200];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[16];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:111:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[16];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[100];
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:146:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char devname[16];
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:385:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pBuffer+dstOffset, srcBuffer, len);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:386:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pBuffer, srcBuffer+len, lenAfterWrap);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:389:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pBuffer+dstOffset, srcBuffer, len);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:400:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dstBuffer, pBuffer+srcOffset, len);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:401:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dstBuffer+len, pBuffer, lenAfterWrap);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:404:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dstBuffer, pBuffer+srcOffset, len);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:447:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&asbdIn, inFormat, sizeof(AudioStreamBasicDescription));
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:448:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&asbdOut, outFormat, sizeof(AudioStreamBasicDescription));
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:810:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char name[256];
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_Ports.cpp:429:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(control->audioControls, audioControls + offset, len * sizeof(AudioControl *));
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_Ports.cpp:638:21:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                    sprintf(channelName, "Ch %d", ch);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_Utils.h:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errStr[32];                            \
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_mem.c:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                        filename[FILENAME_MAX+1]; /* filename where alloc occurred */
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_mem.c:273:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        report[FILENAME_MAX+MAX_DECIMAL_DIGITS*3+1];
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.c:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char                file[FILENAME_MAX+1];
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char             DTraceBuffer[MAX_TRACE_BUFFER*2+1]; /* double the buffer size to catch overruns */
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/medialib/mlib_sys.c:106:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  return memcpy(s1, s2, n);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBlitLoops.c:717:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tempRow, r1, clippedStride);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBlitLoops.c:718:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(r1, r2, clippedStride);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBlitLoops.c:719:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(r2, tempRow, clippedStride);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char edge[100];
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[2000];
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:144:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(edge, "sum = vec4(0.0);");
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:351:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[2000];
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLBufImgOps.c:573:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[2000];
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c:982:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char infoLog[1024];
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c:1014:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char infoLog[1024];
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLPaints.c:534:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cycleCode[1500];
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLPaints.c:535:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[3000];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/awt_ImageRep.c:265:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char cvtLut[256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_colors.c:160:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char cmap_r[256], cmap_g[256], cmap_b[256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_colors.c:573:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(reds, cmap_r, cmapsize);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_colors.c:574:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(greens, cmap_g, cmapsize);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_colors.c:575:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(blues, cmap_b, cmapsize);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_fsgray.h:66:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    extern unsigned char img_grays[256];                        \
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_fsgray.h:67:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    extern unsigned char img_bwgamma[256];                      \
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_globals.c:116:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        quantum = atoi(argv[1]);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_globals.h:139:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef unsigned char uns_ordered_dither_array[8][8];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_globals.h:140:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
typedef char sgn_ordered_dither_array[8][8];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_ordgray.h:67:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    extern unsigned char img_grays[256];                        \
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/cvutils/img_ordgray.h:68:21:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    extern unsigned char img_bwgamma[256];                      \
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/image/dither.c:112:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&currentState, priorState, sizeof(CubeStateInfo));
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:1313:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char lut[256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:1559:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  ilut[256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:2115:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dP, pixels, nbytes);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:2172:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pixels, dP, nbytes);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/awt/medialib/awt_ImagingLib.c:2696:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(cDataP, cmDataP, rasterP->width*hintP->numChans);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/SurfaceData.h:169:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char            data[SD_RASINFO_PRIVATE_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/Trace.c:93:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        j2dTraceFile = fopen(j2dTraceFileName, "w");
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AlphaMath.c:29:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
JNIEXPORT unsigned char mul8table[256][256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AlphaMath.c:30:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
JNIEXPORT unsigned char div8table[256][256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AlphaMath.h:31:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
JNIEXPORT extern unsigned char mul8table[256][256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/AlphaMath.h:32:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
JNIEXPORT extern unsigned char div8table[256][256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ByteIndexed.c:172:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dstBase, srcBase, width);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/FillSpans.c:70:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    siData = (*pSpanFuncs->open)(env, si);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Index12Gray.c:167:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dstBase, srcBase, width);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/Index8Gray.c:164:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dstBase, srcBase, width);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/LoopMacros.h:847:20:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                   memcpy(pDst, pSrc, width * ANYTYPE ## PixelStride)); \
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/MaskFill.c:738:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char localmask[MASK_BUF_LEN];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/MaskFill.c:1030:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char localmask[MASK_BUF_LEN];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/ProcessPath.c:1794:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((PTR)->plgPnts, _pnts, _size*sizeof(Point));         \
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/loops/UshortIndexed.c:163:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(dstBase, srcBase, bytesToCopy);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/BufferedMaskBlit.c:38:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern unsigned char mul8table[256][256];
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/BufferedRenderPipe.c:101:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    srData = (*pFuncs->open)(env, si);
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/ShapeSpanIterator.c:1009:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(newSegs, pd->segments,
data/openjdk-16-16~14/src/java.desktop/share/native/libawt/java2d/pipe/SpanIterator.h:37:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    void     *(*open)(JNIEnv *env, jobject iterator);
data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/freetypeScaler.c:229:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(destBuffer, scalerInfo->fontData+(size_t)cacheOffset, numBytes);
data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/freetypeScaler.c:247:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(destBuffer, scalerInfo->fontData, numBytes);
data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/freetypeScaler.c:837:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dstRow, srcRow, width);
data/openjdk-16-16~14/src/java.desktop/share/native/libfontmanager/freetypeScaler.c:1061:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(glyphInfo->image, ftglyph->bitmap.buffer, imageSize);
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h:82:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define ft_memcpy   memcpy
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h:106:21:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
#define ft_fopen    fopen
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftstroke.h:403:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                           FT_Bool     open );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/pshints.h:345:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    T1_Hints_OpenFunc      open;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/internal/pshints.h:658:27:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    T2_Hints_OpenFunc     open;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afhints.c:347:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  buf1[16], buf2[16], buf3[16], buf4[16];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afhints.c:348:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  buf5[16], buf6[16], buf7[16], buf8[16];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afhints.c:404:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char  temp[32];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afhints.c:450:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  buf1[16], buf2[16], buf3[16];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/autofit/afhints.c:587:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char  buf1[16], buf2[16];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftinit.c:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  module_name[MAX_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftinit.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  property_name[MAX_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftinit.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  property_value[MAX_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftmac.c:441:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char            ps_name[256];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftobjs.c:2169:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  header[128];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftobjs.c:2688:19:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FT_Open_Args  open;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftobjs.c:2696:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    open.stream   = NULL;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftobjs.c:2697:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    open.flags    = FT_OPEN_PATHNAME;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftobjs.c:2698:5:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    open.pathname = (char*)filepathname;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftobjs.c:2700:37:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return FT_Attach_Stream( face, &open );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftobjs.c:4677:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char  md5[16];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftrfork.c:58:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char  head[16], head2[16];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstroke.c:1760:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                           FT_Bool     open )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstroke.c:1771:29:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    stroker->subpath_open = open;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstroke.c:1794:44:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                               FT_Bool     open )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstroke.c:1823:16:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          if ( open )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/cffdecode.c:547:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      hinter->open( hinter->hints );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psaux/t1decode.c:503:15:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      hinter->open( hinter->hints );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psnames/pstables.h:29:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const char  ft_standard_glyph_names[3696]
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/psnames/pstables.h:629:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  const unsigned char  ft_adobe_glyph_list[55997L]
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfdriver.c:234:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const unsigned char sfnt_ps_map[16] =
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfdriver.c:672:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   tmp[5];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfdriver.c:776:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static const char  hexdigits[16] =
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttgload.c:1749:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char        tags[4]     = { 1, 1, 1, 1 };
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttinterp.h:115:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char      family[SPH_MAX_NAME_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttinterp.h:117:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char      style[SPH_MAX_NAME_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttinterp.h:125:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char      family[SPH_MAX_NAME_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttinterp.h:127:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char      style[SPH_MAX_NAME_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttinterp.h:136:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char  name[SPH_MAX_NAME_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttinterp.h:137:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char  member[SPH_MAX_CLASS_MEMBERS][SPH_MAX_NAME_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttobjs.c:157:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static const char trick_names[TRICK_NAMES_COUNT]
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/truetype/ttobjs.c:560:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[8];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:629:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:655:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:1047:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sb->buf, src->next_input_byte, offset);
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:1413:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(dst_ptr, src_ptr, length);
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:1537:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:1658:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:1985:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:2117:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(out, in, numBytes);
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:2567:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:2666:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/imageioJPEG.c:2889:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/jinclude.h:66:33:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MEMCOPY(dest,src,size)  bcopy((const void *)(src), (void *)(dest), (size_t)(size))
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/jinclude.h:72:33:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define MEMCOPY(dest,src,size)  memcpy((void *)(dest), (const void *)(src), (size_t)(size))
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/jpegdecoder.c:136:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjavajpeg/jpegdecoder.c:538:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[JMSG_LENGTH_MAX];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudio.h:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[DAUDIO_STRING_LENGTH+1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudio.h:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vendor[DAUDIO_STRING_LENGTH+1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudio.h:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char description[DAUDIO_STRING_LENGTH+1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudio.h:51:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char version[DAUDIO_STRING_LENGTH+1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudioDeviceProvider.c:43:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(desc->name, "Unknown Name");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudioDeviceProvider.c:44:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(desc->vendor, "Unknown Vendor");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudioDeviceProvider.c:45:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(desc->description, "Unknown Description");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/DirectAudioDeviceProvider.c:46:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(desc->version, "Unknown Version");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDevice.c:230:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(data + isSXCont, pMessage->data.l.data, pMessage->data.l.size);
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_STRING_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c:72:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "Unknown name");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_STRING_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c:94:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "Unknown vendor");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_STRING_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c:116:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "No details available");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_STRING_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiInDeviceProvider.c:138:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "Unknown version");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c:61:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_STRING_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c:72:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "Unknown name");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_STRING_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c:94:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "Unknown vendor");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_STRING_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c:116:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "No details available");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c:127:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_STRING_LENGTH + 1];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/MidiOutDeviceProvider.c:137:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(name, "Unknown version");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PortMixer.c:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char str[PORT_STRING_LENGTH];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PortMixerProvider.c:40:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(desc->name, "Unknown Name");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PortMixerProvider.c:41:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(desc->vendor, "Unknown Vendor");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PortMixerProvider.c:42:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(desc->description, "Port Mixer");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/PortMixerProvider.c:43:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(desc->version, "Unknown Version");
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Ports.h:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[PORT_STRING_LENGTH];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Ports.h:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char vendor[PORT_STRING_LENGTH];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Ports.h:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char description[PORT_STRING_LENGTH];
data/openjdk-16-16~14/src/java.desktop/share/native/libjsound/Ports.h:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char version[PORT_STRING_LENGTH];
data/openjdk-16-16~14/src/java.desktop/share/native/liblcms/LCMS.c:124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errMsg[ERR_MSG_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/liblcms/LCMS.c:756:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pBuffer, pfBuffer, sizeof(cmsICCHeader));
data/openjdk-16-16~14/src/java.desktop/share/native/liblcms/LCMS.c:771:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(&pfHeader, pBuffer, sizeof(cmsICCHeader));
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gif.c:51:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char szNetscape20ext[11] = "NETSCAPE2.0";
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gif.c:266:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(splash->frames[imageIndex].bitmapBits, pBitmapBits, bufferSize);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gif.c:273:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pOldBitmapBits, pBitmapBits, bufferSize);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gif.c:300:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(pBitmapBits + lineIndex, pOldBitmapBits + lineIndex,
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:362:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pData, pSrc, nBytes);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:383:28:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    pStream->arg.stdio.f = fopen(filename, "rb");
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:408:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char scaledImgPct[BUFF_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:409:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char scaledImgX[BUFF_SIZE];
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:473:20:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        if (!(fp = fopen(scaledImagePctName, "r"))) {
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:474:44:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            if (!isPctScaledImage && (fp = fopen(scaledImageXName, "r"))) {
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_png.c:186:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char sig[SIG_BYTES];
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:94:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
unsigned char img_bwgamma[256];
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:312:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char reds[256], greens[256], blues[256];
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:735:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            cmapsize = atoi(getenv("CMAPSIZE"));
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/X11Color.c:758:13:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        k = atoi(getenv("VIRTCUBESIZE"));
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:95:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char *name[MAXFDIRS];
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fontDirPath[512];
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:195:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            dirFile = open ( fontDirPath, O_RDONLY, 0 );
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h:794:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    pipeName[80]; /* Should be [GLX_HYPERPIPE_PIPE_NAME_LENGTH_SGIX] */
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h:798:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char    pipeName[80]; /* Should be [GLX_HYPERPIPE_PIPE_NAME_LENGTH_SGIX] */
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h:804:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pipeName[80]; /* Should be [GLX_HYPERPIPE_PIPE_NAME_LENGTH_SGIX] */
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h:809:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pipeName[80]; /* Should be [GLX_HYPERPIPE_PIPE_NAME_LENGTH_SGIX] */
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11Renderer.c:86:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((PTR)->pPoints, _pnts, _npnts*sizeof(XPoint));       \
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11Renderer.c:937:24:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    srData = (*pFuncs->open)(env, si);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11SurfaceData.c:101:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char c[4];
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/x11/X11SurfaceData.c:1235:25:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                        memcpy(img_addr, temp_addr, bytes_to_copy);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt/awt/awt_LoadLibrary.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXPATHLEN];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:174:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&defaultConfig->awt_visInfo, &visualList[i], sizeof(XVisualInfo));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:190:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&defaultConfig->awt_visInfo, &visualList[id], sizeof(XVisualInfo));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:314:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errmsg[128];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:448:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&graphicsConfigs [ind]->awt_visInfo, &pVITrue [i],
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:459:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&graphicsConfigs [ind]->renderPictFormat, format,
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:487:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&graphicsConfigs [ind]->awt_visInfo, &pVI8p [i],
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:504:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&graphicsConfigs [ind]->awt_visInfo, &pVI12p [i],
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:521:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&graphicsConfigs [ind]->awt_visInfo, &pVI8s [i],
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:538:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&graphicsConfigs [ind]->awt_visInfo, &pVI8gs [i],
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:555:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&graphicsConfigs [ind]->awt_visInfo, &pVI8sg [i],
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:572:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy (&graphicsConfigs [ind]->awt_visInfo, &pVI1sg [i],
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:666:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errmsg[128];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_InputMethod.c:109:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     status[MAX_STATUS_LEN]; /*status text       */
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_Robot.c:152:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char NET_WM_CM_Sn[25];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c:66:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char convertionBuffer[CONV_BUFFER_SIZE];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/swing_GTKEngine.c:33:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char conversionBuffer[(CONV_BUFFER_SIZE - 1) * 3 + 1];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:133:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char pkgInfoPath[FILENAME_MAX];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:156:22:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
          FILE *fp = fopen(pkgInfoPath, "r");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:158:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char line[PKGINFO_LINE_LEN_MAX];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:446:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        AWT_MAX_POLL_TIMEOUT = atoi(value);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:455:29:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        AWT_FLUSH_TIMEOUT = atoi(value);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:463:19:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        tracing = atoi(value);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:468:31:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        static_poll_timeout = atoi(value);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:477:24:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        tmp_poll_alg = atoi(value);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:641:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char read_buf[AWT_POLL_BUFSIZE + 1];    /* dummy buf to empty pipe */
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:822:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *c[1];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:1045:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hostname[HOST_NAME_MAX + 1];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:1093:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(jlong_to_ptr(hints), get_hints, sizeof(XWMHints));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:1386:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[128];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:1387:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:1536:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(jlong_to_ptr(dest_ptr), jlong_to_ptr(src_ptr), length);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:2114:54:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                                              (const char *)strings[i]);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:2165:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(jlong_to_ptr(dest), ints, size);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:2177:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(jlong_to_ptr(dest), longs, size);
data/openjdk-16-16~14/src/java.desktop/unix/native/libsplashscreen/splashscreen_sys.c:134:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(frame->rects, rects, frame->numRects * sizeof(XRectangle));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DBufImgOps.cpp:272:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pDst, bands[i], bandLength*sizeof(jushort));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DContext.cpp:1136:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pDstPixels, pSrcPixels, srcWidth);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DContext.cpp:1212:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pDstPixels, pSrcPixels, srcWidth * 3);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DContext.cpp:1248:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(pDstPixels, pSrcPixels, srcWidth * 4);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPaints.cpp:385:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPix, pixels, numStops*sizeof(juint));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char varname[50];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char *args[8];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:74:13:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fpTmp = fopen("tmp.hlsl", "w");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:81:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char pargs[300];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:121:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fpTmp = fopen("tmp.h", "r");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char array[5000];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:144:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char elem[30];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:151:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(elem, "    NULL,\n");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:157:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(array, "};\n");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:213:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[2000];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:274:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[2000];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[2000];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:428:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[3000];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:636:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cycleCode[1500];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:637:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char finalSource[3000];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:978:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fpHeader = fopen(strHeaderFile, "a");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DVertexCacher.cpp:730:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((void *)lpVert,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/GDIBlitLoops.cpp:93:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(imageData, lpvBits, size); // this is the most expensive part.
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/GDIBlitLoops.cpp:216:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(bmi.colors.palette, srcInfo.lutBase, srcInfo.lutSize * sizeof(RGBQUAD));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/windows/GDIBlitLoops.cpp:238:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(bmi.colors.palette, byteGrayPalette, 256 * sizeof(RGBQUAD));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:302:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char c[64];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:303:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(c, "Could not initialize COM: HRESULT=0x%08X", hr);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:466:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newPIDL, pIDL, cb);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:506:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(newPIDL, parentPIDL, len1);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:507:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(((LPBYTE) newPIDL) + len1, relativePIDL, len2);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:590:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR szBuf[MAX_PATH];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:722:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP, MB_PRECOMPOSED, strret.cStr, -1, olePath, MAX_PATH);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:727:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        MultiByteToWideChar(CP_ACP, MB_PRECOMPOSED, (CHAR *)pidl + strret.uOffset, -1, olePath, MAX_PATH);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:856:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR szBuf[MAX_PATH];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/WPrinterJob.cpp:76:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR cBuffer[250];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_BitmapUtil.cpp:189:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bitmapBits, (void*)imageData, srcStride * height);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_BitmapUtil.cpp:194:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(pDstPixels, pSrcPixels, dstStride);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:1082:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR szBuf[256];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3111:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char cbuf[2] = { '\0', '\0'};
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3131:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char junkbuf[2] = { '\0', '\0'};
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3151:28:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        int nconverted = ::MultiByteToWideChar(AwtComponent::GetCodePage(), 0,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3748:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR strCodePage[MAX_ACP_STR_LEN];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:3828:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        ::MultiByteToWideChar(GetCodePage(), 0, (CHAR*)&character, 2,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Component.cpp:6384:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy((BYTE*)pRgnData + sizeof(RGNDATAHEADER), pRect, sizeof(RECT_T) * numrects);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Cursor.cpp:385:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(cols, intRasterDataPtr, nW*nH*sizeof(int));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Debug.cpp:179:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char assertMsg[ASSERT_MSG_SIZE+1];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Dialog.cpp:573:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR         immItem[256];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDS.cpp:1167:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(dataout, &id, sizeof(id));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDT.cpp:628:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(stgm, pmedium, sizeof(STGMEDIUM));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDT.cpp:847:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szPath[MAX_PATH*2];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDT.cpp:871:25:  [2] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
                        _tcscat(szPath, _T("\\"));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDT.cpp:886:13:  [2] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
            _tcscat(szPath, _T("\\"));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDT.cpp:1060:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(m_formats + m_nformats, &tmp, sizeof(FORMATETC));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_FileDialog.cpp:57:8:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static TCHAR s_fileFilterString[MAX_FILTER_STRING];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_FileDialog.cpp:88:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(s, s_additionalString, sizeof(s_additionalString));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_FileDialog.cpp:186:21:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                    TCHAR szPath[MAX_PATH];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1712:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char m_szCodePageSubkey[KEYLEN];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1752:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szSubKey[KEYLEN];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1753:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(szSubKey, "EUDC\\");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1792:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szTmpName[80];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1825:14:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    VERIFY(::MultiByteToWideChar(CP_ACP, 0,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Frame.cpp:367:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char parentClass[PARENT_CLASS_BUFFER_SIZE];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_MenuItem.cpp:139:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR strCodePage[MAX_ACP_STR_LEN];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Palette.cpp:158:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char bUsed[256];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Palette.cpp:252:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(systemEntriesWin32, pe, numEntries * sizeof(PALETTEENTRY));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Palette.cpp:323:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pPalEntries, systemEntriesWin32, 256 * sizeof(PALETTEENTRY));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintControl.cpp:452:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(devmode, info2->pDevMode, devmodeSize);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:1428:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR fullPath[_MAX_PATH];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:1693:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     FILE *file = fopen("c:\\plog.txt", "a");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:1782:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
     FILE *file = fopen("c:\\plog.txt", "a");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:2801:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(imgLinePtr, imageBits+(i*imgWidthByteSz),
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:2864:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(&(bmi.bmiColors[0]), bmiCols, (numCols*4));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:3052:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
              memcpy(imageData, image, size);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:3824:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errStr[256];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:3825:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR t_errStr[256];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:4130:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(pDevMode, p2->pDevMode,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:4152:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy((LPTSTR)pDevNames + pDevNames->wDriverOffset,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:4157:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((LPTSTR)pDevNames + pDevNames->wDeviceOffset,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:4162:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy((LPTSTR)pDevNames + pDevNames->wOutputOffset,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:173:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(keyboardState, AwtToolkit::GetInstance().m_lastKeyboardState,
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:228:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR inputLocale[9];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:229:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR buf[9];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:237:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(&inputLocale[8-len], buf, len);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:1968:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t iconResourceName[sizeof(securityWarningIconName) + 2];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:1972:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t strIndex[2];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsDevice.cpp:391:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&rgbP[10], &logicalEntries[10], 236 * sizeof(RGBQUAD));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsDevice.cpp:414:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(rgbP, logicalEntries, 256 * sizeof(int));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Win32GraphicsDevice.cpp:425:21:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                    memcpy(rgbP, systemEntries, 256 * sizeof(int));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Window.cpp:437:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR windowClassName[len];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_new.cpp:56:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    logfile = fopen("java.awt.outofmem.txt", "w");
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:53:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szBuffer[DTRACE_BUF_LEN];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:57:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szTime[32];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:59:9:  [2] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
        _tcscat(szTime, _T(" "));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:60:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR szBuffer1[DTRACE_BUF_LEN];
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:75:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(szBuffer1, szTime, iTimeLen*sizeof(TCHAR));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:76:9:  [2] (buffer) _tcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant string.
        _tcscat(szBuffer1, _T("\n"));
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char windir[BSIZE];
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sysdir[BSIZE];
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fontpath[BSIZE*2];
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:66:10:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
         strcat(sysdir, "\\Fonts");
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:73:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(windir, "\\Fonts");
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:519:11:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const wchar_t wname[MAX_BUFFER];
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:520:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    const char data[MAX_BUFFER];
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:160:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(&(g_audioDeviceCache[g_cacheCount].guid), lpGuid, sizeof(GUID));
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:1199:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buffer1, data, buffer1len);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:1203:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buffer2, data, buffer2len);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:1274:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(data, buffer1, buffer1len);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:1278:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(data, buffer2, buffer2len);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiIn.cpp:237:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char winMidiInErrMsg[WIN_MAX_ERROR_LEN];
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiIn.cpp:285:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "%d.%d", (midiInCaps.vDriverVersion & 0xFF00) >> 8, midiInCaps.vDriverVersion & 0xFF);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiOut.c:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char winMidiOutErrMsg[WIN_MAX_ERROR_LEN];
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiOut.c:142:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "%d.%d", (midiOutCaps.vDriverVersion & 0xFF00) >> 8, midiOutCaps.vDriverVersion & 0xFF);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiOut.c:413:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(hdr->lpData, data, size);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:100:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char ret[100];
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:103:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(ret, "ACTIVE ");
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:107:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(ret, "DISCONNECTED ");
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:111:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(ret, "SOURCE ");
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:117:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf((char*) r, "%d", flags);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:206:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char ret[100];
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:209:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(ret, "DISABLED ");
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:213:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(ret, "MULTIPLE ");
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:217:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(ret, "UNIFORM ");
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:223:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf((char*) r, "%d", controlState);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:362:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(description->version, "%d.%d", (mixerCaps.vDriverVersion & 0xFF00) >> 8, mixerCaps.vDriverVersion & 0xFF);
data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_sys.c:71:16:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    outChars = MultiByteToWideChar(CP_ACP, MB_PRECOMPOSED, in, len,
data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_sys.c:77:10:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    rc = MultiByteToWideChar(CP_ACP, MB_PRECOMPOSED, in, len,
data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_sys.c:159:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(((BYTE *) pBmi) + sizeof(BITMAPV4HEADER),
data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_sys.c:258:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bitmapBits, splash->screenData,
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:79:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*name, tail, len);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:842:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char canonicalPath[MAXPATHLEN];
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:901:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char platform[MAXPATHLEN];
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAgent.c:1471:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char        platformChars[MAXPATHLEN];
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/EncodingSupport_md.c:164:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(output, bytes, len);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:50:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(str, path, len);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:86:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sb, pathname, off);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:136:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(theChars, parent, parentEnd);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:138:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(theChars+parentEnd, child, cn);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:147:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(theChars, parent, parentEnd);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:150:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(theChars+parentEnd+1, child, cn);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:166:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(str, path, len-1);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/EncodingSupport_md.c:37:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR strCodePage[7];       // ANSI code page id
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/EncodingSupport_md.c:49:20:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
        codePage = atoi(strCodePage);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/EncodingSupport_md.c:59:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    wlen = MultiByteToWideChar(CP_UTF8, 0, utf8_str, utf8_len, NULL, 0);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/EncodingSupport_md.c:63:17:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
            if (MultiByteToWideChar(CP_UTF8,
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:66:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(str, path, len);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:146:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(sb+sbLen, path, off);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:268:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(theChars, parent, parentEnd);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:269:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(theChars+parentEnd, child+childStart, (cn-childStart));
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:277:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(theChars, parent, parentEnd);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:279:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(theChars+parentEnd+1, child+childStart, (cn-childStart));
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:335:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(p, path+start, len);
data/openjdk-16-16~14/src/java.management/share/native/libmanagement/VMManagementImpl.c:38:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAX_VERSION_LEN];
data/openjdk-16-16~14/src/java.management/share/native/libmanagement/VMManagementImpl.c:47:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(buf, "%d.%d", major, minor);
data/openjdk-16-16~14/src/java.management/share/native/libmanagement/management.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errmsg[128];
data/openjdk-16-16~14/src/java.prefs/unix/native/libprefs/FileSystemPreferences.c:92:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(fname, O_RDONLY, 0);
data/openjdk-16-16~14/src/java.prefs/unix/native/libprefs/FileSystemPreferences.c:95:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        fd = open(fname, O_WRONLY|O_CREAT, permission);
data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/NativeFunc.h:151:38:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                                int *open);
data/openjdk-16-16~14/src/java.security.jgss/share/native/libj2gss/NativeUtil.c:713:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char oidHdr[2];
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:371:11:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    len = MultiByteToWideChar(CP_UTF8, 0, input, len, value, len+1);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:894:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR outName[100];
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:1000:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(output_token->value, outSecBuff.pvBuffer, outSecBuff.cbBuffer);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:1058:26:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                    int *open)
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:1589:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR msg[256];
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:756:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, Source1.Buffer, Source1.Length);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:757:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer + Source1.Length, Source2.Buffer, Source2.Length);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/WindowsDirectory.c:39:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR lpPath[MAX_PATH+1];
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:250:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char rbuf[RECEIVE_BUFFER_SIZE];
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:285:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char readerName[READERNAME_BUFFER_SIZE];
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:287:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char atr[ATR_BUFFER_SIZE];
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:407:15:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        free((char *)readerState[i].szReader);
data/openjdk-16-16~14/src/java.smartcardio/unix/native/libj2pcsc/pcsc_md.c:85:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errorMessage[256];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:53:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(filePath, envfilePath, envFilePathLength*sizeof(char));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:55:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(filePath + envFilePathLength + 1, fileName, fileNameLength*sizeof(char));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:56:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(filePath + envFilePathLength + 1 + fileNameLength, ".log", 4*sizeof(char));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:58:17:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        logFP = fopen(filePath, "w");
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:87:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char retbuf[256] = {0};
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:123:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024] = {0};
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:151:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024] = {0};
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:178:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024] = {0};
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:179:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char charmsg[256];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:183:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(charmsg, "%ls", msg);  // convert format string to multi-byte
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:208:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024] = {0};
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:209:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char charmsg[256] = {0};
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:213:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(charmsg, "%ls", msg);  // convert format string to multi-byte
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:609:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t VMversion[SHORT_STRING_SIZE];               // output of "java -version"
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:610:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t bridgeJavaClassVersion[SHORT_STRING_SIZE];  // version of the AccessBridge.class
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:611:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t bridgeJavaDLLVersion[SHORT_STRING_SIZE];    // version of JavaAccessBridge.dll
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:612:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t bridgeWinDLLVersion[SHORT_STRING_SIZE];     // version of WindowsAccessBridge.dll
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:617:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t name[MAX_STRING_SIZE];          // the AccessibleName of the object
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:618:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t description[MAX_STRING_SIZE];   // the AccessibleDescription of the object
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:620:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t role[SHORT_STRING_SIZE];        // localized AccesibleRole string
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:621:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t role_en_US[SHORT_STRING_SIZE];  // AccesibleRole string in the en_US locale
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:622:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t states[SHORT_STRING_SIZE];      // localized AccesibleStateSet string (comma separated)
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:623:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t states_en_US[SHORT_STRING_SIZE]; // AccesibleStateSet string in the en_US locale (comma separated)
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:655:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t word[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:656:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t sentence[MAX_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:662:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t selectedText[MAX_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:681:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t backgroundColor[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:682:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t foregroundColor[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:683:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t fontFamily[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:696:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t fullAttributesString[MAX_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:714:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char filename[cMemoryMappedNameSize];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1000:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t key[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1026:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t text[SHORT_STRING_SIZE]; // the hyperlink text
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1155:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t description[SHORT_STRING_SIZE]; // icon description
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1184:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t name[SHORT_STRING_SIZE];        // action name
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1276:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t rText[MAX_BUFFER_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1289:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t text[MAX_STRING_SIZE];  // the text
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1296:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t role[SHORT_STRING_SIZE];  // one of Accessible Roles above
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1309:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t role[SHORT_STRING_SIZE];  // one of Accessible Roles above
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1334:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t rValue[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1340:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t rValue[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1346:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t rValue[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1455:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t oldDescription[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1456:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t newDescription[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1463:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t oldName[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1464:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t newName[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1477:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t oldState[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1478:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t newState[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1491:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t oldValue[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1492:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t newValue[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1531:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t oldValue[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1532:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t newValue[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/include/bridge/AccessBridgePackages.h:1688:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t rName[MAX_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:91:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[512];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:92:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char commentLine[512] = "#";
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:154:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char line[512];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:155:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char commentLine[512];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char path[_MAX_PATH];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:188:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tempPath[_MAX_PATH];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:229:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char str[100] = "assistive_technologies=com.sun.java.accessibility.AccessBridge\n";
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:288:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR executableFileName[_MAX_PATH];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:311:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char versionString[100];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:317:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char outputString[100];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:332:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR dataBuffer[DEFAULT_ALLOC];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:376:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR dataBuffer[DEFAULT_ALLOC];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:377:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR searchBuffer[DEFAULT_ALLOC];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:432:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR dataBuffer[DEFAULT_ALLOC];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:166:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        logfile = fopen(JACCESSINSPECTOR_LOG, "w"); // overwrite existing log file
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:182:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[HUGE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:192:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[HUGE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:209:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[HUGE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:291:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:303:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:328:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:484:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:502:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:519:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:536:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:578:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:609:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[HUGE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:612:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( buffer,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:648:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[HUGE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:650:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf( buffer,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:691:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char s[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:1527:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char text [32] = {0};
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:54:19:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        logfile = fopen(JACCESSWALKER_LOG, "w"); // overwrite existing log file
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:315:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char szClass [MAX_PATH] = {0};
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:517:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s[LINE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:544:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char s[LINE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:545:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf( s,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:636:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[HUGE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.h:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char accessibleName[MAX_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.h:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char accessibleRole[SHORT_STRING_SIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeATInstance.cpp:195:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(event_struct->buffer,buffer,bufsize);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeATInstance.h:52:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char memoryMappedFileName[cMemoryMappedNameSize];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1728:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyCaretChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1783:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyDescriptionChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1869:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyNameChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1953:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertySelectionChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2006:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyStateChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2090:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyTextChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyValueChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2226:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyVisibleDataChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2278:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyChildChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyActiveDescendentChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2398:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(PropertyTableModelChangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2489:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[sizeof(PackageType) + sizeof(packageStruct)];                       \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2527:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[sizeof(PackageType) + sizeof(JavaShutdownPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:162:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    DEBUG_CODE(char debugBuf[255]);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:164:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    DEBUG_CODE(sprintf(debugBuf, "\r\nCalling firePropertyChange(%p, %p):\r\n", event, source));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:166:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    DEBUG_CODE(sprintf(debugBuf, "\r\nCalling firePropertyChange(%016I64X, %016I64X):\r\n", event, source));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:196:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        DEBUG_CODE(char debugBuf[255]); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:207:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        DEBUG_CODE(char debugBuf[255]);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:208:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        DEBUG_CODE(sprintf(debugBuf, "[INFO]: Calling fireJavaShutdown; vmID = %X\r\n", vmID));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:251:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        DEBUG_CODE(char debugBuf[255]); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:280:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        DEBUG_CODE(char debugBuf[255]); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:309:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        DEBUG_CODE(char debugBuf[255]); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeEventHandler.cpp:338:20:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        DEBUG_CODE(char debugBuf[255]); \
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:71:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(memoryMappedFileName, "AccessBridge-%p-%p.mmf",
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:80:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    DEBUG_CODE(char buffer[256]);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:88:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        DEBUG_CODE(sprintf(buffer, "  unmapping memoryMappedView; view = %p\r\n", memoryMappedView));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:95:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        DEBUG_CODE(sprintf(buffer, "  closing memoryMappedFileMapHandle; handle = %p\r\n", memoryMappedFileMapHandle));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:121:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    DEBUG_CODE(char debugBuf[256]);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:151:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        DEBUG_CODE(sprintf(debugBuf, "  MapViewOfFile worked - view: %p\r\n", memoryMappedView));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(MemoryMappedFileCreatedPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:177:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        DEBUG_CODE(sprintf(debugBuf, "  Success!  JavaVM accpeted our file\r\n"));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:247:16:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    DEBUG_CODE(char outputBuf[256]);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:248:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    DEBUG_CODE(sprintf(outputBuf, "AccessBridgeJavaVMInstance::sendMemoryPackage(, %d)", bufsize));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:255:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        DEBUG_CODE(sprintf(outputBuf, "    PackageType = %X", *type));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:257:20:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        DEBUG_CODE(sprintf(outputBuf, "    GetAccessibleTextRange: start = %d, end = %d, rText = %ls",
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:266:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(memoryMappedView, buffer, bufsize);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:272:28:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                DEBUG_CODE(sprintf(outputBuf, "    PackageType = %X", *type));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:296:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(buffer, memoryMappedView, bufsize);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.h:52:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char memoryMappedFileName[cMemoryMappedNameSize];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeMessageQueue.cpp:53:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, buf, bufsize);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:162:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1024];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:776:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(ReleaseJavaObjectPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:800:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessBridgeVersionPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:810:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(info, &(pkg->rVersionInfo), sizeof(AccessBridgeVersionInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:852:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(IsJavaWindowPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:922:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(IsSameObjectPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:957:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleContextFromHWNDPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1012:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetHWNDFromAccessibleContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1076:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleContextAtPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleContextWithFocusPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1147:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleContextInfoPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1163:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(info, &(pkg->rAccessibleContextInfo), sizeof(AccessibleContextInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleChildFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1233:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleParentFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1270:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableInfoPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1281:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tableInfo, &(pkg->rTableInfo), sizeof(AccessibleTableInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1304:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableCellInfoPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1317:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tableCellInfo, &(pkg->rTableCellInfo), sizeof(AccessibleTableCellInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1339:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableRowHeaderPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1351:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tableInfo, &(pkg->rTableInfo), sizeof(AccessibleTableInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1371:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableColumnHeaderPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1383:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(tableInfo, &(pkg->rTableInfo), sizeof(AccessibleTableInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1407:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableRowDescriptionPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1443:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableColumnDescriptionPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1476:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableRowSelectionCountPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1508:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(IsAccessibleTableRowSelectedPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1540:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableRowSelectionsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1554:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(selections, pkg->rSelections, count * sizeof(jint));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1577:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableColumnSelectionCountPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1608:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(IsAccessibleTableColumnSelectedPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1641:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableColumnSelectionsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1655:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(selections, pkg->rSelections, count * sizeof(jint));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1677:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableRowPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1712:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableColumnPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1747:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTableIndexPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1787:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleRelationSetPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1799:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(relationSetInfo, &(pkg->rAccessibleRelationSetInfo), sizeof(AccessibleRelationSetInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1827:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleHypertextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1837:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(hypertextInfo, &(pkg->rAccessibleHypertextInfo), sizeof(AccessibleHypertextInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1866:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(ActivateAccessibleHyperlinkPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1903:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleHyperlinkCountPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1947:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleHypertextExtPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1960:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(hypertextInfo, &(pkg->rAccessibleHypertextInfo), sizeof(AccessibleHypertextInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:1997:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleHypertextLinkIndexPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2040:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleHyperlinkPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2051:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(hyperlinkInfo, &(pkg->rAccessibleHyperlinkInfo),
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2080:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleKeyBindingsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2090:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(keyBindings, &(pkg->rAccessibleKeyBindings), sizeof(AccessibleKeyBindings));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2124:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleIconsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2134:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(icons, &(pkg->rAccessibleIcons), sizeof(AccessibleIcons));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2161:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleActionsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2171:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(actions, &(pkg->rAccessibleActions), sizeof(AccessibleActions));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2200:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(DoAccessibleActionsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2206:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)(&(pkg->actionsToDo)), (void *)actionsToDo, sizeof(AccessibleActionsToDo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2230:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(SetTextContentsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetParentWithRolePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2273:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)(&(pkg->role)), (void *)role, sizeof(pkg->role));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2308:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetTopLevelObjectPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2342:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetParentWithRoleElseRootPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2348:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy((void *)(&(pkg->role)), (void *)role, sizeof(pkg->role));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2376:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetObjectDepthPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2408:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetActiveDescendentPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2447:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetVirtualAccessibleNamePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2484:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(RequestFocusPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2517:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(SelectTextRangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2557:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetTextAttributesInRangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2565:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(pkg->attributes), attributes, sizeof(AccessibleTextAttributesInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2598:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetVisibleChildrenCountPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2632:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetVisibleChildrenPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2649:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(visibleChildrenInfo, &(pkg->rVisibleChildrenInfo), sizeof(pkg->rVisibleChildrenInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2667:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(SetCaretPositionPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2708:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTextInfoPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2726:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(textInfo, &(pkg->rTextInfo), sizeof(AccessibleTextInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2754:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTextItemsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2775:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(textItems, &(pkg->rTextItemsInfo), sizeof(AccessibleTextItemsInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2798:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTextSelectionInfoPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2814:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(selectionInfo, &(pkg->rTextSelectionItemsInfo), sizeof(AccessibleTextSelectionInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2837:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTextAttributeInfoPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2854:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(attributes, &(pkg->rAttributeInfo), sizeof(AccessibleTextAttributesInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2875:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTextRectInfoPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2892:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rectInfo, (&pkg->rTextRectInfo), sizeof(AccessibleTextRectInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2915:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetCaretLocationPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2932:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(rectInfo, (&pkg->rTextRectInfo), sizeof(AccessibleTextRectInfo));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2967:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTextLineBoundsPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3008:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleTextRangePackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3047:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetCurrentAccessibleValueFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3074:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetMaximumAccessibleValueFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetMinimumAccessibleValueFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3130:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(AddAccessibleSelectionFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3151:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(ClearAccessibleSelectionFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3171:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleSelectionFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3196:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(GetAccessibleSelectionCountFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(IsAccessibleChildSelectedFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3248:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(RemoveAccessibleSelectionFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3269:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(SelectAllAccessibleSelectionFromContextPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3302:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(AddJavaEventNotificationPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3338:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(RemoveJavaEventNotificationPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3376:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(AddAccessibilityEventNotificationPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3412:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[sizeof(PackageType) + sizeof(RemoveAccessibilityEventNotificationPackage)];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:37:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char datebuf[64];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:46:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy( am_pm, "PM" );
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[HUGE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[LINE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char tmpbuf[LARGE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:149:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t tmpBuf[LINE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:150:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t name[LINE_BUFSIZE];
data/openjdk-16-16~14/src/jdk.attach/aix/native/libattach/VirtualMachineImpl.c:156:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[100];
data/openjdk-16-16~14/src/jdk.attach/aix/native/libattach/VirtualMachineImpl.c:172:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[256];
data/openjdk-16-16~14/src/jdk.attach/aix/native/libattach/VirtualMachineImpl.c:211:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[128];
data/openjdk-16-16~14/src/jdk.attach/aix/native/libattach/VirtualMachineImpl.c:243:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[128];
data/openjdk-16-16~14/src/jdk.attach/linux/native/libattach/VirtualMachineImpl.c:159:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[100];
data/openjdk-16-16~14/src/jdk.attach/linux/native/libattach/VirtualMachineImpl.c:175:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[256];
data/openjdk-16-16~14/src/jdk.attach/linux/native/libattach/VirtualMachineImpl.c:214:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[128];
data/openjdk-16-16~14/src/jdk.attach/linux/native/libattach/VirtualMachineImpl.c:246:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[128];
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:161:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char msg[100];
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:177:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char buf[256];
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:216:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[128];
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:248:18:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        unsigned char buf[128];
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:286:17:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    RESTARTABLE(open(_path, O_CREAT | O_EXCL, S_IWUSR | S_IRUSR), fd);
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:319:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char temp_path_storage[PATH_MAX];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/AttachProviderImpl.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/AttachProviderImpl.c:166:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char base[256];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:75:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char jvmLib[MAX_LIBNAME_LENGTH];         /* "jvm.dll" */
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:76:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char func1[MAX_FUNC_LENGTH];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:77:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char func2[MAX_FUNC_LENGTH];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:78:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char cmd[MAX_CMD_LENGTH];                /* "load", "dump", ...      */
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:79:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char arg[MAX_ARGS][MAX_ARG_LENGTH];      /* arguments to command     */
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:80:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char pipename[MAX_PIPE_NAME_LENGTH];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:210:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char err_mesg[255];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:212:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                sprintf(err_mesg, "OpenProcess(pid=%d) failed; LastError=0x%x",
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:267:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_PIPE_NAME_LENGTH];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:346:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char buf[128];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:405:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(data.jvmLib, "jvm");
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:406:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(data.func1, "JVM_EnqueueOperation");
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:407:5:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
    strcpy(data.func2, "_JVM_EnqueueOperation@20");
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:493:25:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                        char errmsg[128];
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:494:25:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
                        sprintf(errmsg, "Remote thread failed for unknown reason (%d)", exitCode);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_convert.c:1001:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ckParamPtr->cb, ckBytes, ckTemp);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:159:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iv[16] = {0x0};
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:207:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(ckpAttributes, ckpAttributesTemplate,
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:259:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nativeKeyInfoArrayRaw, &totalCkAttributesSize, sizeof(unsigned long));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:261:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(nativeKeyInfoArrayRaw + sizeof(unsigned long) + totalCkAttributesSize,
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:330:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(nativeKeyInfoWrappedKeyArrayRaw, nativeKeyInfoArrayRaw,
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:336:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(wrappedKeySizeWrappedKeyArrayPtr, &ckWrappedKeyLength, sizeof(unsigned long));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:348:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(wrappedKeySizeWrappedKeyArrayPtr, &ckWrappedKeyLength, sizeof(unsigned long));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char iv[16] = {0x0};
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:434:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&totalCkAttributesSize, nativeKeyInfoArrayRaw, sizeof(unsigned long));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:444:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&totalDataSize, (nativeKeyInfoArrayRaw + totalCkAttributesSize + sizeof(unsigned long)),
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_keymgmt.c:451:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&ckWrappedKeyLength, wrappedKeySizePtr, sizeof(unsigned long));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_mutex.c:162:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(ckpGlobalInitArgs, ckpInitArgs, sizeof(CK_C_INITIALIZE_ARGS));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/j2secmod_md.c:41:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errorMessage[256];
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/j2secmod_md.c:41:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char errorMessage[256];
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mpstr[256];
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:324:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(key->privateValue.data, privKeyBytes, len);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:327:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(key->privateValue.data + (len - privKeyLen), privKeyBytes, privKeyLen);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:409:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(privKeyBytes, random, randomlen);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:623:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(derivedSecret->data, pointQ.data + 1, len);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:666:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mpstr[256];
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ec.c:906:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mpstr[256];
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecc_impl.h:127:41:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define PORT_Memcpy(t, f, l)            bcopy((f), (t), (l))
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecc_impl.h:130:41:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define PORT_Memcpy(t, f, l)            memcpy((t), (f), (l))
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c:116:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char genenc[3 + 2 * 2 * MAX_ECKEY_LEN];
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c:200:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(params->curveOID.data, oid.data, oid.len);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c:629:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(params->DEREncoding.data, encodedParams->data, encodedParams->len);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl.c:351:17:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                bcopy(params->text, group->text, n);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:63:17:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                bcopy(params->text, ret->text, strlen(params->text) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:73:17:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                bcopy(params->irr, ret->irr, strlen(params->irr) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:81:17:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                bcopy(params->curvea, ret->curvea, strlen(params->curvea) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:89:17:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                bcopy(params->curveb, ret->curveb, strlen(params->curveb) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:97:17:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                bcopy(params->genx, ret->genx, strlen(params->genx) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:105:17:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                bcopy(params->geny, ret->geny, strlen(params->geny) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:113:17:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                bcopy(params->order, ret->order, strlen(params->order) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi-priv.h:171:37:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  #define  s_mp_copy(sp, dp, count) memcpy(dp, sp, (count) * sizeof(mp_digit))
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi.c:2871:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(dp, sp, count * sizeof(mp_digit));
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi.h:58:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define memcpy(a,b,c) bcopy((caddr_t)b, (caddr_t)a, c)
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/mpi.h:58:23:  [2] (buffer) bcopy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
#define memcpy(a,b,c) bcopy((caddr_t)b, (caddr_t)a, c)
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:134:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char szMessage[1024];
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:140:9:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        strcpy(szMessage, "Unknown error");
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:1200:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(header, "desc %ld", desc.pBuffers[i].BufferType); \
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:1206:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[100];
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:1277:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(header, "NCRYPT_PKCS8_PRIVATE_KEY_BLOB %ls", NCRYPT_PKCS8_PRIVATE_KEY_BLOB);
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:1411:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buffer[64];
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:1412:17:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            if (sprintf(buffer, "%lu", dwAlgId)) {
data/openjdk-16-16~14/src/jdk.crypto.mscapi/windows/native/libsunmscapi/security.cpp:1480:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(pszCertAliasName, jCertAliasChars, size * sizeof(WCHAR));
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:221:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  int fd = open(binaryName, O_RDONLY);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:225:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char elf_ident[EI_NIDENT];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:279:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:284:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char err_buf[200];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:287:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[230];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alt_path[PATH_MAX + 1], *alt_path_end;
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:51:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    return open(name, O_RDONLY);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:71:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(alt_path, O_RDONLY);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.h:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             name[BUF_SIZE];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_core.c:170:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(regs, &thr->regs, sizeof(struct user_regs_struct));
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_core.c:196:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&newthr->regs, prstat->pr_reg, sizeof(struct user_regs_struct));
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_core.c:481:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char interp_name[BUF_SIZE + 1];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_core.c:590:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lib_name[BUF_SIZE];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_core.c:747:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ph->core->core_fd = open(core_file, O_RDONLY)) < 0) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_core.c:758:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ph->core->exec_fd = open(exec_file, O_RDONLY)) < 0) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:229:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[32];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:230:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[30];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:234:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname, "/proc/%d/status", pid);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:235:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(fname, "r");
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:282:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[200];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:340:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fname[32];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:341:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[PATH_MAX];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:344:3:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  sprintf(fname, "/proc/%d/maps", ph->pid);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:345:8:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  fp = fopen(fname, "r");
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:352:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char * word[7];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:473:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char taskpath[PATH_MAX];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:484:14:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
    lwp_id = atoi(entry->d_name);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:132:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char buffer[8 * 1024];
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:196:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy(last_slash+1, ".debug/");
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:256:12:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
      s += sprintf (s, "%02x", *data++);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:261:10:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    s += sprintf (s, "%02x", *data++);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:262:3:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
  strcpy (s, ".debug");
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:408:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(symtab->strs, scn_cache[shdr->sh_link].c_data, size);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:48:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char alt_path[PATH_MAX + 1];
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:55:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(alt_path, O_RDONLY);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:66:12:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      fd = open(alt_path, O_RDONLY);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:75:10:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    fd = open(name, O_RDONLY);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:443:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(regs, &thr->regs, sizeof(struct reg));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.h:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char             name[BUF_SIZE];
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.h:151:4:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
   char               exec_path[4096];  // file name java
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:169:8:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
       memcpy(regs, &thr->regs, sizeof(struct reg));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:355:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char  filepath[BUF_SIZE];
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:387:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char jdk_dir[BUF_SIZE];
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:431:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char  filepath[BUF_SIZE];
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:457:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char name[BUF_SIZE];  // use to store name
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:596:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ph->core->core_fd = open(core_file, O_RDONLY)) < 0) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:607:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ph->core->exec_fd = open(exec_file, O_RDONLY)) < 0) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:670:4:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
   memcpy(&newthr->regs, &prstat->pr_reg, sizeof(struct reg));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:928:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char interp_name[BUF_SIZE];
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:975:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char lib_name[BUF_SIZE];
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:1126:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ph->core->core_fd = open(core_file, O_RDONLY)) < 0) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:1137:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  if ((ph->core->exec_fd = open(exec_file, O_RDONLY)) < 0) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:335:7:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
      memcpy(symtab->strs, scn_cache[shdr->sh_link].c_data, size);
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/ps_core_common.c:289:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char classes_jsa[PATH_MAX];
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:123:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[JVM_MAXPATHLEN];
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:205:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[4096];
data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp:492:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR imageName[MAX_PATH];
data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp:863:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[SYMBOL_BUFSIZE];
data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/common/LinuxSysInfo.cpp:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[PATH_MAX] = { 0 };
data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/ErrorHandling.cpp:150:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR buffer[2048];
data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/Log.cpp:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char defaultLogAppenderMemory[sizeof(StreamLogAppender)] = {};
data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/Log.cpp:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char defaultLoggerMemory[sizeof(Logger)] = {};
data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/tstrings.cpp:249:18:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        int cw = MultiByteToWideChar(encoding,
data/openjdk-16-16~14/src/jdk.incubator.jpackage/share/native/common/tstrings.cpp:263:19:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
        int cw2 = MultiByteToWideChar(encoding,
data/openjdk-16-16~14/src/jdk.incubator.jpackage/unix/native/common/UnixFileUtils.cpp:44:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buffer[PATH_MAX] = { 0 };
data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/PlatformLogEvent.cpp:43:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR moduleName[MAX_PATH] = { 'U', 'n', 'k', 'n', 'o', 'w', 'n', TCHAR(0) };
data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/PlatformLogEvent.cpp:88:10:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    std::memcpy(moduleName, mname.c_str(), mname.size());
data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinFileUtils.cpp:644:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    tmp.open(tmpFile, std::ios::binary | std::ios::trunc);
data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/common/WinSysInfo.cpp:202:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR unused[1];
data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/WindowsRegistry.cpp:160:9:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        TCHAR valueName[VALUE_NAME_SIZE] = {0}; // Max size per MSDN plus NULL
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/SharedMemoryConnection.c:171:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char pktHeader[JDWP_HEADER_SIZE];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/SharedMemoryTransport.c:63:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg[80];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/SharedMemoryTransport.c:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[255];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:77:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[255];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mutexName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:96:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char acceptEventName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:97:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char attachEventName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_IPC_PREFIX];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char mutexName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:119:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hasDataEventName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:120:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hasSpaceEventName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:165:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:217:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:221:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        case SYS_DIED    : strcpy(buf, "Other process terminated"); break;
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:222:28:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        case SYS_TIMEOUT : strcpy(buf, "Timed out"); break;
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:246:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[10];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:247:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buf, ".%d", i+1);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:434:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objectName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:635:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char streamName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:657:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(streamName, ".ctos");
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:666:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(streamName, ".stoc");
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:740:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[128];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:741:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "Error: address strings longer than %d characters are invalid\n", MAX_IPC_PREFIX);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:787:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char objectName[MAX_IPC_NAME];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:804:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char buf[128];
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:805:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buf, "Error: address strings longer than %d characters are invalid\n", MAX_IPC_PREFIX);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:1090:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(shared->buffer + fragmentStart, (jbyte *)bytes + index, fragmentLength);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:1170:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((jbyte *)bytes + index, shared->buffer + fragmentStart, fragmentLength);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:1264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[500];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:103:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[255];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:187:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char b[16];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:221:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char msg[80+2*16];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:321:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(buffer, hostname, hostnameLen);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:413:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(&(addr6->s6_addr[12]), &(a4->s_addr), 4);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:443:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result, &(((struct sockaddr_in6 *)(addrInfo->ai_addr))->sin6_addr), sizeof(*result));
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:448:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(result, &addr6, sizeof(*result));
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:582:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(buffer, allowed_peers, len);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:683:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[20];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:693:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "%d", portNum);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:856:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char ebuf[64] = { 0 };
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:857:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char addrStr[INET_ADDRSTRLEN] = { 0 };
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1066:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char header[JDWP_HEADER_SIZE + MAX_DATA_SIZE];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1086:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(header + 0, &len, 4);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1087:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(header + 4, &id, 4);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1092:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header + 9, &errorCode, 2);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1101:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header + JDWP_HEADER_SIZE, data, data_len);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1107:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(header + JDWP_HEADER_SIZE, data, MAX_DATA_SIZE);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.c:293:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[200];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.c:337:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void)memcpy(new_lineTable, lineTable,
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.c:361:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void)memcpy(new_fileTable, fileTable,
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.c:385:23:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                (void)memcpy(new_stratumTable, stratumTable,
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/VirtualMachineImpl.c:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[500];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/VirtualMachineImpl.c:855:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void)memcpy(buf, pos, plen);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/bag.c:63:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void)memcpy(newBag->items, oldBag->items, newBag->used * newBag->itemSize);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/bag.c:109:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void)memcpy(new_items, items, (theBag->used) * itemSize);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/bag.c:129:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void)memcpy(condemned, tailItem, itemSize);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:636:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[512];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:983:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[80];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1075:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[100];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1122:41:  [2] (integer) atol:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            currentTransport->timeout = atol(current);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/error_messages.c:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char   pbuf[MAX_MESSAGE_BUF];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHelper.c:996:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(&tracker->recc->singleCommand[tracker->index++],
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHelper.c:1064:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(&command->u.eventCommand.info, evinfo, sizeof(*evinfo));
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/inStream.c:79:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void)memcpy(dest, stream->current, size);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:56:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char logging_filename[MAXLEN_FILENAME+1+6];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:57:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char location_stamp[MAXLEN_LOCATION+1];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:67:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timestamp_date_time[DT_SIZE];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:68:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char timestamp_timezone[TZ_SIZE];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:161:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char datetime[MAXLEN_TIMESTAMP+1];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:165:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char optional[MAXLEN_INTEGER+6+MAXLEN_INTEGER+6+MAXLEN_LOCATION+1];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:167:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char message[MAXLEN_MESSAGE+1];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/log_messages.c:172:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            log_file = fopen(logging_filename, "w");
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/outStream.c:128:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void)memcpy(stream->current, bytes, count);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/outStream.c:445:15:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        (void)memcpy(posP, segment->data, segment->length);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:123:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[MAXPATHLEN*2+100];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:126:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char libname[MAXPATHLEN+2];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:473:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAXPATHLEN + 100];
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:585:15:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
        (void)strcpy(threadName, "JDWP Transport Listener: ");
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:639:16:  [2] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant string.
         (void)strcpy(threadName, "JDWP Transport Listener: ");
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.c:305:5:  [2] (buffer) TCHAR:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    TCHAR strCodePage[7];       // ANSI code page id
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.c:315:27:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
            intCodePage = atoi(strCodePage);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.c:333:12:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    wlen = MultiByteToWideChar(codePage, 0, str, len, NULL, 0);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.c:344:9:  [2] (buffer) MultiByteToWideChar:
  Requires maximum length in CHARACTERS, not bytes (CWE-120).
    if (MultiByteToWideChar(codePage, 0, str, len, wstr, wlen) == 0) {
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.c:394:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(output, utf8, len);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.c:441:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(output, str, len);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/utf_util.c:530:11:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    (void)memcpy(output, bytes, len);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libdt_socket/socket_md.c:405:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(buf, "winsock error %d", error);
data/openjdk-16-16~14/src/jdk.management.agent/windows/native/libmanagement_agent/FileSystemImpl.c:62:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fsName[128];
data/openjdk-16-16~14/src/jdk.management/linux/native/libmanagement_ext/UnixOperatingSystem.c:85:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if((fh = fopen("/proc/stat", "r")) == NULL) {
data/openjdk-16-16~14/src/jdk.management/linux/native/libmanagement_ext/UnixOperatingSystem.c:132:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char     buf[2048];
data/openjdk-16-16~14/src/jdk.management/linux/native/libmanagement_ext/UnixOperatingSystem.c:134:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((f = fopen(procfile, "r")) == NULL) {
data/openjdk-16-16~14/src/jdk.management/share/native/libmanagement_ext/management_ext.c:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char errmsg[128];
data/openjdk-16-16~14/src/jdk.management/unix/native/libmanagement_ext/OperatingSystemImpl.c:134:15:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if ((fp = fopen("/proc/self/stat", "r")) == NULL) {
data/openjdk-16-16~14/src/jdk.management/unix/native/libmanagement_ext/OperatingSystemImpl.c:349:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char aix_fd_dir[32];     /* the pid has at most 19 digits */
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:716:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char fullIDProcessCounterPath[MAX_PATH];
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:802:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char moduleName[MAX_PATH];
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:1141:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char instanceIndexBuffer[32];
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:236:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(addressP, /*ssf->ssf_data*/ dataP, alreadyRead);
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:422:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cbuf[CMSG_SPACE(sizeof (struct sctp_sndrcvinfo))];
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:473:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(newBuf, addr, rv);
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:529:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cbuf[CMSG_SPACE(sizeof (struct sctp_sndrcvinfo))];
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpNet.c:689:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char cbuf[CMSG_SPACE(sizeof (struct sctp_sndrcvinfo))];
data/openjdk-16-16~14/src/jdk.security.auth/unix/native/libjaas/Unix.c:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char pwd_buf[1024];
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:94:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mach_option[64];
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:95:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char insn_options[256];
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:166:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[128];
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:246:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (dsize)   sprintf(p += strlen(p), " dsize='%d'", dsize);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:247:16:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
  if (delays)  sprintf(p += strlen(p), " delay='%d'", delays);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:265:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(myaddr, (bfd_byte*) (app_data->buffer + offset), length);
data/openjdk-16-16~14/test/hotspot/gtest/classfile/test_symbolTable.cpp:97:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char symbol_name[SYM_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char block[block_size];
data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:41:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char clear_block[block_size];
data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_memset_with_concurrent_readers.cpp:42:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char set_block[block_size];
data/openjdk-16-16~14/test/hotspot/gtest/gc/shared/test_oopStorage.cpp:621:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  unsigned char _states[_max_workers][_max_entries];
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestFixture.hpp:34:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char _filename[2 * K];
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:138:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, "r");
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_log.cpp:53:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char big_msg[4096] = {0};
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_log.cpp:62:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(TestLogFileName, "r");
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:40:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char _all_decorators[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:88:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expected_buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:170:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char other_file_name[2 * K];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:221:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:262:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected_buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:393:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[1 * K];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorations.cpp:77:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expected_tags[1 * K];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorators.cpp:149:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char decstr[1 * K];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorators.cpp:175:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char input[64];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logFileOutput.cpp:92:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp:174:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char expected_lines_data[lines][line_length];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logSelection.cpp:44:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logSelection.cpp:100:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logSelection.cpp:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logSelection.cpp:202:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logSelection.cpp:210:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logSelectionList.cpp:40:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTag.cpp:69:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[LogTag::Count * 16] = {0};
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSet.cpp:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSet.cpp:114:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSet.cpp:135:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ts_name[512];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSet.cpp:167:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char other_name[512];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[1 * K];
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:53:14:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
  FILE* fp = fopen(filename, "w+");
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char expected[1 * K];
data/openjdk-16-16~14/test/hotspot/gtest/oops/test_oop.cpp:29:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char memory[32];
data/openjdk-16-16~14/test/hotspot/gtest/oops/test_typeArrayOop.cpp:33:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char mem[100];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_arguments.cpp:47:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char ullong_max[32];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_arguments.cpp:161:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char buff[100];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:157:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[256];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:198:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[64];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:252:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[2 * (sizeof(expected) + padding_size)];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os.cpp:253:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char check_buffer[sizeof(buffer)];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:118:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t abs_path[JVM_MAXPATHLEN]; \
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:119:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t cwd[JVM_MAXPATHLEN]; \
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:257:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:273:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:279:18:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = os::open(buf, O_RDONLY, 0);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:288:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:296:20:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
      int fd = os::open(buf, O_RDONLY, 0);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:309:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t tmp[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:320:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:323:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t mod[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:326:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char mod_c[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:334:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t tmp[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:345:5:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    wchar_t tmp[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:353:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:363:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:438:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:439:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t abs[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:458:3:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  wchar_t buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:473:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t cwd[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:474:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_rel_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:475:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t long_rel_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:476:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t empty_dir_rel_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:477:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t not_empty_dir_rel_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:478:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t file_rel_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:479:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_file_rel_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:480:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:481:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t empty_dir_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:482:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t not_empty_dir_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:483:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_file_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:484:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t file_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:485:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_unc_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:486:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t empty_dir_unc_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:487:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t not_empty_dir_unc_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:488:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t nearly_long_file_unc_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:489:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t file_unc_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:490:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t root_dir_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:491:10:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static wchar_t root_rel_dir_path[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:507:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(nearly_long_rel_path, dir_prefix, sizeof(wchar_t) * dir_prefix_len);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:576:14:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static wchar_t top_buf[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:582:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(top_buf, cwd + 3, top_len * 2);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:662:14:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      static wchar_t tmp[JVM_MAXPATHLEN];
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_ostream.cpp:87:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[128 + 1];
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_ostream.cpp:97:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buf[100 + 1];
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_spinYield.cpp:36:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[100];
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_spinYield.cpp:72:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[100];
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_spinYield.cpp:85:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[100];
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_utf8.cpp:29:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char res[60];
data/openjdk-16-16~14/test/hotspot/jtreg/gc/shenandoah/jni/libTestJNICritical.c:33:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(bb, aa, len * sizeof(jint));
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGap/exestack-gap.c:36:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classpath[4096];
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:71:10:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  static char altstack[SIGSTKSZ];
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:228:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char javaclasspathopt[4096];
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/TLS/exestack-tls.c:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classpath[4096];
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/TLS/exestack-tls.c:60:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int glibc_vers_major = atoi(glibc_vers);
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/TLS/exestack-tls.c:61:32:  [2] (integer) atoi:
  Unless checked, the resulting number can exceed the expected range
  (CWE-190). If source untrusted, check both minimum and maximum, even if the
  input had no minus sign (large numbers can roll over into negative number;
  consider saving to an unsigned value if that is intended).
  const int glibc_vers_minor = atoi(strchr(glibc_vers, '.') + 1);;
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:122:77:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
jboolean is_exported(JNIEnv *env, jobject module, const char* pkg, jboolean open) {
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:129:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        const char* name = open ? "isOpen" : "isExported";
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:140:34:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                        jboolean open) {
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:147:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
        const char* name = open ? "isOpen" : "isExported";
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:158:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                              jboolean open) {
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:160:9:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    if (open) {
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:173:40:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
                              jboolean open) {
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:174:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char strbuf[128] = { '\0' };
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:176:23:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    const char* pkg = open ? "jdk.internal.math"
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:179:28:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    const char* jvmti_fn = open ? "AddModuleOpens"
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:185:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(NULL, pkg, thisModule, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:194:60:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, NULL, thisModule, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:203:53:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, pkg, NULL, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:212:63:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, bad_pkg, thisModule, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:221:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports((jobject)cls, pkg, thisModule, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:230:61:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, pkg, (jobject)cls, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:239:65:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    exported = is_exported_to(env, baseModule, pkg, thisModule, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:248:59:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    err = add_module_exports(baseModule, pkg, thisModule, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:258:65:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    exported = is_exported_to(env, baseModule, pkg, thisModule, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/AddModuleExportsAndOpens/libAddModuleExportsAndOpensTest.c:267:50:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    exported = is_exported(env, baseModule, pkg, open);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetThreadListStackTraces/libOneGetThreadListStackTraces.cpp:45:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char err_msg[ERR_MSG_LEN] = {0};
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetThreadListStackTraces/libOneGetThreadListStackTraces.cpp:60:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char err_msg[ERR_MSG_LEN] = {0};
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/GetThreadListStackTraces/libOneGetThreadListStackTraces.cpp:93:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char err_msg[ERR_MSG_LEN] = {0};
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.cpp:518:3:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
  memcpy(new_objects, storage->live_objects, current_count * sizeof(*new_objects));
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HeapMonitor/libHeapMonitorTest.cpp:538:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(allocated_frames, frames, count * sizeof(*allocated_frames));
data/openjdk-16-16~14/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:79:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(d, TO, n);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.cpp:87:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002/attach002Agent00.cpp:114:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach002a/attach002aAgent00.cpp:56:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach008/attach008Agent00.cpp:74:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.cpp:56:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char mainThreadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.cpp:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char loadedClassName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach009/attach009Agent00.cpp:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach014/attach014Agent00.cpp:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent00.cpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach015/attach015Agent01.cpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach022/attach022Agent00.cpp:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach037/attach037Agent00.cpp:73:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.cpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach038/attach038Agent00.cpp:70:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.cpp:84:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach039/attach039Agent00.cpp:113:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.cpp:60:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startedThreadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach040/attach040Agent00.cpp:73:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadGroupName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.cpp:69:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach041/attach041Agent00.cpp:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startedThreadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.cpp:49:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char startedThreadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach042/attach042Agent00.cpp:75:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent00.cpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent01.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent02.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.cpp:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach045/attach045Agent03.cpp:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/AttachOnDemand/attach046/attach046Agent00.cpp:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char className[MAX_STRING_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.cpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/CreateRawMonitor/crrawmon001/crrawmon001.cpp:54:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.cpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/DestroyRawMonitor/drrawmon001/drrawmon001.cpp:54:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTime/curthrcputime001/curthrcputime001.cpp:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64], buf3[64];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetCurrentThreadCpuTimerInfo/curthrtimerinfo001/curthrtimerinfo001.cpp:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetFrameLocation/frameloc002/frameloc002.cpp:85:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime001/thrcputime001.cpp:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64], buf3[64];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTime/thrcputime002/thrcputime002.cpp:72:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64], buf3[64];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadCpuTimerInfo/thrtimerinfo001/thrtimerinfo001.cpp:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[64], buf2[64];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTime/gettime001/gettime001.cpp:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32], buf2[32], buf3[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetTimerInfo/timerinfo001/timerinfo001.cpp:57:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[32], buf2[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodEntry/mentry001/mentry001.cpp:69:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit001/mexit001.cpp:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/MethodExit/mexit002/mexit002.cpp:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.cpp:155:22:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        meth.name = (char *) METHODS[1][0];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/NativeMethodBind/nativemethbind001/nativemethbind001.cpp:156:27:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        meth.signature = (char *) METHODS[1][1];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree001/objfree001.cpp:55:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MEM_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ObjectFree/objfree002/objfree002.cpp:52:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MEM_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.cpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.cpp:54:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.cpp:136:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorEnter/rawmonenter001/rawmonenter001.cpp:145:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.cpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.cpp:54:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.cpp:149:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorExit/rawmonexit001/rawmonexit001.cpp:158:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.cpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.cpp:54:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotify/rawmnntfy001/rawmnntfy001.cpp:171:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.cpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.cpp:54:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.cpp:162:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorNotifyAll/rawmnntfyall001/rawmnntfyall001.cpp:171:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.cpp:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.cpp:55:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.cpp:163:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RawMonitorWait/rawmnwait001/rawmnwait001.cpp:172:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name, "RawMonitor-%d", i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.cpp:130:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.cpp:289:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            jvmti_env->Deallocate((unsigned char *)(table[j].name));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RedefineClasses/redefclass027/redefclass027.cpp:290:45:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            jvmti_env->Deallocate((unsigned char *)(table[j].signature));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform004/retransform004.cpp:84:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(*new_class_data, class_data, class_data_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor001/setenvstor001.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor002/setenvstor002.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEnvironmentLocalStorage/setenvstor003/setenvstor003.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.cpp:44:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char enbl_scale[SCALE_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetEventNotificationMode/setnotif001/setnotif001.cpp:45:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static unsigned char ev_scale[SCALE_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor001/setthrdstor001.cpp:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor002/setthrdstor002.cpp:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetThreadLocalStorage/setthrdstor003/setthrdstor003.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadEnd/threadend001/threadend001.cpp:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ThreadStart/threadstart001/threadstart001.cpp:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/allocation/AP10/ap10t001/ap10t001.cpp:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char data[MAX_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.cpp:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[256];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/bcinstr/BI04/bi04t002/bi04t002.cpp:63:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bytecode = fopen(filename, "rb");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM01/cm01t008/cm01t008.cpp:513:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM02/cm02t001/cm02t001.cpp:258:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/capability/CM03/cm03t001/cm03t001.cpp:101:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.cpp:66:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.cpp:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/contention/TC05/tc05t001/tc05t001.cpp:241:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.cpp:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.cpp:58:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t001/em05t001.cpp:59:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.cpp:64:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM05/em05t002/em05t002.cpp:65:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.cpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF01/gf01t001/gf01t001.cpp:43:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *expected_props[PROP_NUM] = {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/general_functions/GF06/gf06t001/gf06t001.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char data[STORAGE_DATA_SIZE];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS103/hs103t002/hs103t002.cpp:50:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t001/hs104t001.cpp:46:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS104/hs104t002/hs104t002.cpp:75:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp:53:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char chbuffer[255];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[256];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp:399:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bytecode = fopen(filename, "rb");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp:53:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char chbuffer[255];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp:382:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char filename[256];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp:399:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    bytecode = fopen(filename, "rb");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS202/hs202t002/hs202t002.cpp:63:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t001/hs203t001.cpp:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t002/hs203t002.cpp:95:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t003/hs203t003.cpp:90:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS203/hs203t004/hs203t004.cpp:102:17:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
                char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.cpp:68:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
       char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t001/hs204t001.cpp:93:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t002/hs204t002.cpp:101:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t003/hs204t003.cpp:104:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS204/hs204t004/hs204t004.cpp:94:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t001/hs301t001.cpp:81:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t002/hs301t002.cpp:82:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t003/hs301t003.cpp:44:11:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
          char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t004/hs301t004.cpp:46:13:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
            char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS301/hs301t005/hs301t005.cpp:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t001/hs302t001.cpp:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t002/hs302t002.cpp:44:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t003/hs302t003.cpp:43:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t004/hs302t004.cpp:42:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t005/hs302t005.cpp:44:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t006/hs302t006.cpp:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t007/hs302t007.cpp:40:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t008/hs302t008.cpp:43:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t009/hs302t009.cpp:44:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t010/hs302t010.cpp:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t011/hs302t011.cpp:43:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS302/hs302t012/hs302t012.cpp:45:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char fileName[512];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001.cpp:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t001/ma04t001a.cpp:79:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t002/ma04t002a.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003.cpp:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32], buffer2[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA04/ma04t003/ma04t003a.cpp:50:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32], buffer2[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001.cpp:71:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA06/ma06t001/ma06t001a.cpp:71:17:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
                memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001.cpp:78:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA07/ma07t001/ma07t001a.cpp:78:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(klass_bytes, class_data, class_data_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/multienv/MA10/ma10t004/ma10t004a.cpp:52:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t001/sp02t001.cpp:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.cpp:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.cpp:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t002/sp02t002.cpp:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.cpp:46:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.cpp:47:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP02/sp02t003/sp02t003.cpp:48:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t001/sp06t001.cpp:281:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kind[256] = "";
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t002/sp06t002.cpp:289:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kind[256] = "";
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.cpp:53:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char threadName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.cpp:54:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.cpp:55:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodSig[MAX_NAME_LENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP06/sp06t003/sp06t003.cpp:290:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char kind[256] = "";
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.cpp:125:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t001/sp07t001.cpp:153:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.cpp:157:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/sampling/SP07/sp07t002/sp07t002.cpp:175:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.cpp:58:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *sig_exp [METHCNT] = { "(I)D", "(I)F" };
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretfp/earlyretfp.cpp:59:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *name_exp[METHCNT] = { "countDownDouble", "countDownFloat" };
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.cpp:61:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *sign_exp[METHCNT] = { "(I)Z", "(I)B", "(I)C",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/ForceEarlyReturn/earlyretint/earlyretint.cpp:63:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static const char *name_exp[METHCNT] = { "countDownBoolean",
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.cpp:118:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.cpp:120:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Raw-monitor");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp:186:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp:188:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Rawmonitor-%d",i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp:117:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp:119:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Rawmonitor-%d",i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/events/redefineCFLH/JvmtiTest/JvmtiTest.cpp:89:13:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
            memcpy(*new_class_data, class_data, class_data_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment[3000] = ".";
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:232:5:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
    strcat(segment, "/newclass");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp:128:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        res = jvmti->GetSystemProperty((const char *) properties[i], &value);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp:132:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        res = jvmti->SetSystemProperty((const char *) properties[i], value);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp:105:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        res = jvmti->GetSystemProperty((const char *) properties[i], &value);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp:110:47:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        res = jvmti->SetSystemProperty((const char *) properties[i], value);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp:155:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp:157:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Rawmonitor-%d",i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp:292:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char sz[128];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp:294:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(sz, "Rawmonitor-%d",i);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.cpp:83:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.cpp:179:3:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
  char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.cpp:220:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.cpp:1112:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char buf[1000];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/JVMTIagent.cpp:1150:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char error_msg[80];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/ExceptionCheckingJniEnv.cpp:126:7:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
      strcat(str, "-2147483648");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.cpp:105:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/jni_tools.cpp:131:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buffer[32];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.cpp:37:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment1[3000] = "";
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.cpp:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment2[3000] = "";
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.cpp:37:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment1[3000] = "";
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.cpp:38:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
static char segment2[3000] = "";
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.cpp:168:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(genPos, inputPos, count);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.cpp:178:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(bytes, inputPos, count);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.cpp:183:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(genPos, bytes, count);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:31:12:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    static char str[15 * 20];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:39:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " ALIVE");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:43:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " TERMINATED");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:47:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " RUNNABLE");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:51:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " WAITING");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:55:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " WAITING_INDEFINITELY");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:59:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " WAITING_WITH_TIMEOUT");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:63:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " SLEEPING");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:67:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " IN_OBJECT_WAIT");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:71:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " PARKED");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:75:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " BLOCKED_ON_MONITOR_ENTER");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:79:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " SUSPENDED");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:83:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " INTERRUPTED");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/JVMTITools.cpp:87:9:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
        strcat(str, " IN_NATIVE");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.cpp:238:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char file [1024];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/aod/jvmti_aod.cpp:251:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            bytecode = fopen(file, "rb");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.cpp:109:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy(names[classCount], name, name_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.cpp:115:9:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
        memcpy((unsigned char*) old_class_def[classCount].class_bytes,
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.cpp:39:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
const char * const g_refKindStr[28] = {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.cpp:64:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char * g_szTagInfo[MAX_TAG];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.cpp:65:1:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
char g_tagFlags[MAX_TAG];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:41:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern const char * const g_refKindStr[28]; /* JVMTI_HEAP_REFERENCE_xxx */
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:50:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char * g_szTagInfo[MAX_TAG];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_FollowRefObjects.h:51:8:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
extern char g_tagFlags[MAX_TAG];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:467:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char file [1024];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:480:24:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
            bytecode = fopen(file, "rb");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:133:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char msg_buf[1024];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:155:7:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
      char msg_buf2[sizeof(msg_buf)];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:262:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char hex[MAX_HEX_COLUMNS * 3 + 1];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:263:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char ascii[MAX_HEX_COLUMNS + 1];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:264:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[16];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:282:13:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            sprintf(buf, " %02X", b);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:290:17:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
                strcat(hex, "   ");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:53:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[DIGESTLENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:87:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(element->checkstr[allocs],digest,DIGESTLENGTH);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:146:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[DIGESTLENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:187:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(javachars->checkstr[index++],digest,DIGESTLENGTH);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp:37:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[DIGESTLENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp:71:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp,digest,DIGESTLENGTH);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp:84:14:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    unsigned char digest[DIGESTLENGTH];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp:128:5:  [2] (buffer) memcpy:
  Does not check for buffer overflows when copying to destination (CWE-120).
  Make sure destination can always hold the source data.
    memcpy(tmp,digest,DIGESTLENGTH);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:49:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:117:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:182:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:248:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:312:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:377:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:443:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:508:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:573:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:640:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:706:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:772:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:837:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:903:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:968:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1034:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1101:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1167:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1232:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1298:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1364:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1430:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1496:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1562:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1627:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1693:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1760:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1826:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1892:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:1958:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2024:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2090:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2156:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2222:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2287:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2354:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2421:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2487:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2554:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2621:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2687:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%d\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2754:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2820:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2886:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:2952:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%d\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:3019:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:3086:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:3152:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%d\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:3218:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:3285:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:3352:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/jit/LongTransitions/libLTTest.cpp:3419:16:  [2] (misc) fopen:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    FILE *file=fopen("LTTest_c.txt","a");fprintf(file,"p0=%e\n",p0);fprintf(file,"p1=%e\n",p1);fprintf(file,"p2=%e\n",p2);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char methodName[256];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.h:35:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classSig[256];
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.cpp:136:9:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        char path[MAX_PATH];
data/openjdk-16-16~14/test/jdk/java/nio/channels/FileChannel/directio/libDirectIO.c:74:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    int fd = open(path, O_RDWR);
data/openjdk-16-16~14/test/jdk/java/nio/channels/spi/SelectorProvider/inheritedChannel/libInheritedChannel.c:154:14:  [2] (misc) open:
  Check when opening files - can an attacker redirect it (via symlinks),
  force the opening of special file type (e.g., device files), move things
  around to create a race condition, control its ancestors, or change its
  contents? (CWE-362).
    thisFd = open("/dev/fd", O_RDONLY);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:44:1:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
wchar_t szBuffer[MAX_PATH];
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:95:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t originalLocale[16];
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:96:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t testLocale[16];
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:107:13:  [2] (buffer) swprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
            swprintf(testLocale, L"%08x", anLCID);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:127:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t originalUILang[16];
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:128:9:  [2] (buffer) wchar_t:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
        wchar_t testUILang[16];
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:45:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char buf[128];
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:102:5:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
    sprintf(name, "S-%lu-", SID_REVISION );
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:107:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name + strlen(name), "0x%02hx%02hx%02hx%02hx%02hx%02hx",
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:117:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name + strlen(name), "%lu",
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:126:9:  [2] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source has a constant maximum length.
        sprintf(name + strlen(name), "-%lu",
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:142:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char domain[255];
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:143:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char name[255];
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:157:13:  [2] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant string.
            strcat(s, "\\\\");
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:179:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char fsName[128];
data/openjdk-16-16~14/test/lib-test/jdk/test/lib/process/exejvm-test-launcher.c:34:5:  [2] (buffer) char:
  Statically-sized arrays can be improperly restricted, leading to potential
  overflows or other issues (CWE-119!/CWE-120). Perform bounds checking, use
  functions that limit length, or ensure that the size is larger than the
  maximum possible length.
    char classpath[4096];
data/openjdk-16-16~14/make/src/native/fixpath.c:63:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int prefix_size = strlen(prefix);
data/openjdk-16-16~14/make/src/native/fixpath.c:78:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(in);
data/openjdk-16-16~14/make/src/native/fixpath.c:118:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int in_len = strlen(in);
data/openjdk-16-16~14/make/src/native/fixpath.c:119:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int sub_len = strlen(sub);
data/openjdk-16-16~14/make/src/native/fixpath.c:120:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int rep_len = strlen(rep);
data/openjdk-16-16~14/make/src/native/fixpath.c:130:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(out, in, p - in);
data/openjdk-16-16~14/make/src/native/fixpath.c:147:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msys_path_list_end = &msys_path_list[strlen(msys_path_list)];
data/openjdk-16-16~14/make/src/native/fixpath.c:178:90:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (prefix = msys_path_list; prefix < msys_path_list_end && prefix != NULL; prefix += strlen(prefix)+1) {
data/openjdk-16-16~14/make/src/native/fixpath.c:198:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(in);
data/openjdk-16-16~14/make/src/native/fixpath.c:260:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  rc = _mktemp_s(name, strlen(name)+1);
data/openjdk-16-16~14/make/src/native/fixpath.c:284:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fwrite(fixed, strlen(fixed), 1, atout);
data/openjdk-16-16~14/make/src/native/fixpath.c:289:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  files_to_delete[num_files_to_delete] = (char*) malloc(strlen(name)+1);
data/openjdk-16-16~14/make/src/native/fixpath.c:292:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  atname = (char*) malloc(strlen(name)+2);
data/openjdk-16-16~14/make/src/native/fixpath.c:307:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(in_arg) == 0) {
data/openjdk-16-16~14/make/src/native/fixpath.c:459:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          const int msg_len = 80 + var_len + strlen(val);
data/openjdk-16-16~14/make/src/native/fixpath.c:496:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      line += (ptrdiff_t) strlen(argv[i]);
data/openjdk-16-16~14/make/src/native/fixpath.c:506:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ptrdiff_t len = strlen(argv[i]);
data/openjdk-16-16~14/make/src/native/fixpath.c:542:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const int msg_len = 80 + strlen(fixpathPath);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/frame_aarch64.inline.hpp:126:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline bool frame::equal(frame other) const {
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:131:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  case TemplateTable::equal        : return Assembler::NE;
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:1979:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (cc == equal)
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/templateTable_aarch64.cpp:2011:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (cc == equal)
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_aarch64.cpp:287:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (_model2) sprintf(buf+strlen(buf), "(0x%03x)", _model2);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp:78:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/aarch64/vm_version_ext_aarch64.cpp:88:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/arm/frame_arm.inline.hpp:109:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline bool frame::equal(frame other) const {
data/openjdk-16-16~14/src/hotspot/cpu/arm/templateTable_arm.cpp:158:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal        : return ne;
data/openjdk-16-16~14/src/hotspot/cpu/arm/templateTable_arm.cpp:2255:16:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  assert(cc == equal || cc == not_equal, "invalid condition");
data/openjdk-16-16~14/src/hotspot/cpu/arm/templateTable_arm.cpp:2259:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (cc == equal) {
data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_ext_arm.cpp:78:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/arm/vm_version_ext_arm.cpp:88:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:458:100:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beq(ConditionRegister crx, Label& L) { Assembler::bc(bcondCRbiIs1, bi0(crx, equal), L); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:462:100:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bne(ConditionRegister crx, Label& L) { Assembler::bc(bcondCRbiIs0, bi0(crx, equal), L); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:468:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beq_predict_taken    (ConditionRegister crx, Label& L) { bc(bcondCRbiIs1_bhintIsTaken,    bi0(crx, equal), L); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:472:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bne_predict_taken    (ConditionRegister crx, Label& L) { bc(bcondCRbiIs0_bhintIsTaken,    bi0(crx, equal), L); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:476:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beq_predict_not_taken(ConditionRegister crx, Label& L) { bc(bcondCRbiIs1_bhintIsNotTaken, bi0(crx, equal), L); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:480:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bne_predict_not_taken(ConditionRegister crx, Label& L) { bc(bcondCRbiIs0_bhintIsNotTaken, bi0(crx, equal), L); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:489:102:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beql(ConditionRegister crx, Label& L) { Assembler::bcl(bcondCRbiIs1, bi0(crx, equal), L); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:493:102:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bnel(ConditionRegister crx, Label& L) { Assembler::bcl(bcondCRbiIs0, bi0(crx, equal), L); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:510:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beqctr( ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctr( bcondCRbiIs1, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:511:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::beqctrl(ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctrl(bcondCRbiIs1, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:512:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bnectr( ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctr( bcondCRbiIs0, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/assembler_ppc.inline.hpp:513:123:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void Assembler::bnectrl(ConditionRegister crx, relocInfo::relocType rt) { Assembler::bcctrl(bcondCRbiIs0, bi0(crx, equal), bhintbhBCCTRisNotReturnButSame, rt); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:479:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    Assembler::Condition cond = Assembler::equal;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:481:71:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      case lir_cond_equal:        positive = true ; cond = Assembler::equal  ; is_unordered = false; break;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:482:71:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      case lir_cond_notEqual:     positive = false; cond = Assembler::equal  ; is_unordered = false; break;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1574:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Assembler::Condition cond = Assembler::equal;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1576:69:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_equal:        positive = true ; cond = Assembler::equal  ; break;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1577:69:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_notEqual:     positive = false; cond = Assembler::equal  ; break;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1924:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ cror(combined_check, Assembler::equal, tmp_check, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1924:73:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ cror(combined_check, Assembler::equal, tmp_check, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1931:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ crandc(combined_check, Assembler::equal, combined_check, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1931:78:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ crandc(combined_check, Assembler::equal, combined_check, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1938:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1944:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:1950:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cror(combined_check, Assembler::equal, tmp_check, Assembler::less);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:2299:74:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ bc_far_optimized(Assembler::bcondCRbiIs0, __ bi0(CCR0, Assembler::equal), *op->stub()->entry());
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:3132:35:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_LIRAssembler_ppc.cpp:3132:59:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_MacroAssembler_ppc.cpp:421:68:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    bc_far_optimized(Assembler::bcondCRbiIs1, bi0(CCR0, Assembler::equal), *Lnull);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:380:68:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ bclr(Assembler::bcondCRbiIs1, Assembler::bi0(CCR0, Assembler::equal), Assembler::bhintbhBCLRisReturn);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:485:74:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ bclr(Assembler::bcondCRbiIs1, Assembler::bi0(CCR0, Assembler::equal), Assembler::bhintbhBCLRisReturn);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:597:36:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ crandc(CCR0, Assembler::equal, CCR0, Assembler::equal); // failed: CR0.ne
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c1_Runtime1_ppc.cpp:597:60:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ crandc(CCR0, Assembler::equal, CCR0, Assembler::equal); // failed: CR0.ne
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c2_MacroAssembler_ppc.cpp:277:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/c2_MacroAssembler_ppc.cpp:277:51:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp:369:72:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ bc_far_optimized(Assembler::bcondCRbiIs1, __ bi0(CCR0, Assembler::equal), *stub->continuation());
data/openjdk-16-16~14/src/hotspot/cpu/ppc/gc/g1/g1BarrierSetAssembler_ppc.cpp:390:72:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ bc_far_optimized(Assembler::bcondCRbiIs1, __ bi0(CCR0, Assembler::equal), *stub->continuation());
data/openjdk-16-16~14/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1806:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne
data/openjdk-16-16~14/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1806:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  crorc(CCR0, Assembler::equal, CCR1, Assembler::equal); // cr0 eq = cr1 eq or cr0 ne
data/openjdk-16-16~14/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1924:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1924:53:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1926:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/interp_masm_ppc_64.cpp:1926:53:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:243:132:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void MacroAssembler::beq_far(ConditionRegister crx, Label& L, int optimize) { MacroAssembler::bc_far(bcondCRbiIs1, bi0(crx, equal), L, optimize); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:247:132:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline void MacroAssembler::bne_far(ConditionRegister crx, Label& L, int optimize) { MacroAssembler::bc_far(bcondCRbiIs0, bi0(crx, equal), L, optimize); }
data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:394:34:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      isel_0(d, CCR0, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/macroAssembler_ppc.inline.hpp:441:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    isel_0(d, CCR0, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2415:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR1, Assembler::equal, CCR0, Assembler::less);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2417:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR5, Assembler::equal, CCR0, Assembler::less);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2419:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR1, Assembler::equal, CCR5, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2419:54:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR1, Assembler::equal, CCR5, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2420:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cror(CCR1, Assembler::equal, CCR0, Assembler::less);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2449:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ crnand(CCR5, Assembler::equal, CCR6, Assembler::less);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/stubGenerator_ppc.cpp:2498:82:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    const int bo = Assembler::bcondCRbiIs1, bi = Assembler::bi0(CCR0, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:268:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:268:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ cror(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:272:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal); // Neither resolved class nor unresolved case from above?
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:272:53:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal); // Neither resolved class nor unresolved case from above?
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:326:41:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ isel_0(R17_tos, CCR0, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1640:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Assembler::Condition cond = Assembler::equal;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1642:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal:         positive = true ; cond = Assembler::equal  ; break;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1642:76:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal:         positive = true ; cond = Assembler::equal  ; break;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:1643:76:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::not_equal:     positive = false; cond = Assembler::equal  ; break;
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:2758:37:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:2758:61:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ crnor(CCR0, Assembler::equal, CCR1, Assembler::equal);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:3782:32:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ crnand(CCR0, Assembler::equal, CCR1, Assembler::equal); // slow path bit set or not fully initialized?
data/openjdk-16-16~14/src/hotspot/cpu/ppc/templateTable_ppc_64.cpp:3782:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ crnand(CCR0, Assembler::equal, CCR1, Assembler::equal); // slow path bit set or not fully initialized?
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp:75:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ext_ppc.cpp:85:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ppc.cpp:444:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(line, system_type, strlen(system_type)) == 0) {
data/openjdk-16-16~14/src/hotspot/cpu/ppc/vm_version_ppc.cpp:451:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(line, num_lpars, strlen(num_lpars)) == 0) {
data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_MacroAssembler_s390.cpp:116:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cond_inc32(Assembler::equal,
data/openjdk-16-16~14/src/hotspot/cpu/s390/c1_Runtime1_s390.cpp:727:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, return_min_jlong);
data/openjdk-16-16~14/src/hotspot/cpu/s390/templateTable_s390.cpp:178:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case TemplateTable::equal :
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_ext_s390.cpp:74:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_ext_s390.cpp:84:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:317:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(_features_string) + 3*8 < sizeof(buf), "increase buffer size");
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:328:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(_features_string) + 6 + 2*8 + 7 < sizeof(buf), "increase buffer size");
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:648:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(march) >= hdr_len) {
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:671:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(march) > hdr_len) {
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:673:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((strlen(march)-hdr_len) >= buf_len) err = true;
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:675:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          memcpy(buf, &march[hdr_len], strlen(march)-hdr_len);
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:676:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          buf[strlen(march)-hdr_len] = '\00';
data/openjdk-16-16~14/src/hotspot/cpu/s390/vm_version_s390.cpp:677:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          for (size_t i = 0; !err && (i < strlen(buf)); i++) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1438:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        case lir_cond_equal:        acond = Assembler::equal;      break;
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1448:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        case lir_cond_equal:        acond = Assembler::equal;       break;
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1594:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, *op->stub()->entry());
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1749:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, *obj_is_null);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1796:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, *success_target);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1803:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, *success_target);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1816:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, *failure_target);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1830:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, *failure_target);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1895:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:1914:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, *failure_target);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:2024:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_equal:        acond = Assembler::equal;        ncond = Assembler::notEqual;     break;
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:2025:85:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    case lir_cond_notEqual:     acond = Assembler::notEqual;     ncond = Assembler::equal;        break;
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:2032:52:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    default:                    acond = Assembler::equal;        ncond = Assembler::notEqual;
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3194:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, *stub->continuation());
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3482:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, known_ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3486:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, known_ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3488:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, known_ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3698:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3723:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jccb(Assembler::equal, none);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3725:30:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jccb(Assembler::equal, none);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3766:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jcc(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3768:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jcc(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_LIRAssembler_x86.cpp:3992:54:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      case lir_cond_equal:        acond = Assembler::equal;       break;
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp:82:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cond_inc32(Assembler::equal,
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_MacroAssembler_x86.cpp:85:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:94:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:109:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:442:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:553:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:739:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, oop_empty);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:745:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, pc_empty);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:814:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, oop_empty);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:820:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, pc_empty);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:906:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:921:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:925:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jump_cc(Assembler::equal,
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:945:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, oop_empty);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:951:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, pc_empty);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:981:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, cont);                       // no
data/openjdk-16-16~14/src/hotspot/cpu/x86/c1_Runtime1_x86.cpp:1146:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jcc(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:63:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jccb(Assembler::equal, check_abort);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:93:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jccb(Assembler::equal, L_done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:248:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, DONE_LABEL);        // all done if unlocked
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:344:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jccb(Assembler::equal, DONE_LABEL) ;
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:508:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cond_inc32(Assembler::equal,
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:511:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, DONE_LABEL);           // Success
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:521:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    cond_inc32(Assembler::equal,
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:1715:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jccb(Assembler::equal, CHECK_NEXT);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:1836:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jccb(Assembler::equal, FOUND_SEQ_CHAR);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:1929:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, LENGTH_DIFF_LABEL);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:1934:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, LENGTH_DIFF_LABEL);
data/openjdk-16-16~14/src/hotspot/cpu/x86/c2_MacroAssembler_x86.cpp:2488:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, TRUE_LABEL);
data/openjdk-16-16~14/src/hotspot/cpu/x86/frame_x86.inline.hpp:122:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
inline bool frame::equal(frame other) const {
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:67:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, filtered);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:178:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:187:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:195:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, runtime);       // If yes, goto runtime
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:285:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:290:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:305:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:309:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:318:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, runtime);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:431:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, *stub->continuation());
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:445:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, *stub->continuation());
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:482:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:553:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/g1/g1BarrierSetAssembler_x86.cpp:557:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.cpp:341:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, continuation);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.cpp:361:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, continuation);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/barrierSetAssembler_x86.cpp:375:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, bad_call);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shared/cardTableBarrierSetAssembler_x86.cpp:124:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_already_dirty);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:192:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:200:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, runtime);       // If yes, goto runtime
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:668:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_success);
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:778:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_success); // fastpath, peeking into Step 5, no need to jump
data/openjdk-16-16~14/src/hotspot/cpu/x86/gc/shenandoah/shenandoahBarrierSetAssembler_x86.cpp:825:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, *stub->continuation());
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:75:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jccb(Assembler::equal, none);
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:77:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jccb(Assembler::equal, none);
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:189:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jcc(Assembler::equal, do_profile);
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:191:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jcc(Assembler::equal, do_profile);
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:270:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:302:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:928:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:1134:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, no_reserved_zone_enabling);
data/openjdk-16-16~14/src/hotspot/cpu/x86/interp_masm_x86.cpp:1395:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, verify_continue);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:185:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:586:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, special_case);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1144:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1275:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1540:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1569:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1726:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1733:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1748:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1755:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:1886:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, special_case);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2024:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:2031:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal , L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3430:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jccb(Assembler::equal, found_method);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3529:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  local_jcc(Assembler::equal, *L_success);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3552:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    local_jcc(Assembler::equal, *L_success);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3555:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      local_jcc(Assembler::equal, *L_slow_path);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3563:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      local_jcc(Assembler::equal, *L_success);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3571:28:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      local_jcc(Assembler::equal, *L_success);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3689:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, *L_fast_path);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:3694:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, *L_fast_path);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4292:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, resolved);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4420:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4442:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  cmovq(Assembler::equal, r, r12_heapbase);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4504:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jccb(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:4792:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5803:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, VECTOR8_LOOP);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5810:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, VECTOR16_LOOP);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5827:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5841:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5859:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5874:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5887:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, SAME_TILL_END);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:5998:19:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jccb(Assembler::equal, L_first_loop_exit);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6719:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_cleanup);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6724:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_exact_16_left);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:6977:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_128_done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86.cpp:7995:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  _masm->jcc(Assembler::equal, _label);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:120:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, KEY_256);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:132:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, NO_PARTS);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:140:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, REMAINDER);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:214:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, END);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:331:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, KEY_256);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:342:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, NO_PARTS);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:350:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, REMAINDER);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:425:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, END);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:750:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, SAVE_STATE);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:956:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, END);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_aes.cpp:1239:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, STORE_CTR);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:304:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_2_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:414:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:560:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_10_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_cos.cpp:863:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_3_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:302:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:309:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_5_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_exp.cpp:590:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:310:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:336:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:595:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log.cpp:626:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:322:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:352:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:622:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_log10.cpp:653:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:981:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_6_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:993:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_9_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1039:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_9_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1158:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_13_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1160:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_14_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1171:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_15_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1178:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_16_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1202:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_19_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1235:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_26_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1253:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_24_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1282:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_24_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1290:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_29_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1318:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_31_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1333:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_35_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1338:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_35_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1347:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_9_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1356:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_37_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1359:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_28_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1378:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_35_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1505:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_39_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1509:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_42_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1525:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_41_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1541:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_22_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1561:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_45_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1585:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_48_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1721:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_45_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1790:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_13_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1792:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_14_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1818:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_54_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1828:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_47_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:1839:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_55_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2698:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2710:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2718:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_11_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2764:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_7_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2772:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_11_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2893:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_16_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2895:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_17_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2910:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_19_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2918:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_20_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2941:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_23_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2974:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_30_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2992:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_28_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:2998:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_18_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3020:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_28_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3028:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_33_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3068:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_38_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3073:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_38_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3082:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_11_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3091:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_40_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3094:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_32_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3113:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_38_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3245:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_42_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3249:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_45_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3265:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_44_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3281:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_26_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3301:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_48_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3330:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_51_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3467:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_48_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3536:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_16_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3538:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_17_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3570:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_58_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_pow.cpp:3593:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_50_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:800:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    jcc(Assembler::equal, done_hash);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:811:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, only_one_block);   //je only_one_block
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sha.cpp:1359:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      jcc(Assembler::equal, done_hash);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:520:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_3_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:631:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_8_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:777:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_11_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1724:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_42);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1805:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_43);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1901:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_22);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1915:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_21);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1942:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_24);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1958:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_33);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:1966:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_30);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2004:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_29);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2054:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_32);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2070:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_41);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2078:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_38);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2116:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_37);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2166:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_40);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_sin.cpp:2426:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:652:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_2_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:689:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:799:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_9_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:988:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_12_0_1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1140:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_39);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1222:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_40);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1336:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_20);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1386:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_23);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1405:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_31);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1412:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_27);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1510:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_30);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1528:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_38);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1535:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_34);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:1633:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, B1_37);
data/openjdk-16-16~14/src/hotspot/cpu/x86/macroAssembler_x86_tan.cpp:2118:18:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  jcc(Assembler::equal, L_2TAG_PACKET_4_0_2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/methodHandles_x86.cpp:87:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/methodHandles_x86.cpp:91:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/methodHandles_x86.cpp:107:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/methodHandles_x86.cpp:193:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/methodHandles_x86.cpp:238:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:172:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:523:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:972:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, skip_fixup);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1077:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, nil);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1099:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, skip);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1355:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1386:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1419:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, cont);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1493:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:1844:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, hit);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2128:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, lock_done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2243:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, Continue);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2283:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, reguard);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2309:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2421:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2458:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:2946:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_32.cpp:3144:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, noException);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:533:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:822:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, no_alternative_target);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:961:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, ok);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:969:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, skip_fixup);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1198:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmovptr(Assembler::equal, rHandle, Address(rbp, reg2offset_in(src.first())));
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1234:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmovptr(Assembler::equal, rHandle, Address(rsp, offset));
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1490:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1517:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1542:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, cont);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:1620:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, is_null);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2144:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, hit);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2210:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2501:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, lock_done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2604:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, Continue);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2645:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, reguard);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2668:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2772:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:2812:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:3057:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:3304:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/sharedRuntime_x86_64.cpp:3500:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, noException);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:166:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, skip_ldmx);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:179:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:237:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, L_skip);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:241:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          __ jcc(Assembler::equal, L_skip);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:255:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_long);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:257:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_float);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:259:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_double);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:338:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:455:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, ok_ret);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:494:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, ok_ret);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1240:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    LOCAL_JCC(Assembler::equal, L_success);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1247:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    LOCAL_JCC(Assembler::equal, L_success);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1645:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, L1);      // this would be broken also
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1664:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_objArray);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1733:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jump_cc(Assembler::equal, RuntimeAddress(entry_jbyte_arraycopy));
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1735:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jump_cc(Assembler::equal, RuntimeAddress(entry_jshort_arraycopy));
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:1737:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jump_cc(Assembler::equal, RuntimeAddress(entry_jint_arraycopy));
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2113:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2122:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2211:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2220:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2489:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTop[1]);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2491:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTop[2]);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2555:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
       __ jcc(Assembler::equal, L_exit);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2706:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_key192_top);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2708:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_key256_top);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:2781:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L_exit);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_32.cpp:3628:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, deoptimize_label);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:289:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, skip_ldmx);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:304:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:344:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_long);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:346:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_long);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:348:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_float);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:350:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, is_double);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:365:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:370:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:374:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L3);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:455:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:460:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:464:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L3);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:627:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, ok_ret);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:987:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2293:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L2);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2309:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2614:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L1);     // this would be broken also
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2632:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_objArray);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:2717:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3051:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3060:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3143:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3152:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, L_doLast);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3447:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTopHead[1]);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3449:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTopHead[2]);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:3562:25:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jcc(Assembler::equal, L_exit);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4113:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTop[1]);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4115:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_multiBlock_loopTop[2]);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:4977:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_processdata);
data/openjdk-16-16~14/src/hotspot/cpu/x86/stubGenerator_x86_64.cpp:5494:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, deoptimize_label);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:901:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1032:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1073:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, push_double);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1116:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, Continue);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateInterpreterGenerator_x86.cpp:1465:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:134:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  case TemplateTable::equal        : return Assembler::notEqual;
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:135:56:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  case TemplateTable::not_equal    : return Assembler::equal;
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:232:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_okay);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:234:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, L_okay);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:375:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, call_ldc);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:380:22:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jccb(Assembler::equal, call_ldc);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:639:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:644:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:649:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:948:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:954:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:960:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:966:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, rewrite);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:2123:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, done);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:2501:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, found);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:2745:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, resolved);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:3084:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmovptr(Assembler::equal,
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:3087:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ cmovptr(Assembler::equal,
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:3091:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, two_word);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:3093:26:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      __ jccb(Assembler::equal, two_word);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:4194:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, quicked);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:4258:21:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  __ jcc(Assembler::equal, quicked);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:4402:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ cmovptr(Assembler::equal, rmon, rtop);   // cmov => cmovptr
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:4406:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, exit);
data/openjdk-16-16~14/src/hotspot/cpu/x86/templateTable_x86.cpp:4497:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, found);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:181:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, cpu486);   // if cpuid doesn't support an input
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:513:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((_cpuid_info.std_cpuid1_edx.value & flag) && strlen(_feature_edx_id[fi]) > 0) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:519:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((_cpuid_info.std_cpuid1_ecx.value & flag) && strlen(_feature_ecx_id[fi]) > 0) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:525:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((_cpuid_info.ext_cpuid1_ecx.value & flag) && strlen(_feature_extended_ecx_id[fi]) > 0) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:531:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((_cpuid_info.ext_cpuid1_edx.value & flag) && strlen(_feature_extended_edx_id[fi]) > 0) {
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:626:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, cpu_type_desc, cpu_desc_len);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_ext_x86.cpp:642:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, cpu_detailed_desc_buffer, cpu_detailed_desc_len);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:145:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, cpu486);   // if cpuid doesn't support an input
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:178:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, std_cpuid4);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:194:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, std_cpuid4);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:216:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, std_cpuid1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:359:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jccb(Assembler::equal, start_simd_check); // return if AVX is not supported
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:395:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, legacy_setup);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:485:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        __ jcc(Assembler::equal, legacy_save_restore);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:564:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_wrapup);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vm_version_x86.cpp:566:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L_wrapup);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp:129:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vtableStubs_x86_32.cpp:241:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L1);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp:121:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L);
data/openjdk-16-16~14/src/hotspot/cpu/x86/vtableStubs_x86_64.cpp:238:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    __ jcc(Assembler::equal, L2);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:211:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(fieldbuf, "next_frame", buflen);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:215:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(fieldbuf, "frame_type", buflen);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:217:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(valuebuf, "ENTRY_FRAME", buflen);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:219:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(valuebuf, "INTERPRETER_FRAME", buflen);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:221:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(valuebuf, "FAKE_STUB_FRAME", buflen);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:247:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(fieldbuf, "call_wrapper", buflen);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:277:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               field[strlen(field) - 1] == ')' ? "(": "", field);
data/openjdk-16-16~14/src/hotspot/cpu/zero/frame_zero.cpp:280:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(fieldbuf, "(vtable for istate)", buflen);
data/openjdk-16-16~14/src/hotspot/cpu/zero/vm_version_ext_zero.cpp:78:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_name, CPU_TYPE_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/cpu/zero/vm_version_ext_zero.cpp:88:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(tmp, _cpu_desc, CPU_DETAILED_DESC_BUF_SIZE);
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:92:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_path, path, UNIX_PATH_MAX);
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:295:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = read(s, buf+off, left);
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:312:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:312:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:316:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            write_fully(s, msg, strlen(msg));
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:338:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || strlen(name) > AttachOperation::name_length_max) {
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:349:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(arg) > AttachOperation::arg_length_max) {
data/openjdk-16-16~14/src/hotspot/os/aix/attachListener_aix.cpp:450:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int rc = AixAttachListener::write_fully(this->socket(), msg, strlen(msg));
data/openjdk-16-16~14/src/hotspot/os/aix/loadlib_aix.cpp:249:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ldi->ldinfo_filename + strlen(ldi->ldinfo_filename) + 1;
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:592:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *ld_library_path = NEW_C_HEAP_ARRAY(char, strlen(v) + 1 + sizeof(DEFAULT_LIBPATH) + 1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1304:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!filename || strlen(filename) == 0) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1305:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    ::strncpy(ebuf, "dll_load: empty filename specified", ebuflen - 1);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1481:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 9", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1484:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 8", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1487:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 7", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1490:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 6 DD1.x", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1493:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 6", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1496:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 5", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1499:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 5_2", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1502:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Power PC 5_3", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1505:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_5_Compat", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1508:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_6_Compat", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1511:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_7_Compat", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1514:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_8_Compat", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1517:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "PV_9_Compat", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1520:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "unknown", buflen);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1580:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char *p = buf + strlen(buf) - 1;
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1607:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1617:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:1630:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, sizeof(saved_jvm_path));
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:2472:13:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
          ::usleep(1000);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:3206:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(os::file_separator());
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:3661:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); }
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:3690:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(path) > MAX_PATH - 1) {
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4046:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(uts.sysname, "?");
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4283:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(buffer);
data/openjdk-16-16~14/src/hotspot/os/aix/os_aix.cpp:4293:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:159:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:159:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:159:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:482:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:532:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:537:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:537:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                              strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:539:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "/");
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:571:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:571:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:574:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "/");
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:597:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:629:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:1052:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-16-16~14/src/hotspot/os/aix/perfMemory_aix.cpp:1084:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-16-16~14/src/hotspot/os/aix/porting_aix.cpp:255:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(p_name, demangled_name, namelen-1);
data/openjdk-16-16~14/src/hotspot/os/aix/porting_aix.cpp:263:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
      strncpy(p_name, "<nameless function>", namelen-1);
data/openjdk-16-16~14/src/hotspot/os/aix/porting_aix.cpp:284:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(p_name, lm.shortname, namelen);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:89:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_path, path, UNIX_PATH_MAX);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:274:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(s, buf+off, left), n);
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:291:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:291:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:295:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            write_fully(s, msg, strlen(msg));
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:317:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || strlen(name) > AttachOperation::name_length_max) {
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:328:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(arg) > AttachOperation::arg_length_max) {
data/openjdk-16-16~14/src/hotspot/os/bsd/attachListener_bsd.cpp:419:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int rc = BsdAttachListener::write_fully(this->socket(), msg, strlen(msg));
data/openjdk-16-16~14/src/hotspot/os/bsd/decoder_machO.cpp:101:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, symname, buflen);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:411:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             strlen(v) + 1 +
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:412:86:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             sizeof(SYS_EXT_DIR) + sizeof("/lib/") + strlen(cpu_arch) + sizeof(DEFAULT_LIBPATH) + 1,
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:432:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t system_ext_size = strlen(user_home_dir) + sizeof(SYS_EXTENSIONS_DIR) +
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:504:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             strlen(v) + 1 + strlen(l) + 1 +
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:504:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             strlen(v) + 1 + strlen(l) + 1 +
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1261:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ::strncpy(ebuf, error_report, ebuflen-1);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1292:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    ::strncpy(ebuf, error_report, ebuflen-1);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1298:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int diag_msg_max_length=ebuflen-strlen(ebuf);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1299:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* diag_msg_buf=ebuf+strlen(ebuf);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1316:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (::read(file_descriptor, &elf_head,sizeof(elf_head))));
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1539:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(os, "Darwin", sizeof(os));
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1541:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(os, "OpenBSD", sizeof(os));
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1543:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(os, "BSD", sizeof(os));
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1552:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
    strncpy(release, "", sizeof(release));
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1609:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(model, cpu_arch, sizeof(model));
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1616:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant character.
      strncpy(machine, "", sizeof(machine));
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1702:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char *p = buf + strlen(buf) - 1;
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1726:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1737:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1749:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:1762:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, MAXPATHLEN);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:2860:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(os::file_separator());
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3306:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); }
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3355:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(path) > MAX_PATH - 1) {
data/openjdk-16-16~14/src/hotspot/os/bsd/os_bsd.cpp:3738:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_perf_bsd.cpp:325:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int length = strlen(buffer);
data/openjdk-16-16~14/src/hotspot/os/bsd/os_perf_bsd.cpp:453:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name_buf, sockaddr->sdl_data, name_len);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:158:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:490:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:542:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:547:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:547:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:549:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "/");
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:569:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:569:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:572:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "/");
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:595:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:627:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:1073:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-16-16~14/src/hotspot/os/bsd/perfMemory_bsd.cpp:1105:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:90:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_path, path, UNIX_PATH_MAX);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:274:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(s, buf+off, left), n);
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:291:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:291:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if ((strlen(buf) != strlen(ver_str)) ||
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:295:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            write_fully(s, msg, strlen(msg));
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:317:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || strlen(name) > AttachOperation::name_length_max) {
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:328:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(arg) > AttachOperation::arg_length_max) {
data/openjdk-16-16~14/src/hotspot/os/linux/attachListener_linux.cpp:419:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int rc = LinuxAttachListener::write_fully(this->socket(), msg, strlen(msg));
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:101:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(file, c->subsystem_path(), MAXPATHLEN);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:103:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int filelen = strlen(file);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:104:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((filelen + strlen(filename)) > (MAXPATHLEN-1)) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupSubsystem_linux.hpp:108:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(file, filename, MAXPATHLEN-filelen);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:44:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, _mount_point, MAXPATHLEN);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:47:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        buflen = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:48:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((buflen + strlen(cgroup_path)) > (MAXPATHLEN-1)) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:51:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(buf, cgroup_path, MAXPATHLEN-buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:57:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, _mount_point, MAXPATHLEN);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:63:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strlen(cgroup_path) > strlen(_root)) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:63:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          if (strlen(cgroup_path) > strlen(_root)) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:65:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(buf, _mount_point, MAXPATHLEN);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:67:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            buflen = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:68:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((buflen + strlen(cgroup_path) - strlen(_root)) > (MAXPATHLEN-1)) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:68:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if ((buflen + strlen(cgroup_path) - strlen(_root)) > (MAXPATHLEN-1)) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:71:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
            strncat(buf, cgroup_path + strlen(_root), MAXPATHLEN-buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV1Subsystem_linux.cpp:71:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            strncat(buf, cgroup_path + strlen(_root), MAXPATHLEN-buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV2Subsystem_linux.cpp:225:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, mount_path, MAXPATHLEN);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV2Subsystem_linux.cpp:227:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buflen = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV2Subsystem_linux.cpp:228:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((buflen + strlen(cgroup_path)) > MAXPATHLEN) {
data/openjdk-16-16~14/src/hotspot/os/linux/cgroupV2Subsystem_linux.cpp:231:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(buf, cgroup_path, MAXPATHLEN-buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:241:9:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = fgetc(f);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:484:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             strlen(v) + 1 +
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1134:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int ch = fgetc(fp);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1588:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (filename == NULL || strlen(filename) == 0) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1823:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int diag_msg_max_length=ebuflen-strlen(ebuf);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1824:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* diag_msg_buf=ebuf+strlen(ebuf);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:1841:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (::read(file_descriptor, &elf_head,sizeof(elf_head))));
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2013:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ::strncpy(ebuf, error_report, ebuflen-1);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2076:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while ((bytes = ::read(fd, buf, sizeof(buf)-1)) > 0) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2263:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(distro, ptr, length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2269:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(distro, ptr, length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2275:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(distro, buf, length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2282:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(distro, buf, length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2308:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Debian ", buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2313:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "Linux", buflen);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2664:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          char *ptr = start + strlen(search_string);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2665:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          char *end = buf + strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2677:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(cpuinfo, ptr, length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2689:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "AArch64", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2691:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "x86_64", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2693:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "ARM", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2695:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "x86_32", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2697:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "IA64", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2699:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "PPC64", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2701:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "RISCV", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2703:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "S390", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2705:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "sparcv9", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2707:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(cpuinfo, ZERO_LIBARCH, length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2709:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(cpuinfo, "unknown", length);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2771:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char *p = buf + strlen(buf) - 1;
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2798:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2808:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:2821:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, MAXPATHLEN);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:3921:20:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          int ch = fgetc(fp);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5059:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(os::file_separator());
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5709:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  while (::read(0, buf, sizeof(buf)) <= 0) { ::sleep(100); }
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:5737:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(path) > MAX_PATH - 1) {
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6130:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t ret = ::read(core_pattern_file, core_pattern, core_pattern_len);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6186:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ssize_t ret = ::read(core_uses_pid_file, &core_uses_pid, 1);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6196:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strlen(buffer);
data/openjdk-16-16~14/src/hotspot/os/linux/os_linux.cpp:6200:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/linux/os_perf_linux.cpp:995:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t num_bytes = read(fd, buf, sizeof(buf));
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:163:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(tmpdir) == 4, "No longer using /tmp - update buffer size");
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:171:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:171:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:171:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:503:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:540:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(tmpdirname) == 4, "No longer using /tmp - update buffer size");
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:568:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:573:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:573:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:575:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "/");
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:607:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:607:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:610:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "/");
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:633:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:674:18:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int ch = fgetc(fp);
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:708:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:1155:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-16-16~14/src/hotspot/os/linux/perfMemory_linux.cpp:1187:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:165:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t n = ::strlen(s);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:169:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  ::strncpy(buf, s, n);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:197:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t fullname_len = strlen(dir) + strlen(name_template);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:197:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t fullname_len = strlen(dir) + strlen(name_template);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:530:19:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  mode_t umsk = ::umask(0);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:531:5:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  ::umask(umsk);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:659:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prefix_len = strlen(JNI_LIB_PREFIX);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:660:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t suffix_len = strlen(JNI_LIB_SUFFIX);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:664:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    name_len = strlen(lib_name);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:670:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(lib_name) <= (prefix_len + suffix_len)) {
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:674:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name_len = strlen(lib_name) - suffix_len;
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:677:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (lib_name != NULL ? name_len : 0) + strlen(sym_name) + 2;
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:684:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(agent_entry_name, "_");
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:685:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(agent_entry_name, lib_name, name_len);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:906:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(out, ret, outlen);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1016:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
  strncpy(buffer, "none", size);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1048:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t len = strlen(p);
data/openjdk-16-16~14/src/hotspot/os/posix/os_posix.cpp:1333:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(p) < outbuflen) {
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:139:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(pipe) <= pipe_name_max, "exceeds maximum length of pipe name");
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:198:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(cmd) > AttachOperation::name_length_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:199:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg0) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:200:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg1) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:201:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg2) > AttachOperation::arg_length_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:202:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(pipename) > Win32AttachOperation::pipe_name_max) return ATTACH_ERROR_ILLEGALARG;
data/openjdk-16-16~14/src/hotspot/os/windows/attachListener_windows.cpp:326:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fSuccess = write_pipe(hPipe, msg, (int)strlen(msg));
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:362:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (char* next = buffer; next != end && (*next != '\0'); next = &next[strlen(next) + 1], ++instances);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:371:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(counter_path) < sizeof(counter_path), "invariant");
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:542:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t counter_path_len = strlen(object_name) + strlen(counter_name);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:542:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t counter_path_len = strlen(object_name) + strlen(counter_name);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:555:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    counter_path_len += strlen(image_name);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:564:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    counter_path_len += strlen(instance);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:582:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      counter_path_len += strlen(instance);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:660:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(string);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:662:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(cheap_allocated_string, string, len + 1);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:738:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t id_process_base_length = strlen(process_image_name) +
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:739:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        strlen(pdh_localized_process_object) +
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:740:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        strlen(pdh_localized_IDProcess_counter);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:826:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (count = 0, tmp = const_cast<char*>(instances); *tmp != '\0'; tmp = &tmp[strlen(tmp) + 1], count++);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:877:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t counter_len = strlen(processor);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:878:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  counter_len += strlen(counter_name);
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:882:75:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (char* tmp = const_cast<char*>(instances); *tmp != '\0'; tmp = &tmp[strlen(tmp) + 1], index++) {
data/openjdk-16-16~14/src/hotspot/os/windows/os_perf_windows.cpp:883:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t tmp_len = strlen(tmp);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:207:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(home_dir, alt_home_dir, MAX_PATH + 1);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:224:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    home_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + 1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:229:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dll_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + strlen(bin) + 1,
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:229:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dll_path = NEW_C_HEAP_ARRAY(char, strlen(home_dir) + strlen(bin) + 1,
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:260:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    sizeof(BIN_DIR) + (path_str ? strlen(path_str) : 0) + 10, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:269:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(library_path, ";");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:274:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(library_path, ";");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:278:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(library_path, ";");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:282:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(library_path, ";");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1134:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  dirp->path = (char *)malloc(strlen(dirname) + 5, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1382:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(ebuf, "Can't find dependent libraries", ebuflen - 1);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1405:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (os::read(fd, (void*)&signature_offset, sizeof(signature_offset))))
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1414:32:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     (sizeof(lib_arch) != (os::read(fd, (void*)&lib_arch, sizeof(lib_arch))))
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1634:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = MAX_PATH - (UINT)strlen("\\kernel32.dll") - 1;
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1640:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
  strncat(kernel32_path, "\\kernel32.dll", MAX_PATH - ret);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1754:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(buf, "## __CPU__", buflen);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1759:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(buf, "## __CPU__", buflen);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1885:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(java_home_var) < (size_t)buflen) {
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1886:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, java_home_var, buflen);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1890:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1896:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1904:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(saved_jvm_path, buf, MAX_PATH);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1951:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t n = strlen(s);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:1953:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, s, n);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:2987:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullname_len = strlen(dir) + strlen(name_template);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:2987:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullname_len = strlen(dir) + strlen(name_template);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:3904:5:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    fgetc(stdin);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4203:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t buf_len = 1 + MAX2((size_t)3, strlen(path));
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4205:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(buf, path, buf_len);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4229:25:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prefix_len = wcslen(prefix);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4230:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t result_len = prefix_len - prefix_off + wcslen(converted_path) + additional_space + 1;
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4235:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result_len = wcslen(result);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4470:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (wide_path[wcslen(wide_path) - 1] == L'\\') {
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:4471:5:  [1] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant
  character.
    wcscat(wide_path, L"*");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5327:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(cmd) + strlen(cmd_prefix) + 1;
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5327:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(cmd) + strlen(cmd_prefix) + 1;
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5379:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(buf) < sizeof(buf) - 1) {
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5504:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5548:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prefix_len = strlen(JNI_LIB_PREFIX);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5549:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t suffix_len = strlen(JNI_LIB_SUFFIX);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5553:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = name_len = strlen(lib_name);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5568:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      name_len = strlen(lib_name) - suffix_len;
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5571:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = (lib_name != NULL ? name_len : 0) + strlen(sym_name) + 2;
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5580:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(agent_entry_name, sym_name, (p - sym_name));
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5583:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(agent_entry_name, "_");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5584:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(agent_entry_name, lib_name, name_len);
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5589:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(agent_entry_name, "_");
data/openjdk-16-16~14/src/hotspot/os/windows/os_windows.cpp:5590:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(agent_entry_name, lib_name, name_len);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:162:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:162:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:162:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:278:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:287:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:325:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:330:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:330:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:332:5:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    strcat(usrdir_name, "\\");
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:362:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:362:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:365:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(filename, "\\");
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:398:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          latest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:448:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nbytes = (int)strlen(PERFDATA_NAME) + (int)strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:448:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int nbytes = (int)strlen(PERFDATA_NAME) + (int)strlen(user) + 3;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:469:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:486:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + strlen(filename) + 2;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:486:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t nbytes = strlen(dirname) + strlen(filename) + 2;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:490:3:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  strcat(path, "\\");
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:563:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(root_path, path, len + 1);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:568:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(root_path) >= 3, "device specifier too short");
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1096:39:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
                                DWORD umask, DWORD emask, DWORD amask) {
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1102:18:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  aces[0].mask = umask;
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1172:50:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  return make_user_everybody_admin_security_attr(umask, emask, amask);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1193:50:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  return make_user_everybody_admin_security_attr(umask, emask, amask);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1214:50:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
  return make_user_everybody_admin_security_attr(umask, emask, amask);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1607:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (user == NULL || strlen(user) == 0) {
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1640:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
data/openjdk-16-16~14/src/hotspot/os/windows/perfMemory_windows.cpp:1641:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* robjectname = NEW_RESOURCE_ARRAY(char, strlen(objectname) + 1);
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:212:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(directory);
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:237:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(directory);
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:242:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len_now = strlen(p);
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:465:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ::strncpy(buf, pSymbol->Name, buflen - 1);
data/openjdk-16-16~14/src/hotspot/os/windows/symbolengine.cpp:605:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      ::strncpy(buf, p, buflen - 1);
data/openjdk-16-16~14/src/hotspot/os_cpu/aix_ppc/prefetch_aix_ppc.inline.hpp:32:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void *loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_x86/prefetch_bsd_x86.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/bsd_zero/prefetch_bsd_zero.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void* loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_aarch64/prefetch_linux_aarch64.inline.hpp:32:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_arm/prefetch_linux_arm.inline.hpp:30:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_ppc/prefetch_linux_ppc.inline.hpp:32:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void *loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_s390/prefetch_linux_s390.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void* loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_x86/prefetch_linux_x86.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/linux_zero/prefetch_linux_zero.inline.hpp:31:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read(void* loc, intx interval) {
data/openjdk-16-16~14/src/hotspot/os_cpu/windows_x86/prefetch_windows_x86.inline.hpp:30:23:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline void Prefetch::read (void *loc, intx interval) {}
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:214:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          char* buf = (char*) AllocateHeap(strlen(instr->_ident) + 4);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:2862:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* ec_name = (char*) AllocateHeap(strlen(inst._ident) + strlen(prefix) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:2862:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* ec_name = (char*) AllocateHeap(strlen(inst._ident) + strlen(prefix) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:2957:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) {
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:3066:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) {
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:3235:73:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strncmp("MachCall", inst.mach_base_class(_globalNames), strlen("MachCall")) != 0 ) {
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:3333:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* ec_name = (char*) AllocateHeap(strlen(inst._ident) + strlen(prefix) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:3333:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* ec_name = (char*) AllocateHeap(strlen(inst._ident) + strlen(prefix) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:3666:9:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  char *equal;
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:3737:40:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  Interface *inter = new CondInterface(equal,         equal_format,
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4466:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* result = (char *)AllocateHeap(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4466:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* result = (char *)AllocateHeap(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4466:81:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* result = (char *)AllocateHeap(strlen(location) + strlen(cppBlock) + strlen(end_loc) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4529:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (pre_skip_ptr+strlen(pre_skip_ptr) != _ptr+strlen(_ptr)) {
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4529:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (pre_skip_ptr+strlen(pre_skip_ptr) != _ptr+strlen(_ptr)) {
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4555:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* result = (char *)AllocateHeap(strlen(location) + strlen(token2) + strlen(end_loc) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4555:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* result = (char *)AllocateHeap(strlen(location) + strlen(token2) + strlen(end_loc) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4555:77:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* result = (char *)AllocateHeap(strlen(location) + strlen(token2) + strlen(end_loc) + 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4589:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(start) > 24) {
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4591:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, start, 20);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:4653:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* buf = (char*) AllocateHeap(strlen(param) + 3);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:5063:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert( _ptr >= _curline && _ptr < _curline+strlen(_curline),
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:5261:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* location = (char *)AllocateHeap(strlen(file) + 100);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:5315:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (eol == NULL)  eol = cp + strlen(cp);
data/openjdk-16-16~14/src/hotspot/share/adlc/adlparse.cpp:5367:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* end = token + strlen(token);
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:36:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *upper  = new char[strlen(str)+1];
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:38:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const char *end    = str + strlen(str);
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:816:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int         length  = (int)strlen(rc_name) + (int)strlen(mask) + 5;
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:816:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int         length  = (int)strlen(rc_name) + (int)strlen(mask) + 5;
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:909:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   length         = (int)strlen(stack_or) + (int)strlen(reg_mask_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/adlc/archDesc.cpp:909:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   length         = (int)strlen(stack_or) + (int)strlen(reg_mask_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/adlc/dfa.cpp:561:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(shared_pred_loc, shared_pred_var, strlen(shared_pred_var));
data/openjdk-16-16~14/src/hotspot/share/adlc/dfa.cpp:561:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncpy(shared_pred_loc, shared_pred_var, strlen(shared_pred_var));
data/openjdk-16-16~14/src/hotspot/share/adlc/dfa.cpp:749:5:  [1] (buffer) sprintf:
  Does not check for buffer overflows (CWE-120). Use sprintf_s, snprintf, or
  vsnprintf. Risk is low because the source is a constant character.
    sprintf( string_buffer, "0");
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1509:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(s, "("); s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1509:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcpy(s, "("); s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1510:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, _predicate->_pred, buflen - strlen(s) - 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1510:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncpy(s, _predicate->_pred, buflen - strlen(s) - 1);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1511:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1512:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(s, ")"); s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1512:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcpy(s, ")"); s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1522:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1526:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1528:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1529:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strcpy(s," == "); s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1531:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1532:7:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
      strcpy(s,")"); s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1532:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strcpy(s,")"); s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:1537:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert( strlen(buf) < sizeof(buf), "String buffer overflow" );
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:2779:42:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
CondInterface::CondInterface(const char* equal,         const char* equal_format,
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:2788:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    _equal(equal),                 _equal_format(equal_format),
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3417:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cnt = _lChild->build_instr_pred( buf+strlen(buf), name, cnt );
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3422:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    cnt = _rChild->build_instr_pred( buf+strlen(buf), name, cnt );
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3442:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(_opType) + 4;
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3447:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += (int)strlen(lstr) + (int)strlen(rstr);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3447:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += (int)strlen(lstr) + (int)strlen(rstr);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.cpp:3871:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* buf = (char*) AllocateHeap(strlen(instr_ident) + 4);
data/openjdk-16-16~14/src/hotspot/share/adlc/formssel.hpp:820:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  CondInterface(const char* equal,         const char* equal_format,
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:96:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:100:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          AD._HPP_file._name = s; s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:103:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          AD._VM_file._name = s; s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:108:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:119:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:129:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            s += strlen(s);
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:455:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ep = fname + strlen(fname) - 1; // start at last character and look for '.'
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:466:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(base) + (int)strlen(suffix) + 1;
data/openjdk-16-16~14/src/hotspot/share/adlc/main.cpp:466:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(base) + (int)strlen(suffix) + 1;
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:188:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      templen += 10 + (int)strlen(tmppipeopnd->_stage);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:270:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int stagelen = (int)strlen(pipeline->_stages.name(res_stages[i]-1));
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:275:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    commentlen += (int)strlen(pipeline->_reslist.name(i));
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:289:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      resname, max_stage - (int)strlen(resname) + 1,
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:350:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    commentlen += (int)strlen(pipeline->_reslist.name(i));
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:430:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (int)(strlen(pipeline_use_cycle_mask) + (int)strlen(pipeline_use_element) +
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:430:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (int)(strlen(pipeline_use_cycle_mask) + (int)strlen(pipeline_use_element) +
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:523:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(resource_mask) > 0)
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:758:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       resourcenamelen += (int)strlen(resourcename));
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:884:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(pipeline_res_masks.name(pipeline_res_mask_index)) > 0)
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:1169:11:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
          strcpy(left_reg_index, "");
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:1182:13:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
            strcpy(right_reg_index, "");
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:3279:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int ident_len = (int)strlen(instr->_ident);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_c.cpp:3928:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp("MachCall", inst->mach_base_class(_globalNames), strlen("MachCall"))) {
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:89:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (int j = 0; j < 20-(int)strlen(reg_def->_regname); j++) fprintf(fp_hpp, " ");
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:140:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(reg_def->_regname);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:151:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      for (size_t i = strlen(reg_def->_regname); i < maxlen; i++) fprintf(fp_hpp, " ");
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:1346:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if( equal != NULL ) {
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:1347:67:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
          define_oper_interface(fp, *oper, _globalNames, "equal", equal);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:2205:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int stagelen = (int)strlen("undefined");
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:2211:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int len = (int)strlen(stage);
data/openjdk-16-16~14/src/hotspot/share/adlc/output_h.cpp:2242:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int len = (int)strlen(resource);
data/openjdk-16-16~14/src/hotspot/share/aot/aotCodeHeap.cpp:652:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int klass_len = (int)strlen(klass_name);
data/openjdk-16-16~14/src/hotspot/share/aot/aotLoader.cpp:152:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const int len = (int)strlen(AOTLibrary);
data/openjdk-16-16~14/src/hotspot/share/c1/c1_Runtime1.cpp:659:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(len < strlen("Index %d out of bounds for length %d"), "Must allocate more space for message.");
data/openjdk-16-16~14/src/hotspot/share/ci/ciInstanceKlass.hpp:276:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return is_in_package(packagename, (int) strlen(packagename));
data/openjdk-16-16~14/src/hotspot/share/ci/ciObjArrayKlass.cpp:121:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(&name[pos], (char*)element_name->base(), element_len);
data/openjdk-16-16~14/src/hotspot/share/ci/ciObjArrayKlass.cpp:125:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(&name[pos], (char*)element_name->base(), element_len);
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:187:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int read;
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:188:38:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (sscanf(_bufptr, "%i%n", &v, &read) != 1) {
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:191:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      _bufptr += read;
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:202:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int read;
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:203:50:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (sscanf(_bufptr, INTPTR_FORMAT "%n", &v, &read) != 1) {
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:206:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      _bufptr += read;
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:404:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        c = getc(_stream); // get next char
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:411:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      c = getc(_stream);
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:424:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = getc(_stream);
data/openjdk-16-16~14/src/hotspot/share/ci/ciReplay.cpp:503:13:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = getc(_stream);
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.cpp:329:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          utf8_length = (u2) strlen(str);
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileParser.cpp:6060:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t new_name_len = _class_name->utf8_length() + 2 + strlen(addr_buf);
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileStream.cpp:60:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t source_len = strlen(src);
data/openjdk-16-16~14/src/hotspot/share/classfile/classFileStream.cpp:62:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(source_copy, src, source_len + 1);
data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.cpp:82:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _line_len = (int)strlen(_line);
data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.cpp:99:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(_line);
data/openjdk-16-16~14/src/hotspot/share/classfile/classListParser.cpp:202:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(option_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:154:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:155:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_to_find_len = strlen(str_to_find);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:172:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:173:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_to_find_len = strlen(str_to_find);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:236:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* copy = NEW_C_HEAP_ARRAY(char, strlen(path)+1, mtClass);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:244:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1;
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:244:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1;
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:244:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1;
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:256:29:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      size_t num_read = os::read(file_handle, (char*) buffer, st.st_size);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:362:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name) + 1;
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:490:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(name) < 256) {
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:696:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(home) + strlen(module_name) + 10;
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:696:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(home) + strlen(module_name) + 10;
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:760:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          msg = NEW_RESOURCE_ARRAY_IN_THREAD(thread, char, strlen(path) + 128); ;
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:761:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          jio_snprintf(msg, strlen(path) + 127, "error in opening JAR file %s", path);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:763:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          int len = (int)(strlen(path) + strlen(error_msg) + 128);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:763:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          int len = (int)(strlen(path) + strlen(error_msg) + 128);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:1093:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert((int)strlen(class_name) == class_name_len, "invariant");
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:1102:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(file_name, class_name, class_name_len);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:1103:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(&file_name[class_name_len], class_suffix, class_suffix_len);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoader.cpp:1624:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* orig_copy = NEW_RESOURCE_ARRAY_IN_THREAD(THREAD, char, strlen(orig)+1);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderExt.cpp:126:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  *manifest_size = (jint)strlen(manifest);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderExt.cpp:132:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int tag_len = (int)strlen(tag);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderExt.cpp:180:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (cp_attr != NULL && strlen(cp_attr) > 0) {
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderExt.cpp:195:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* end = file_start + strlen(file_start);
data/openjdk-16-16~14/src/hotspot/share/classfile/classLoaderExt.cpp:206:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t name_len = strlen(file_start);
data/openjdk-16-16~14/src/hotspot/share/classfile/compactHashtable.cpp:303:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(ver);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaAssertions.cpp:62:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaAssertions.cpp:165:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(classname);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:172:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol name = SymbolTable::probe(name_string, (int)strlen(name_string));
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:333:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (UTF8::is_legal_utf8((const unsigned char*)utf8_str, (int)strlen(utf8_str), false)) {
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:596:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(result_length == (int)strlen(result) + 1, "must match");
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:1550:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int         siglen = (int) strlen(sigstr);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2270:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int buf_len = (int)strlen(klass_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2273:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  buf_len += (int)strlen(method_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2279:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf_len += (int)strlen(source_file_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2286:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf_len += (int)strlen(module_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2289:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      buf_len += (int)strlen(module_version);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2302:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(buf + (int)strlen(buf), "%s@%s/", module_name, module_version);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2304:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      sprintf(buf + (int)strlen(buf), "%s/", module_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2319:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(buf + (int)strlen(buf), "%s:%d)", source_file_name, line_number);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2322:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(buf + (int)strlen(buf), "%s)", source_file_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2325:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(buf + (int)strlen(buf), "Unknown Source)");
data/openjdk-16-16~14/src/hotspot/share/classfile/javaClasses.cpp:2329:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(buf + (int)strlen(buf), "(nmethod " INTPTR_FORMAT ")", (intptr_t)nm);
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:341:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t pkg_len = strlen(package_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:343:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(pkg_name, package_name, pkg_len + 1);
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:347:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1;
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:347:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1;
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:347:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + pkg_len + 1;
data/openjdk-16-16~14/src/hotspot/share/classfile/modules.cpp:655:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(package_name) == 0) {
data/openjdk-16-16~14/src/hotspot/share/classfile/symbolTable.cpp:498:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(name);
data/openjdk-16-16~14/src/hotspot/share/classfile/symbolTable.hpp:191:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return new_symbol(name, (int)strlen(name));
data/openjdk-16-16~14/src/hotspot/share/classfile/systemDictionary.cpp:204:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if ((int)strlen(name) > Symbol::max_length()) {
data/openjdk-16-16~14/src/hotspot/share/classfile/systemDictionary.cpp:214:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(UTF8::is_legal_utf8((const unsigned char*)name, (int)strlen(name), false),
data/openjdk-16-16~14/src/hotspot/share/classfile/verifier.cpp:613:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         create_temporary_symbol(sig, (int)strlen(sig)));
data/openjdk-16-16~14/src/hotspot/share/classfile/verifier.cpp:3037:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = (int)strlen(component_name);
data/openjdk-16-16~14/src/hotspot/share/classfile/verifier.cpp:3052:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length = (int)strlen(component_name) + 3;
data/openjdk-16-16~14/src/hotspot/share/classfile/vmSymbols.cpp:67:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t skiplen = strlen(string);
data/openjdk-16-16~14/src/hotspot/share/classfile/vmSymbols.cpp:90:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      string += strlen(string); // skip string body
data/openjdk-16-16~14/src/hotspot/share/classfile/vmSymbols.cpp:180:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string += strlen(string); // skip string body
data/openjdk-16-16~14/src/hotspot/share/classfile/vmSymbols.cpp:292:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Symbol* symbol = SymbolTable::probe(symbol_name, (int) strlen(symbol_name));
data/openjdk-16-16~14/src/hotspot/share/classfile/vmSymbols.cpp:839:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    string += strlen(string); // skip string body
data/openjdk-16-16~14/src/hotspot/share/code/codeBlob.cpp:180:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(name1) + strlen(name2) < sizeof(stub_id), "");
data/openjdk-16-16~14/src/hotspot/share/code/codeBlob.cpp:180:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(name1) + strlen(name2) < sizeof(stub_id), "");
data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.cpp:140:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (((_termString) != NULL) && (strlen(_termString) > 0)){\
data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.cpp:154:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (((_termString) != NULL) && (strlen(_termString) > 0)){\
data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.cpp:194:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (((_termString) != NULL) && (strlen(_termString) > 0)){\
data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.cpp:2348:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lineLen += (unsigned int)strlen(text1); // text1 is much shorter than MAX_INT chars.
data/openjdk-16-16~14/src/hotspot/share/code/codeHeapState.cpp:2351:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    lineLen += (unsigned int)strlen(text2); // text2 is much shorter than MAX_INT chars.
data/openjdk-16-16~14/src/hotspot/share/code/compressedStream.hpp:67:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  inline u_char read()                 { return _buffer[_position++]; }
data/openjdk-16-16~14/src/hotspot/share/code/compressedStream.hpp:108:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  jboolean read_bool()                 { return (jboolean) read();      }
data/openjdk-16-16~14/src/hotspot/share/code/compressedStream.hpp:109:60:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  jbyte    read_byte()                 { return (jbyte   ) read();      }
data/openjdk-16-16~14/src/hotspot/share/code/compressedStream.hpp:112:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  jint     read_int()                  { jint   b0 = read();
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:90:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (char *) comp_name, strlen(comp_name),                             \
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:102:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      (char *) comp_name, strlen(comp_name),                             \
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:2036:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      remaining_log = remaining_log + strlen(remaining_log);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:2390:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t s1len = strlen(class_name);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.cpp:2391:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t s2len = strlen(method_name);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileBroker.hpp:64:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(_current_method, method, (size_t)cmname_buffer_length-1);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.cpp:49:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _file = NEW_C_HEAP_ARRAY(char, strlen(file_name)+1, mtCompiler);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.cpp:228:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        bytes_read = read(partial_fd, buf, (int)nr);
data/openjdk-16-16~14/src/hotspot/share/compiler/compileLog.cpp:238:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      while ((bytes_read = read(partial_fd, buf, buflen-1)) > 0) {
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerDirectives.cpp:190:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* canonicalized_list = NEW_C_HEAP_ARRAY(char, strlen(option_value) + 1, mtCompiler);
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:480:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* value = NEW_RESOURCE_ARRAY(char, strlen(line) + 1);
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:491:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* value = NEW_RESOURCE_ARRAY(char, strlen(line) + 1);
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:708:12:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int  c = getc(stream);
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:717:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(stream);
data/openjdk-16-16~14/src/hotspot/share/compiler/compilerOracle.cpp:797:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(newName, name, i);
data/openjdk-16-16~14/src/hotspot/share/compiler/directivesParser.cpp:97:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      ssize_t num_read = os::read(file_handle, (char*) buffer, st.st_size);
data/openjdk-16-16~14/src/hotspot/share/compiler/directivesParser.cpp:196:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, str, len);
data/openjdk-16-16~14/src/hotspot/share/compiler/directivesParser.cpp:319:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(s, v->str.start, v->str.length + 1);
data/openjdk-16-16~14/src/hotspot/share/compiler/directivesParser.cpp:380:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(s, v->str.start, v->str.length);
data/openjdk-16-16~14/src/hotspot/share/compiler/directivesParser.cpp:400:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(s, v->str.start, v->str.length);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:89:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t eventlen = strlen(event);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:90:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t taglen   = strlen(tag);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:102:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t opt_so_far = strlen(_option_buf);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:103:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (opt_so_far + 1 + strlen(p) + 1 > sizeof(_option_buf))  return;
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:280:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = strlen(line);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:575:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  strlen((const char*)arg) > sizeof(buffer) - 1)) {
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:577:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buffer, (const char*)arg, sizeof(buffer) - 1);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:696:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t flen = strlen(format);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.cpp:816:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  lib_offset = jvm_offset = strlen(buf);
data/openjdk-16-16~14/src/hotspot/share/compiler/disassembler.hpp:102:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return DecodeErrorFile && (strlen(DecodeErrorFile) != 0);
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:190:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t clen = strlen(candidate_string);
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:191:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t mlen = strlen(match_string);
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:206:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) == 1) {
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:210:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(name, name + 1, strlen(name + 1) + 1);
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:213:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/openjdk-16-16~14/src/hotspot/share/compiler/methodMatcher.cpp:219:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(name) == 0) {
data/openjdk-16-16~14/src/hotspot/share/gc/epsilon/epsilonMonitoringSupport.cpp:55:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Arguments.cpp:66:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(VerifyGCType) > 0) {
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Arguments.cpp:68:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t length = strlen(VerifyGCType);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1Arguments.cpp:70:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(type_list, VerifyGCType, length + 1);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1ConcurrentMark.cpp:841:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Prefetch::read(curr, interval);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1GCPhaseTimes.cpp:69:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* oop_storage_phase_name = NEW_C_HEAP_ARRAY(char, strlen(phase_name_postfix) + strlen(it->name()) + 1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1GCPhaseTimes.cpp:69:88:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* oop_storage_phase_name = NEW_C_HEAP_ARRAY(char, strlen(phase_name_postfix) + strlen(it->name()) + 1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/g1/g1OopClosures.inline.hpp:51:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Prefetch::read(obj->mark_addr_raw(), (HeapWordSize*2));
data/openjdk-16-16~14/src/hotspot/share/gc/parallel/psGenerationCounters.cpp:45:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/parallel/spaceCounters.cpp:42:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/serial/cSpaceCounters.cpp:42:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/collectorCounters.cpp:39:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/generationCounters.cpp:39:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/hSpaceCounters.cpp:44:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/oopStorage.cpp:965:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  total_size += strlen(name()) + 1;
data/openjdk-16-16~14/src/hotspot/share/gc/shared/ptrQueue.cpp:117:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_name, name, sizeof(_name) - 1);
data/openjdk-16-16~14/src/hotspot/share/gc/shared/space.inline.hpp:331:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Prefetch::read(cur_obj, scan_interval);
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp:477:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (strlen(call->_name) > 5 &&
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/c2/shenandoahSupport.cpp:478:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 !strcmp(call->_name + strlen(call->_name) - 5, "_fill")) {
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeap.inline.hpp:439:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        Prefetch::read(cb, oopDesc::mark_offset_in_bytes());
data/openjdk-16-16~14/src/hotspot/share/gc/shenandoah/shenandoahHeapRegionCounters.cpp:43:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_space = NEW_C_HEAP_ARRAY(char, strlen(cns)+1, mtGC);
data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp:233:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bool have_msg = (msg != NULL && strlen(msg) > 0);
data/openjdk-16-16~14/src/hotspot/share/interpreter/bootstrapInfo.cpp:249:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int pos = (int) strlen(argbuf);
data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeUtils.cpp:241:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(signature);
data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeUtils.cpp:242:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t skip_len = strlen("java.lang.");
data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodeUtils.cpp:243:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t min_pattern_len = strlen("java.lang.String");
data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodes.cpp:159:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len  = (format      != NULL ? (int) strlen(format)      : 0);
data/openjdk-16-16~14/src/hotspot/share/interpreter/bytecodes.cpp:160:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int wlen = (wide_format != NULL ? (int) strlen(wide_format) : 0);
data/openjdk-16-16~14/src/hotspot/share/interpreter/templateTable.cpp:388:96:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  def(Bytecodes::_ifeq                , ubcp|____|clvm|____, itos, vtos, if_0cmp             , equal        );
data/openjdk-16-16~14/src/hotspot/share/interpreter/templateTable.cpp:394:96:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  def(Bytecodes::_if_icmpeq           , ubcp|____|clvm|____, itos, vtos, if_icmp             , equal        );
data/openjdk-16-16~14/src/hotspot/share/interpreter/templateTable.cpp:400:96:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  def(Bytecodes::_if_acmpeq           , ubcp|____|clvm|____, atos, vtos, if_acmp             , equal        );
data/openjdk-16-16~14/src/hotspot/share/interpreter/templateTable.cpp:433:96:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  def(Bytecodes::_ifnull              , ubcp|____|clvm|____, atos, vtos, if_nullcmp          , equal        );
data/openjdk-16-16~14/src/hotspot/share/interpreter/templateTable.hpp:84:20:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  enum Condition { equal, not_equal, less, less_equal, greater, greater_equal };
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:193:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int nof_members = JfrBigEndian::read<u2>(buffer + index - 2);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:237:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int nof_values = JfrBigEndian::read<u2>(buffer + index - 2);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:268:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return JfrBigEndian::read<u2>(_buffer + _current + value_relative_offset);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:297:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return JfrBigEndian::read<u2>(_buffer + number_of_elements_offset);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:302:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return _ik->constants()->symbol_at(JfrBigEndian::read<u2>(_buffer + _current));
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:306:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return JfrBigEndian::read<u1>(_buffer + _current + value_type_relative_offset);
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:357:54:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return _ik->constants()->symbol_at(JfrBigEndian::read<u2>(_buffer + _current));
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrEventClassTransformer.cpp:1490:76:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strncmp(ik->name()->as_C_string(), new_ik->name()->as_C_string(), strlen(ik->name()->as_C_string())) == 0, "invariant");
data/openjdk-16-16~14/src/hotspot/share/jfr/instrumentation/jfrJvmtiAgent.cpp:129:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length += strlen(jvmti_error_name);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:81:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(_buffer);
data/openjdk-16-16~14/src/hotspot/share/jfr/leakprofiler/checkpoint/objectSampleDescription.cpp:84:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(copy, _buffer, len + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:68:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t length = strlen(name);
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrNetworkUtilization.cpp:70:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(entry.name, name, length + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/periodic/jfrOSInterface.cpp:299:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(key, variable, key_length);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/jfrCheckpointManager.cpp:253:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return JfrBigEndian::read<Return>(data);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:231:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_thread_group_name, strlen(_thread_group_name) + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:241:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(tgname);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrThreadGroup.cpp:243:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_thread_group_name, tgname, len + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:110:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t length = strlen(resource_str);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:113:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(c_string, resource_str, length + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:129:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t length = strlen(query);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:142:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  JfrCHeapObj::free(const_cast<char*>(entry->literal()), strlen(entry->literal() + 1));
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:211:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t hash_len = strlen(hash_buf);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:215:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(hidden_or_anon_symbol) == result_len, "invariant");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/checkpoint/types/jfrTypeSetUtils.cpp:217:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(hidden_or_anon_symbol) == result_len + hash_len, "invariant");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/jfrRecorder.cpp:117:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CmdLine cmdline(options, strlen(options), true);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunk.cpp:73:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_path, strlen(_path) + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunk.cpp:180:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t path_len = strlen(path);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunk.cpp:182:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(new_path, path, path_len + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrChunk.cpp:188:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_path, strlen(_path) + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:72:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t cwd_len = strlen(_path_buffer);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:77:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return (result == -1) ? 0 : strlen(_path_buffer);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:123:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const bool result = Arguments::copy_expand_pid(filename_fmt, strlen(filename_fmt), _path_buffer + path_len, JVM_MAXPATHLEN - path_len);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:188:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(iso8601_str) == iso8601_len, "invariant");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:206:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(buffer) >= iso8601_len + 1, "invariant");
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:252:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t len = strlen(file_name);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:278:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(file_name_copy, file_name, len + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrEmergencyDump.cpp:386:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t repository_path_len = strlen(repository_path);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:62:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_path, strlen(_path) + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:100:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    JfrCHeapObj::free(_path, strlen(_path) + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:102:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t path_len = strlen(path);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/repository/jfrRepository.cpp:107:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_path, path, path_len + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:277:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t length = strlen((const char*)FlightRecorderOptions);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:284:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t option_length = strlen(option.name);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:340:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(repo);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:345:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(repo_copy, repo, len + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:703:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t value_length = strlen(value);
data/openjdk-16-16~14/src/hotspot/share/jfr/recorder/service/jfrOptionSet.cpp:710:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(startup_value, value, value_length + 1);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp:52:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static T read(const void* location);
data/openjdk-16-16~14/src/hotspot/share/jfr/utilities/jfrBigEndian.hpp:114:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline T JfrBigEndian::read(const void* location) {
data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrEncoding.hpp:100:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = MIN2<u2>(max_jushort, (jushort)strlen(value));
data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp:97:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const jint len = MIN2<jint>(max_jint, (jint)strlen(value));
data/openjdk-16-16~14/src/hotspot/share/jfr/writers/jfrWriterHost.inline.hpp:309:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = MIN2<u2>(max_jushort, (u2)strlen(value));
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:298:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t name_buf_len = strlen(vmField.typeName) + strlen(vmField.fieldName) + 2 /* "::" */;
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:298:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t name_buf_len = strlen(vmField.typeName) + strlen(vmField.fieldName) + 2 /* "::" */;
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciCompilerToVMInit.cpp:322:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 vmField.typeString[strlen(vmField.typeString) - 1] == '*') {
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciJavaClasses.cpp:65:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Symbol* name_symbol = SymbolTable::probe(name, (int)strlen(name));
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciJavaClasses.cpp:66:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  Symbol* signature_symbol = SymbolTable::probe(signature, (int)strlen(signature));
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.cpp:513:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t detail_msg_length = strlen(buf) * 2;
data/openjdk-16-16~14/src/hotspot/share/jvmci/jvmciRuntime.hpp:59:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size += (int) strlen(nmethod_mirror_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:142:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    prefix_len = strlen(prefix);
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:144:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t name_len = strlen(name);
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:181:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strncmp(name, LogFileOutput::Prefix, strlen(LogFileOutput::Prefix)) == 0) {
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:272:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(output->config_string()) > 0, "should always have a config description");
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:408:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (outputstr == NULL || strlen(outputstr) == 0) {
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:432:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(outputstr) + strlen(implicit_output_prefix) + 1;
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:432:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(outputstr) + strlen(implicit_output_prefix) + 1;
data/openjdk-16-16~14/src/hotspot/share/logging/logConfiguration.cpp:445:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (output_options != NULL && strlen(output_options) > 0) {
data/openjdk-16-16~14/src/hotspot/share/logging/logDecorators.cpp:47:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (decorator_args == NULL || strlen(decorator_args) == 0) {
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:51:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _file_name = make_file_name(name + strlen(Prefix), _pid_str, _vm_start_time_str);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:55:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(_archive_name) == 0) {
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:88:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!isdigit(*value_str) || end != value_str + strlen(value_str) || value >= SIZE_MAX) {
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:131:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(filename) + number_of_digits + 2;
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:173:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (options == NULL || strlen(options) == 0) {
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:243:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _archive_name_len = 2 + strlen(_file_name) + _file_count_max_digits;
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:402:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      first_replace_len = strlen(PidFilenamePlaceholder);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:406:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      second_replace_len = strlen(PidFilenamePlaceholder);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:414:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      first_replace_len = strlen(TimestampFilenamePlaceholder);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:418:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      second_replace_len = strlen(TimestampFilenamePlaceholder);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:422:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t first_len = strlen(first);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:423:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t second_len = strlen(second);
data/openjdk-16-16~14/src/hotspot/share/logging/logFileOutput.cpp:426:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t result_len =  strlen(file_name) + first_len - first_replace_len + second_len - second_replace_len;
data/openjdk-16-16~14/src/hotspot/share/logging/logLevel.cpp:46:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(level);
data/openjdk-16-16~14/src/hotspot/share/logging/logLevel.cpp:52:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    double score = StringUtils::similarity(level, len, levelname, strlen(levelname));
data/openjdk-16-16~14/src/hotspot/share/logging/logOutput.cpp:61:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _config_string_buffer_size = strlen(_config_string) + 1;
data/openjdk-16-16~14/src/hotspot/share/logging/logOutput.cpp:70:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t offset = strlen(_config_string);
data/openjdk-16-16~14/src/hotspot/share/logging/logPrefix.hpp:116:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(ret == 0 || strlen(buf) < len, \
data/openjdk-16-16~14/src/hotspot/share/logging/logPrefix.hpp:118:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(ret == 0 || strlen(buf) == ret || ret >= len, \
data/openjdk-16-16~14/src/hotspot/share/logging/logTag.cpp:48:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(str);
data/openjdk-16-16~14/src/hotspot/share/logging/logTag.cpp:54:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    double score = StringUtils::similarity(tagname, strlen(tagname), str, len);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:141:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int version_len = (int)strlen(vm_version);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:154:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(header_version, vm_version, JVM_IDENT_MAX-9);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:294:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name) + 1;
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:566:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strncmp((const char*)attr, name, strlen(name)) == 0;
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:571:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, (char*)value, len);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:626:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t path_sep_len = strlen(os::path_separator());
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:630:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t image_name_len = strlen(MODULES_IMAGE_NAME);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:690:28:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  while (i < num_paths && !mismatch) {
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:702:10:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  return mismatch;
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:760:7:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (mismatch) {
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:801:9:  [1] (buffer) mismatch:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (mismatch) {
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:941:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t n = os::read(fd, header, (unsigned int)sz);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:981:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t n = os::read(fd, dynamic_header, (unsigned int)sz);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1006:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    n = os::read(fd, *base_archive_name, (unsigned int)name_size);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1026:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t n = os::read(fd, header(), (unsigned int)sz);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1171:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    header_bytes += strlen(Arguments::GetSharedArchivePath()) + 1;
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1188:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    header()->set_base_archive_name_size(strlen(base_archive_name) + 1);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:1652:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t n = os::read(_fd, buffer, (unsigned int)count);
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:2250:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *msg = NEW_RESOURCE_ARRAY_IN_THREAD(THREAD, char, strlen(path) + 128); ;
data/openjdk-16-16~14/src/hotspot/share/memory/filemap.cpp:2251:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jio_snprintf(msg, strlen(path) + 127, "error in opening JAR file %s", path);
data/openjdk-16-16~14/src/hotspot/share/memory/heapInspection.hpp:194:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int min = (int)(strlen(name));
data/openjdk-16-16~14/src/hotspot/share/memory/metaspaceShared.cpp:1320:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      int class_list_path_len = (int)strlen(class_list_path_str);
data/openjdk-16-16~14/src/hotspot/share/memory/universe.cpp:797:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(VerifySubSet) > 0) {
data/openjdk-16-16~14/src/hotspot/share/memory/universe.cpp:1069:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t length = strlen(VerifySubSet);
data/openjdk-16-16~14/src/hotspot/share/memory/universe.cpp:1071:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(subset_list, VerifySubSet, length + 1);
data/openjdk-16-16~14/src/hotspot/share/oops/constantPool.cpp:1855:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(str, (char *) (bytes+2), len);
data/openjdk-16-16~14/src/hotspot/share/oops/constantPool.cpp:2073:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int       len = (int) strlen(str);
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:712:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!equal(cts)) {
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:735:27:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    change = change || !v.equal(bbts[i]);
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:759:29:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      change = change || !v.equal(bbts[i]);
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:1764:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (match.equal(_state[i])) {
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:1773:17:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      if (match.equal(_state[i])) {
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:1822:48:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (!actual.is_lock_reference() || !expected.equal(actual)) {
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:1966:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (out[0].equal(CellTypeState::ref) && out[1].equal(CellTypeState::bottom)) {
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.cpp:1966:50:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  if (out[0].equal(CellTypeState::ref) && out[1].equal(CellTypeState::bottom)) {
data/openjdk-16-16~14/src/hotspot/share/oops/generateOopMap.hpp:223:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(CellTypeState a) const     { return _state == a._state; }
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:1108:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t msglen = strlen(desc) + strlen(className) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:1108:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t msglen = strlen(desc) + strlen(className) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:2752:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hash_len = (int)strlen(hash_buf);
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:2757:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const int src_length = (int)strlen(src);
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:3014:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:3014:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:3014:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/instanceKlass.cpp:3014:88:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(msg_text1) + strlen(class_loader_name) + strlen(msg_text2) + strlen(name) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:708:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t addr_len = strlen(addr_buf);
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:712:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      assert(strlen(result) == name_len, "");
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:714:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      assert(strlen(result) == name_len + addr_len, "");
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:883:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(class1_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:886:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(class2_description);
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:888:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(" and ");
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:914:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(klass_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:930:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen(module_name);
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:936:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len += strlen(version) + 1;
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:954:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(loader_name_and_id);
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:975:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len += strlen(parent_loader_phrase) + strlen(parent_loader_name_and_id);
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:975:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len += strlen(parent_loader_phrase) + strlen(parent_loader_name_and_id);
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:979:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += ((use_are) ? strlen(" are in ") : strlen(" is in "));
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:979:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += ((use_are) ? strlen(" are in ") : strlen(" is in "));
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:980:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(module_name_phrase) + strlen(" of loader ");
data/openjdk-16-16~14/src/hotspot/share/oops/klass.cpp:980:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len += strlen(module_name_phrase) + strlen(" of loader ");
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:175:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int klass_name_len  = (int)strlen(klass_name);
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:190:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:196:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/share/oops/method.cpp:404:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int prefix_len = (int)strlen(prefix);
data/openjdk-16-16~14/src/hotspot/share/oops/reflectionAccessorImplKlassHelper.cpp:94:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (::strncmp(classname, prefix, strlen(prefix)) == 0) {
data/openjdk-16-16~14/src/hotspot/share/oops/symbol.cpp:201:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int   length = (int)strlen(str);
data/openjdk-16-16~14/src/hotspot/share/oops/symbol.cpp:216:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int   length = (int)strlen(str);
data/openjdk-16-16~14/src/hotspot/share/oops/symbol.hpp:189:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bool equals(const char* str) const { return equals(str, (int) strlen(str)); }
data/openjdk-16-16~14/src/hotspot/share/oops/symbol.hpp:196:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return starts_with(prefix, (int) strlen(prefix));
data/openjdk-16-16~14/src/hotspot/share/oops/symbol.hpp:206:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return ends_with(suffix, (int) strlen(suffix));
data/openjdk-16-16~14/src/hotspot/share/opto/callnode.cpp:532:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (endcn == NULL)  endcn = name + strlen(name);
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2075:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return buf+strlen(buf);
data/openjdk-16-16~14/src/hotspot/share/opto/chaitin.cpp:2106:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return buf+strlen(buf);
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:223:21:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
  if (buf[0] == 0)  strcat(buf, ",");
data/openjdk-16-16~14/src/hotspot/share/opto/compile.cpp:4187:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_print_inlining_output, ss.base(), end+1);
data/openjdk-16-16~14/src/hotspot/share/opto/idealGraphPrinter.cpp:718:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    _network_stream->read(&c, 1);
data/openjdk-16-16~14/src/hotspot/share/opto/reg_split.cpp:1028:24:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            bool uup = umask.is_UP();
data/openjdk-16-16~14/src/hotspot/share/opto/reg_split.cpp:1033:18:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
            if( !umask.is_AllStack() &&
data/openjdk-16-16~14/src/hotspot/share/opto/reg_split.cpp:1034:22:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
                (int)umask.Size() <= lrgs(useidx).num_regs() &&
data/openjdk-16-16~14/src/hotspot/share/opto/reg_split.cpp:1036:31:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
                 (!is_vect && umask.is_misaligned_pair()))) {
data/openjdk-16-16~14/src/hotspot/share/opto/reg_split.cpp:1080:33:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
              if( dmask.overlap(umask) ) {
data/openjdk-16-16~14/src/hotspot/share/opto/reg_split.cpp:1117:34:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
                  RegMask tmp_rm(umask);
data/openjdk-16-16~14/src/hotspot/share/opto/superword.hpp:626:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(SWPointer& q)        { return equal(cmp(q)); }
data/openjdk-16-16~14/src/hotspot/share/opto/superword.hpp:626:44:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(SWPointer& q)        { return equal(cmp(q)); }
data/openjdk-16-16~14/src/hotspot/share/opto/superword.hpp:629:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static bool equal(int cmp)      { return cmp == Equal; }
data/openjdk-16-16~14/src/hotspot/share/prims/cdsoffsets.cpp:36:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal);
data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp:1167:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol name = SymbolTable::probe(name_to_probe, (int)strlen(name_to_probe));
data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp:1168:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol signature = SymbolTable::probe(sig, (int)strlen(sig));
data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp:1878:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol fieldname = SymbolTable::probe(name, (int)strlen(name));
data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp:1879:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol signame = SymbolTable::probe(sig, (int)strlen(sig));
data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp:2115:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol fieldname = SymbolTable::probe(name, (int)strlen(name));
data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp:2116:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol signame = SymbolTable::probe(sig, (int)strlen(sig));
data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp:2807:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int meth_name_len = (int)strlen(meth_name);
data/openjdk-16-16~14/src/hotspot/share/prims/jni.cpp:2813:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    TempNewSymbol  signature = SymbolTable::probe(meth_sig, (int)strlen(meth_sig));
data/openjdk-16-16~14/src/hotspot/share/prims/jniCheck.cpp:485:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/openjdk-16-16~14/src/hotspot/share/prims/jniCheck.cpp:497:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (!UTF8::is_legal_utf8((const unsigned char*)name, (int)strlen(name), false)) {
data/openjdk-16-16~14/src/hotspot/share/prims/jniCheck.cpp:1561:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = strlen(result) + 1; // + 1 for NULL termination
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:827:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (name == NULL || (int)strlen(name) > Symbol::max_length()) {
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:832:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(UTF8::is_legal_utf8((const unsigned char*)name, (int)strlen(name), false), "illegal UTF name");
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:3867:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jlong seed = (jlong)(java_lang_String::hash_code((const jbyte*)release, (int)strlen(release)) ^
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:3868:84:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         java_lang_String::hash_code((const jbyte*)dbg_level, (int)strlen(dbg_level)) ^
data/openjdk-16-16~14/src/hotspot/share/prims/jvm.cpp:3869:82:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         java_lang_String::hash_code((const jbyte*)version, (int)strlen(version)));
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:314:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int)strlen(ik()->source_debug_extension());
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiClassFileReconstituter.cpp:938:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  TempNewSymbol sym = SymbolTable::probe(name, (int)strlen(name));
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:804:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name) + 1;
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:1179:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    info_ptr->name = (char *) jvmtiMalloc(strlen(n)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:1425:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    info_ptr->name = (char*)jvmtiMalloc(strlen(name)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2383:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      result = (char *) jvmtiMalloc(strlen(class_sig)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2396:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          jvmtiError err = allocate(strlen(gen_sig) + 1,
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2449:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *source_name_ptr = (char *) jvmtiMalloc(strlen(sfncp)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2829:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      *source_debug_extension_ptr = (char *) jvmtiMalloc(strlen(sde)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2882:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *name_ptr =  (char*) jvmtiMalloc(strlen(fieldName) + 1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2891:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *signature_ptr = (char*) jvmtiMalloc(strlen(fieldSignature) + 1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2902:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jvmtiError err = allocate(strlen(gen_sig) + 1, (unsigned char **)generic_ptr);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2961:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *name_ptr = (char *) jvmtiMalloc(strlen(utf8_name)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2968:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *signature_ptr = (char *) jvmtiMalloc(strlen(utf8_signature) + 1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:2978:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jvmtiError err = allocate(strlen(gen_sig) + 1, (unsigned char **)generic_ptr);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3139:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        name_buf = (char *) jvmtiMalloc(strlen(utf8_name)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3143:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sig_buf = (char *) jvmtiMalloc(strlen(utf8_signature)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3149:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          gen_sig_buf = (char *) jvmtiMalloc(strlen(utf8_gen_sign)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3574:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      err = allocate((strlen(key)+1) * sizeof(char), (unsigned char**)tmp_value);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnv.cpp:3604:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = allocate((strlen(value)+1) * sizeof(char), (unsigned char **)value_ptr);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.cpp:462:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* prefix_copy = NEW_RESOURCE_ARRAY(char, strlen(prefix)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiEnvBase.cpp:1141:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *dup_str = (char*)allocate(strlen(str)+1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExport.hpp:435:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_name, name, sizeof(_name) - 1);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:109:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = rt.allocate(strlen(id)+1, (unsigned char**)&(ext_funcs[i].id));
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:116:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = rt.allocate(strlen(desc)+1,
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:140:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        err = rt.allocate(strlen(src_params[j].name)+1,
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:197:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = rt.allocate(strlen(id)+1, (unsigned char**)&(ext_events[i].id));
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:204:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = rt.allocate(strlen(desc)+1,
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiExtensions.cpp:228:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        err = rt.allocate(strlen(src_params[j].name)+1,
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiImpl.cpp:500:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = (int) strlen(ty_sign);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRawMonitor.cpp:67:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = strcpy(NEW_C_HEAP_ARRAY(char, strlen(name) + 1, mtInternal), name);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3925:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t prefix_len = strlen(prefix);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3951:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t prefix_len = strlen(prefix);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:3964:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return search_prefix_name_space(0, name_str, strlen(name_str),
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiRedefineClasses.cpp:4319:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    (int)strlen(scratch_class->source_debug_extension()));
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTrace.cpp:88:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(curr) > 0) {
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTrace.cpp:97:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  very_end = curr + strlen(curr);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTrace.cpp:113:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      flags_end = flags + strlen(flags);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTrace.cpp:193:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              size_t fnlen = strlen(fname);
data/openjdk-16-16~14/src/hotspot/share/prims/jvmtiTrace.cpp:222:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t evtlen = strlen(ename);
data/openjdk-16-16~14/src/hotspot/share/prims/methodHandles.cpp:1079:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(name) + 50;
data/openjdk-16-16~14/src/hotspot/share/prims/methodHandles.cpp:1162:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        str += strlen(str) + 1;   // skip name and null
data/openjdk-16-16~14/src/hotspot/share/prims/nativeLookup.cpp:367:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prefix_len = strlen(prefix);
data/openjdk-16-16~14/src/hotspot/share/prims/nativeLookup.cpp:375:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int wrapper_name_len = (int)strlen(wrapper_name);
data/openjdk-16-16~14/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:155:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  CmdLine cmdline(c_cmdline, strlen(c_cmdline), true);
data/openjdk-16-16~14/src/hotspot/share/prims/wbtestmethods/parserTests.cpp:168:77:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    GenDCmdArgument* arg = parser.lookup_dcmd_option(parsedArgNames->at(i), strlen(parsedArgNames->at(i)));
data/openjdk-16-16~14/src/hotspot/share/prims/whitebox.cpp:2032:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(field_name != NULL && strlen(field_name) > 0, "Field name not valid");
data/openjdk-16-16~14/src/hotspot/share/runtime/abstract_vm_version.cpp:305:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strncmp(line, keywords_to_match[i], strlen(keywords_to_match[i])) == 0) {
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:123:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _value = AllocateHeap(strlen(value)+1, mtArguments);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:138:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(value);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:140:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen(_value);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:162:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _value = AllocateHeap(strlen(value)+1, mtArguments);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:176:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(module_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:178:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(_module_name, module_name, len); // copy the trailing null
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:197:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _key = AllocateHeap(strlen(key)+1, mtArguments);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:208:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = AllocateHeap(strlen(name)+1, mtArguments);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:213:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _options = AllocateHeap(strlen(options)+1, mtArguments);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:228:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:824:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (remainder == s || strlen(remainder) > 1) {
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:963:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t old_len = old_value != NULL ? strlen(old_value) : 0;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:964:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t new_len = strlen(new_value);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1035:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
      strncat(tagset_buffer, "+", max_tagset_len - strlen(tagset_buffer));
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1035:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(tagset_buffer, "+", max_tagset_len - strlen(tagset_buffer));
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1037:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(tagset_buffer, LogTag::name(tagSet[i]), max_tagset_len - strlen(tagset_buffer));
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1037:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(tagset_buffer, LogTag::name(tagSet[i]), max_tagset_len - strlen(tagset_buffer));
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1040:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
      strncat(tagset_buffer, "*", max_tagset_len - strlen(tagset_buffer));
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1040:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(tagset_buffer, "*", max_tagset_len - strlen(tagset_buffer));
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1206:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    length += strlen(args[i]) + 1; // add 1 for a space or NULL terminating character
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1211:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t offset = strlen(args[j]) + 1; // add 1 for a space or NULL terminating character
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1232:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    st->print_cr("java_class_path (initial): %s", strlen(path) == 0 ? "<not set>" : path );
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1290:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    arg_len = strlen(argname);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1325:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(locked_message_buf) == 0) {
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1387:11:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int c = getc(stream);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:1419:9:  [1] (buffer) getc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    c = getc(stream);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2085:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(arg) == 0 || strcasecmp(arg, "NONE") == 0) {
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2211:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prop_len = strlen(prop_name) + strlen(prop_value) + 2;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2211:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prop_len = strlen(prop_name) + strlen(prop_value) + 2;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2236:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prop_len = strlen(prop_base_name) + strlen(prop_value) + max_digits + extra_symbols_count;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2236:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prop_len = strlen(prop_base_name) + strlen(prop_value) + max_digits + extra_symbols_count;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2343:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _len_prefix = strlen(JNI_LIB_PREFIX);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2350:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _len_jdwp = strlen(_jdwp);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2521:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = (pos == NULL) ? strlen(tail) : pos - tail;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2527:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len2 = strlen(pos+1) + 1; // options start after ':'.  Final zero must be copied.
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:2613:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(tail) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3069:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if ((strncmp(tail, "Flags=", strlen("Flags=")) != 0) &&
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3070:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          (strncmp(tail, "VMOptionsFile=", strlen("VMOptionsFile=")) != 0)) {
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3144:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (char* tail = copy + strlen(copy) - 1; tail >= copy && *tail == separator; tail--) {
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3412:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int retcode = parse_options_buffer(name, buffer, strlen(buffer), vm_args);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3458:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ssize_t bytes_read = os::read(fd, (void *)buf, (unsigned)bytes_alloc);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3571:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t jvm_path_len = strlen(jvm_path);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3572:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t file_sep_len = strlen(os::file_separator());
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3606:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(cur_path, begin_ptr, len);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3619:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(cur_path, begin_ptr, len + 1);
data/openjdk-16-16~14/src/hotspot/share/runtime/arguments.cpp:3940:67:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    code = parse_options_buffer("vm options resource", vmoptions, strlen(vmoptions), &initial_vm_options_args);
data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlag.cpp:540:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(d.name);
data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlag.cpp:792:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _name_len = strlen(_name);
data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlag.cpp:804:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    score = StringUtils::similarity(current->_name, strlen(current->_name), name, length);
data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlag.hpp:127:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return find_flag(name, strlen(name), false, false);
data/openjdk-16-16~14/src/hotspot/share/runtime/flags/jvmFlag.hpp:133:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return find_declared_flag(name, strlen(name));
data/openjdk-16-16~14/src/hotspot/share/runtime/frame.cpp:547:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(os::file_separator());
data/openjdk-16-16~14/src/hotspot/share/runtime/frame.cpp:1237:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  fv.description = NEW_RESOURCE_ARRAY(char, strlen(description) + 1);
data/openjdk-16-16~14/src/hotspot/share/runtime/frame.hpp:119:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(frame other) const;
data/openjdk-16-16~14/src/hotspot/share/runtime/mutex.cpp:280:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_name, name, MUTEX_NAME_LEN - 1);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:292:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:292:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:292:66:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t fullfnamelen = strlen(JNI_LIB_PREFIX) + strlen(fname) + strlen(JNI_LIB_SUFFIX);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:295:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t pnamelen = pname ? strlen(pname) : 0;
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:301:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const size_t plen = strlen(buffer);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:314:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t plen = (path == NULL) ? 0 : strlen(path);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:624:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t size = strlen(str);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:634:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    vm_exit_out_of_memory(strlen(str) + 1, OOM_MALLOC_ERROR, "os::strdup_check_oom");
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1260:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(mode) + 1 < sizeof(modified_mode), "mode chars plus one extra must fit in buffer");
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1283:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int home_len = (int)strlen(home);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1326:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (path == NULL || strlen(path) == 0 || file_name_length == (size_t)NULL) {
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1330:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char* inpath = NEW_C_HEAP_ARRAY(char, strlen(path) + 1, mtInternal);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.cpp:1356:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, p, len);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.hpp:532:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static ssize_t read(int fd, void *buf, unsigned int nBytes);
data/openjdk-16-16~14/src/hotspot/share/runtime/os.inline.hpp:30:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
inline ssize_t os::read(int fd, void *buf, unsigned int nBytes) {
data/openjdk-16-16~14/src/hotspot/share/runtime/os.inline.hpp:31:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  return ::read(fd, buf, nBytes);
data/openjdk-16-16~14/src/hotspot/share/runtime/os_perf.hpp:203:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t length = strlen(name);
data/openjdk-16-16~14/src/hotspot/share/runtime/os_perf.hpp:206:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_name, name, length + 1);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:87:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = NEW_C_HEAP_ARRAY(char, strlen(name) + strlen(prefix) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:87:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _name = NEW_C_HEAP_ARRAY(char, strlen(name) + strlen(prefix) + 2, mtInternal);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:88:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(strlen(name) != 0, "invalid name");
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:126:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t namelen = strlen(name()) + 1;  // include null terminator
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:230:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy((char *)_valuep, s2 == NULL ? "" : s2, _length);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:244:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                  MIN2((jint)(strlen((char*)initial_value)+1),
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:250:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ((jint)strlen(initial_value) > (jint)PerfMaxStringConstLength)) {
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:256:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              (jint)strlen(initial_value),
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:364:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(ns) + strlen(name) + 2;
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:364:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   size_t len = strlen(ns) + strlen(name) + 2;
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.cpp:425:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (max_length == 0 && s != NULL) max_length = (int)strlen(s);
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.hpp:715:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return strncmp(name, javadot, strlen(javadot)) == 0;
data/openjdk-16-16~14/src/hotspot/share/runtime/perfData.hpp:719:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return strncmp(name, comdot, strlen(comdot)) == 0;
data/openjdk-16-16~14/src/hotspot/share/runtime/perfMemory.cpp:252:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if(!Arguments::copy_expand_pid(PerfDataSaveFile, strlen(PerfDataSaveFile),
data/openjdk-16-16~14/src/hotspot/share/runtime/prefetch.hpp:45:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  static void read(void* loc, intx interval);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:569:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 100 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:569:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 100 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:570:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:570:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:580:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 160 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:580:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 160 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:581:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*sizeof(uintx);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:596:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 118 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:596:59:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 118 + strlen(current_class_name) + 2*strlen(module_from_name) +
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:597:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:597:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:597:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(new_class_name) + 2*strlen(module_to_name) + strlen(package_name);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:607:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 170 + strlen(current_class_name) + strlen(new_class_name) +
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:607:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = 170 + strlen(current_class_name) + strlen(new_class_name) +
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:608:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          2*strlen(module_to_name) + strlen(package_name) + 2*sizeof(uintx);
data/openjdk-16-16~14/src/hotspot/share/runtime/reflection.cpp:608:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          2*strlen(module_to_name) + strlen(package_name) + 2*sizeof(uintx);
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2033:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2033:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2033:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2033:98:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t msglen = strlen(caster_name) + strlen("class ") + strlen(" cannot be cast to class ") + strlen(target_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2047:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3;
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2047:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3;
data/openjdk-16-16~14/src/hotspot/share/runtime/sharedRuntime.cpp:2047:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  msglen += strlen(caster_klass_description) + strlen(target_klass_description) + strlen(klass_separator) + 3;
data/openjdk-16-16~14/src/hotspot/share/runtime/stackValue.hpp:99:8:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  bool equal(StackValue *value) {
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:156:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len = strlen(name);                                                  \
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:2908:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  bool only_at = strlen(DeoptimizeOnlyAt) > 0;
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:2922:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(buffer);
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:3600:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  Prefetch::read((void*)addr, prefetch_interval);
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4204:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4204:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4204:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4204:69:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) + strlen(ebuf) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4225:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) +
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4225:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) +
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4225:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          size_t len = strlen(msg) + strlen(name) + strlen(sub_msg) +
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4226:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(ebuf) + strlen(sub_msg2) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/thread.cpp:4226:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       strlen(ebuf) + strlen(sub_msg2) + 1;
data/openjdk-16-16~14/src/hotspot/share/runtime/threadSMR.inline.hpp:50:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    Prefetch::read((void*)current_p, scan_interval);
data/openjdk-16-16~14/src/hotspot/share/runtime/vframe.cpp:526:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t prefixed_name_len = strlen(prefixed_name);
data/openjdk-16-16~14/src/hotspot/share/runtime/vframe.cpp:535:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t name_len = strlen(name);
data/openjdk-16-16~14/src/hotspot/share/runtime/vframe.cpp:542:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t possible_prefix_len = strlen(possible_prefix);
data/openjdk-16-16~14/src/hotspot/share/runtime/vframe.cpp:717:23:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!locs->at(i)->equal(other_locs->at(i)))
data/openjdk-16-16~14/src/hotspot/share/runtime/vframe.cpp:726:24:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    if (!exprs->at(i)->equal(other_exprs->at(i)))
data/openjdk-16-16~14/src/hotspot/share/runtime/vmStructs.cpp:3095:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(typeName);
data/openjdk-16-16~14/src/hotspot/share/runtime/vmStructs.cpp:3098:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, typeName, len - 1);
data/openjdk-16-16~14/src/hotspot/share/runtime/vmStructs.cpp:3109:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    start = typeName + strlen("GrowableArray<");
data/openjdk-16-16~14/src/hotspot/share/runtime/vmStructs.cpp:3111:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    start = typeName + strlen("Array<");
data/openjdk-16-16~14/src/hotspot/share/runtime/vmStructs.cpp:3117:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(s, start, len - 1);
data/openjdk-16-16~14/src/hotspot/share/runtime/vmStructs.cpp:3127:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const char * s = typeName + strlen("const ");
data/openjdk-16-16~14/src/hotspot/share/runtime/vmThread.cpp:113:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                   (char *) op->name(), strlen(op->name()),
data/openjdk-16-16~14/src/hotspot/share/runtime/vmThread.cpp:354:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (char *) op->name(), strlen(op->name()),
data/openjdk-16-16~14/src/hotspot/share/runtime/vmThread.cpp:364:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (char *) op->name(), strlen(op->name()),
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.cpp:228:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (arg1 != NULL && (strlen(arg1) > 0)) {
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.cpp:258:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (arg0 != NULL && (strlen(arg0) > 0)) {
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.cpp:398:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        assert(strlen(name) <= AttachOperation::name_length_max, "operation <= name_length_max");
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp:154:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    assert(strlen(name) <= name_length_max, "exceeds maximum name length");
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp:155:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = MIN2(strlen(name), (size_t)name_length_max);
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp:172:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      assert(strlen(arg) <= arg_length_max, "exceeds maximum argument length");
data/openjdk-16-16~14/src/hotspot/share/services/attachListener.hpp:173:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t len = MIN2(strlen(arg), (size_t)arg_length_max);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:47:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ptr, str, len);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:95:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t next_size = strlen(next_str);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:105:7:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
      strcat(buf, ",");
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:120:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, str, len);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:129:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:146:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len == strlen("true") && strncasecmp(str, "true", len) == 0) {
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:148:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    } else if (len == strlen("false") && strncasecmp(str, "false", len) == 0) {
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:158:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(buf, str, len);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:170:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:194:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:238:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_value._unit, &str[idx], len - idx);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:269:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticArgument.cpp:344:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    this->parse_value(_default_string, strlen(_default_string), THREAD);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticCommand.cpp:163:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                  strlen(cmd_list->at(i)));
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticCommand.cpp:173:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                strlen(_cmd.value()));
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticCommand.cpp:204:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                                  strlen(cmd_list->at(i)));
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticCommand.cpp:328:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t opt_len = strlen(_libpath.value()) + strlen(_option.value()) + 2;
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticCommand.cpp:328:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t opt_len = strlen(_libpath.value()) + strlen(_option.value()) + 2;
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.cpp:211:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(argbuf, iter.key_addr(), len);
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.cpp:226:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(arg->name()) == len &&
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.cpp:500:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(factory->name()) == len &&
data/openjdk-16-16~14/src/hotspot/share/services/diagnosticFramework.hpp:85:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   : _str(str), _delim(delim), _len(::strlen(str)),
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:1815:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  writer()->write_raw((void*)header, (int)strlen(header));
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:1936:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert(path != NULL && strlen(path) > 0, "path missing");
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2016:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* str = NEW_RESOURCE_ARRAY(char, strlen(error())+1);
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2068:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      (HeapDumpPath == NULL ? 0 : strlen(HeapDumpPath)) +
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2069:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(os::file_separator()) + max_digit_chars +
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2070:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(dump_file_name) + strlen(dump_file_ext) + 1;
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2070:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(dump_file_name) + strlen(dump_file_ext) + 1;
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2089:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t fs_len = strlen(os::file_separator());
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2090:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(base_path) >= fs_len) {
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2092:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          end += (strlen(base_path) - fs_len);
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2101:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t dlen = strlen(base_path);  // if heap dump dir specified
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2105:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(base_path) + 1;
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2111:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(my_path, base_path, len);
data/openjdk-16-16~14/src/hotspot/share/services/heapDumper.cpp:2114:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const size_t len = strlen(base_path) + max_digit_chars + 2; // for '.' and \0
data/openjdk-16-16~14/src/hotspot/share/services/management.cpp:2011:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                             strlen(cmd_name));
data/openjdk-16-16~14/src/hotspot/share/services/memoryManager.cpp:225:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) name(), strlen(name()),
data/openjdk-16-16~14/src/hotspot/share/services/memoryManager.cpp:226:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) pool->name(), strlen(pool->name()),
data/openjdk-16-16~14/src/hotspot/share/services/memoryManager.cpp:256:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) name(), strlen(name()),
data/openjdk-16-16~14/src/hotspot/share/services/memoryManager.cpp:257:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (char *) pool->name(), strlen(pool->name()),
data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp:38:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(buffer, src, TEMP_BUF_SIZE - 1 - strlen(buffer));
data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp:38:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncat(buffer, src, TEMP_BUF_SIZE - 1 - strlen(buffer));
data/openjdk-16-16~14/src/hotspot/share/services/writeableFlags.cpp:49:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t j = strlen(buffer);
data/openjdk-16-16~14/src/hotspot/share/utilities/classpathStream.cpp:36:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(path, &_class_path[_start], path_len);
data/openjdk-16-16~14/src/hotspot/share/utilities/classpathStream.hpp:37:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _len = (int)strlen(class_path);
data/openjdk-16-16~14/src/hotspot/share/utilities/concurrentHashTable.inline.hpp:253:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Prefetch::read(*pref->value(), 0);
data/openjdk-16-16~14/src/hotspot/share/utilities/concurrentHashTable.inline.hpp:260:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      Prefetch::read(*next_pref->value(), 0);
data/openjdk-16-16~14/src/hotspot/share/utilities/debug.cpp:142:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int file_name_len = (int)strlen(file_name);
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:73:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      mfd.read(_section_data, shdr.sh_size)) {
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:82:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
bool FileReader::read(void* buf, size_t size) {
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:114:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int len = strlen(filepath) + 1;
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:195:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (!freader.read(&_elfHdr, sizeof(_elfHdr))) {
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:211:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (!freader.read(&shdr, sizeof(shdr))) {
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:263:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(name) + 1;
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.cpp:277:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (!mfd.read((void*)&hdr, sizeof(hdr))) {
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFile.hpp:103:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  bool read(void* buf, size_t size);
data/openjdk-16-16~14/src/hotspot/share/utilities/elfFuncDescTable.cpp:68:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        !mfd.read((void*)&addr, sizeof(addr))) {
data/openjdk-16-16~14/src/hotspot/share/utilities/elfStringTable.cpp:66:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      mfd.read((void*)buf, size_t(buflen))) {
data/openjdk-16-16~14/src/hotspot/share/utilities/elfSymbolTable.cpp:99:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (!mfd.read((void*)&sym, sizeof(sym))) {
data/openjdk-16-16~14/src/hotspot/share/utilities/formatBuffer.hpp:107:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(_buf);
data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_gcc.hpp:132:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_gcc.hpp:132:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_visCPP.hpp:116:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
#define read  _read
data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_xlc.hpp:113:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-16-16~14/src/hotspot/share/utilities/globalDefinitions_xlc.hpp:113:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
inline int wcslen(const jchar* x) { return wcslen((const wchar_t*)x); }
data/openjdk-16-16~14/src/hotspot/share/utilities/json.cpp:41:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return tmp == NULL ? s + strlen(s) : tmp;
data/openjdk-16-16~14/src/hotspot/share/utilities/json.cpp:350:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int tokens, read;
data/openjdk-16-16~14/src/hotspot/share/utilities/json.cpp:357:49:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  tokens = sscanf(pos, "%lf%n", &double_value, &read);
data/openjdk-16-16~14/src/hotspot/share/utilities/json.cpp:360:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    assert(read > 0, "sanity");
data/openjdk-16-16~14/src/hotspot/share/utilities/json.cpp:374:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    skip(read);
data/openjdk-16-16~14/src/hotspot/share/utilities/json.cpp:452:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(valid_chars);
data/openjdk-16-16~14/src/hotspot/share/utilities/json.cpp:480:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  len = strlen(expected_string);
data/openjdk-16-16~14/src/hotspot/share/utilities/linkedlist.hpp:53:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static bool equal(const U& a, const U& b, bool (U::*t)(const U&) const) {
data/openjdk-16-16~14/src/hotspot/share/utilities/linkedlist.hpp:58:15:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
  static bool equal(const U& a, const U& b, ...) {
data/openjdk-16-16~14/src/hotspot/share/utilities/linkedlist.hpp:75:12:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
    return equal<E>(_data, t, NULL);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:95:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result_len = strlen(result);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:100:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    result_len = strlen(result);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:375:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(copy, buffer, buffer_pos);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:401:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int i = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:425:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length = strlen(force_directory) + strlen(os::file_separator()) +
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:425:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length = strlen(force_directory) + strlen(os::file_separator()) +
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:426:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(basename) + 1;
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:428:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length = strlen(log_name) + 1;
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:436:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length += strlen(pid_text);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:442:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buffer_length += strlen(tms);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:453:3:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
  strcpy(buf, "");
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:490:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int buf_pos = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:495:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(&buf[buf_pos], nametail, first);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:497:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf_pos = (int)strlen(buf);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:499:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(&buf[buf_pos], tail, second - first - 2);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:565:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    data[::strlen(data)-1] = '\0';
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:1036:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(copy, buffer, buffer_pos);
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.cpp:1071:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
int networkStream::read(char *buf, size_t len) {
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.hpp:100:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   void print_raw(const char* str)            { write(str, strlen(str)); }
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.hpp:102:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   void print_raw_cr(const char* str)         { write(str, strlen(str)); cr(); }
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.hpp:234:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  size_t read(void *data, size_t size, size_t count) { return _file != NULL ? ::fread(data, size, count, _file) : 0; }
data/openjdk-16-16~14/src/hotspot/share/utilities/ostream.hpp:301:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int read(char *buf, size_t len);
data/openjdk-16-16~14/src/hotspot/share/utilities/stringUtils.cpp:31:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t from_len = strlen(from);
data/openjdk-16-16~14/src/hotspot/share/utilities/stringUtils.cpp:32:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t to_len = strlen(to);
data/openjdk-16-16~14/src/hotspot/share/utilities/stringUtils.cpp:39:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    memmove(dst, left_over, strlen(left_over) + 1); // copies the trailing 0 of <left_over>
data/openjdk-16-16~14/src/hotspot/share/utilities/utf8.cpp:443:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  assert((int) strlen(result) == utf8_len, "length prediction must be correct");
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:160:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(coredump_message, message, sizeof(coredump_message));
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:183:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(_detail_msg) > 0) {
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:521:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           if (strlen(_detail_msg) > 0) {
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:527:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
           if (strlen(_detail_msg) > 0) {
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:588:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
       if (strlen(_detail_msg) > 0) {
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1252:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (Arguments::copy_expand_pid(pattern, strlen(pattern), &buf[pos], buflen - pos)) {
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1276:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t pos = strlen(cwd);
data/openjdk-16-16~14/src/hotspot/share/utilities/vmError.cpp:1288:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     if (tmpdir != NULL && strlen(tmpdir) > 0) {
data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp:155:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t tag_len = (tag_end == NULL) ? strlen(tag) : tag_end - tag;
data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp:191:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _element_close_stack_ptr = (cur_tag += strlen(cur_tag) + 1);
data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp:199:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    _element_close_stack_ptr = cur_tag + strlen(cur_tag) + 1;
data/openjdk-16-16~14/src/hotspot/share/utilities/xmlstream.cpp:352:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t format_len = strlen(format);
data/openjdk-16-16~14/src/java.base/aix/native/libnet/aix_close.c:340:11:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
          usleep(num_woken * 50);
data/openjdk-16-16~14/src/java.base/aix/native/libnio/ch/AixPollPort.c:165:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, 1), res);
data/openjdk-16-16~14/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:142:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((char*)vm + vm->vmt_data[VMT_OBJECT].vmt_off);
data/openjdk-16-16~14/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:153:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((char*)vm + vm->vmt_data[VMT_STUB].vmt_off);
data/openjdk-16-16~14/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:201:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen(fstype);
data/openjdk-16-16~14/src/java.base/aix/native/libnio/fs/AixNativeDispatcher.c:212:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = strlen((char*)vm + vm->vmt_data[VMT_ARGS].vmt_off);
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:155:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
    strncat(fn, "/cmdline", sizeof fn - strnlen(fn, sizeof fn) - 1);
data/openjdk-16-16~14/src/java.base/linux/native/libjava/ProcessHandleImpl_linux.c:194:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        while ((count = read(fd, s, pageSize - cmdlen)) > 0) {
data/openjdk-16-16~14/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:194:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/openjdk-16-16~14/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:201:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(dir);
data/openjdk-16-16~14/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:208:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fstype);
data/openjdk-16-16~14/src/java.base/linux/native/libnio/fs/LinuxNativeDispatcher.c:215:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(options);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:90:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int langStrLen = strlen(languageString);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:106:25:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                        strcat(languageString, "-");
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:166:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int length = strlen(scriptRegion);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:354:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int c_len = strlen(c_exception);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:381:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(c_exception+c_len, "|*.", 3);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:382:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(c_exception+c_len+3, c_exception, c_len);
data/openjdk-16-16~14/src/java.base/macosx/native/libjava/java_props_macosx.c:463:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sProps->protocol##Port = malloc(strlen(buf) + 1);                   \
data/openjdk-16-16~14/src/java.base/macosx/native/libnet/DefaultProxySelector.c:191:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            protoLen = strlen(cproto);
data/openjdk-16-16~14/src/java.base/macosx/native/libnet/DefaultProxySelector.c:192:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            hostLen = strlen(chost);
data/openjdk-16-16~14/src/java.base/macosx/native/libnet/DefaultProxySelector.c:201:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                urlRef = CFURLCreateWithBytes(NULL, (const UInt8 *) uri, strlen(uri),
data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:165:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(name);
data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:172:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(dir);
data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:179:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fstype);
data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:186:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(options);
data/openjdk-16-16~14/src/java.base/macosx/native/libnio/fs/BsdNativeDispatcher.c:218:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jsize len = strlen(buf.f_mntonname);
data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c:88:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((len = (cname != NULL ? strlen(cname) : 0) + strlen(syms[i]) + 2) >
data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c:88:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((len = (cname != NULL ? strlen(cname) : 0) + strlen(syms[i]) + 2) >
data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c:260:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t prefixLen = strlen(JNI_LIB_PREFIX);
data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c:261:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t suffixLen = strlen(JNI_LIB_SUFFIX);
data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c:277:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(cname);
data/openjdk-16-16~14/src/java.base/share/native/libjava/NativeLibraries.c:294:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    libName[strlen(libName)-suffixLen] = '\0';
data/openjdk-16-16~14/src/java.base/share/native/libjava/System.c:296:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int prefix_len = (int) strlen(JNI_LIB_PREFIX);
data/openjdk-16-16~14/src/java.base/share/native/libjava/System.c:297:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int suffix_len = (int) strlen(JNI_LIB_SUFFIX);
data/openjdk-16-16~14/src/java.base/share/native/libjava/check_classname.c:235:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t s = strlen(name);
data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.c:134:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t messagelen = message == NULL ? 0 : strlen(message);
data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.c:424:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(str);
data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.c:464:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(str);
data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.c:536:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int) strlen(str);
data/openjdk-16-16~14/src/java.base/share/native/libjava/jni_util.c:699:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(str);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:238:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int str_length = (int) strlen(string);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:275:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            int str_length = (int) strlen(pkg);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:294:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            int clazz_length = (int) strlen(clazz);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageDecompressor.cpp:303:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        desc_length = (int) strlen(desc_string);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:162:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* replaced = new char[(int) strlen(package_name) + 1];
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:172:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* path = new char[(int) strlen(radical) + (int) strlen(package_name) + 1];
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:172:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* path = new char[(int) strlen(radical) + (int) strlen(package_name) + 1];
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:353:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     int len = (int) strlen(name) + 1;
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:356:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(_name, name, len);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/imageFile.cpp:443:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return (u8)osSupport::read(_fd, (char*)data, size, offset) == size;
data/openjdk-16-16~14/src/java.base/share/native/libjimage/jimage.cpp:117:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t moduleNameLen = strlen(module_name);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/jimage.cpp:118:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nameLen = strlen(name);
data/openjdk-16-16~14/src/java.base/share/native/libjimage/osSupport.hpp:62:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    static jlong read(jint fd, char *buf, jlong nBytes, jlong offset);
data/openjdk-16-16~14/src/java.base/share/native/libjli/args.c:614:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ctx.eob = case_data + strlen(case_data);
data/openjdk-16-16~14/src/java.base/share/native/libjli/java.c:2092:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char cfgName[strlen(jvmCfgName)+10];
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.h:71:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define JLI_StrLen(p1)          strlen((p1))
data/openjdk-16-16~14/src/java.base/share/native/libjli/jli_util.h:78:33:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define JLI_StrNCpy(p1, p2, p3) strncpy((p1), (p2), (p3))
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:69:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((size_t)(read(fd, in, (unsigned int)entry->csize)) != entry->csize) {
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:140:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            && read(fd, buf, count) == (jlong) count);
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:253:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, eb, ENDHDR) < 0)
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:278:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((bytes = read(fd, buffer, (unsigned int)len)) < 0) {
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:373:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ((bytes = read(fd, bp, MINREAD)) < 0) {
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:395:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((res = read(fd, bp + bytes, MINREAD)) <= 0) {
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:407:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if ((res = read(fd, bp + bytes,  read_size)) <= 0) {
data/openjdk-16-16~14/src/java.base/share/native/libjli/parse_manifest.c:425:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (read(fd, locbuf, LOCHDR) < 0) {
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:224:1:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
equal(const char *s1, const char *s2)
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:235:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        (equal(filename + len - 3, "jar") ||
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:236:10:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
         equal(filename + len - 3, "JAR")) &&
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:348:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (equal((*argv)[i], "-cp") ||
data/openjdk-16-16~14/src/java.base/share/native/libjli/wildcard.c:349:13:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
            equal((*argv)[i], "-classpath")) {
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:637:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bucket->name = malloc(strlen(name) + 1);
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:698:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bucket->name = malloc(strlen(name) + 1);
data/openjdk-16-16~14/src/java.base/share/native/libverify/check_code.c:2112:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (   p = stack_operands + strlen(stack_operands);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:127:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fname_length = strlen(fname);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:188:12:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return read(zfd, buf, nbytes);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:810:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) >= PATH_MAX) {
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1155:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return ZIP_GetEntry2(zip, name, (jint)strlen(name), JNI_FALSE);
data/openjdk-16-16~14/src/java.base/share/native/libzip/zip_util.c:1481:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *nameLenP = (jint)strlen(entry->name);
data/openjdk-16-16~14/src/java.base/unix/native/launcher/jexec.c:321:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t count = read(fd, buf, CHUNK_SIZE);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessEnvironment_md.c:74:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            jsize valLength = strlen(valBeg);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:440:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cp += strlen(cp) + 1;
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:694:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(prargs, psinfo.pr_psargs, PRARGSZ);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessHandleImpl_unix.c:701:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(prargs, psinfo.pr_fname, PRARGSZ);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:260:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t pathsize = strlen(path) + 1;
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:334:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fmtsize = sizeof(IOE_FORMAT) + strlen(detail) + 3 * sizeof(errnum);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:413:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bytes += strlen(*a)+1;
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:431:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = strlen(*a) +1;
data/openjdk-16-16~14/src/java.base/unix/native/libjava/ProcessImpl_md.c:520:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sp.dirlen = c->pdir == 0 ? 0 : strlen(c->pdir)+1;
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:93:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return pos + strlen(zidir);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:105:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path = (char *) malloc(strlen(dir) + strlen(name) + 2);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:105:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    path = (char *) malloc(strlen(dir) + strlen(name) + 2);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:109:19:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    return strcat(strcat(strcpy(path, dir), "/"), name);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:216:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        RESTARTABLE(read(fd, dbuf, size), res);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:263:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(line) > 0) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:329:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, size), res);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:351:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t tz_key_len = strlen(tz_key);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:384:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    tz_len = (temp_tz == NULL) ? strlen(tz) : temp_tz - tz;
data/openjdk-16-16~14/src/java.base/unix/native/libjava/TimeZone_md.c:390:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(java_home_dir) + 15) > PATH_MAX) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:112:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            p += strlen(p) + 1;
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:198:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(orig) > PATH_MAX) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:215:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(path, orig, PATH_MAX);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:218:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        end = path + strlen(path);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:247:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int rn = strlen(r);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/canonicalize_md.c:248:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (rn + (int)strlen(p) >= len) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:147:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        ssize_t n = read(fd, buf, remaining);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:252:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int filelen = strlen(file);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/childproc.c:257:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int dirlen = strlen(dir);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/io_util_md.c:107:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *p = (char *)ps + strlen(ps) - 1;
data/openjdk-16-16~14/src/java.base/unix/native/libjava/io_util_md.c:174:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, len), result);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:114:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp = malloc(strlen(lc) + 1);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:145:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    temp = malloc(strlen(lc) + 1);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:177:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    encoding_variant = malloc(strlen(temp)+1);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:196:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        temp = realloc(temp, strlen(p)+1);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:205:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        encoding_variant = realloc(encoding_variant, strlen(temp)+1);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:240:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *std_language = malloc(strlen(language)+1);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:248:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            *std_country = malloc(strlen(country)+1);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:335:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (env_lang == NULL || strlen(env_lang) == 0) &&
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:336:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (env_lc_all == NULL || strlen(env_lc_all) == 0) &&
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:337:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (env_lc_ctype == NULL || strlen(env_lc_ctype) == 0)) {
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:406:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            char *os_version = malloc(strlen(name.version) +
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:407:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                      strlen(name.release) + 2);
data/openjdk-16-16~14/src/java.base/unix/native/libjava/java_props_md.c:410:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(os_version, ".");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/jni_util_md.c:57:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(jniEntryName, "_");
data/openjdk-16-16~14/src/java.base/unix/native/libjava/jni_util_md.c:67:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(buf);
data/openjdk-16-16~14/src/java.base/unix/native/libjimage/osSupport_unix.cpp:66:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
jlong osSupport::read(jint fd, char *buf, jlong nBytes, jlong offset) {
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:253:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (s != NULL && strlen(s) <= strlen(chost)) {
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:253:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            while (s != NULL && strlen(s) <= strlen(chost)) {
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:254:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strcasecmp(chost+(strlen(chost) - strlen(s)), s) == 0) {
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:254:55:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                if (strcasecmp(chost+(strlen(chost) - strlen(s)), s) == 0) {
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:356:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    protoLen = strlen(cproto);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/DefaultProxySelector.c:357:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    hostLen = strlen(chost);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:232:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(searchName, name_utf, IFNAMESIZE);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:937:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, if_name, IFNAMESIZE);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1000:10:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
         strncpy(currif->name, name, IFNAMESIZE);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1032:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(currif->name, vname, IFNAMESIZE);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1261:16:  [1] (buffer) fscanf:
  It's unclear if the %s limit in the format string is small enough
  (CWE-120). Check that the limit is sufficiently small, or use a different
  input function.
        while (fscanf(f, "%4s%4s%4s%4s%4s%4s%4s%4s %08x %02x %02x %02x %20s\n",
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1299:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, name, sizeof(if2.ifr_name));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1326:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(ifr.ifr_name, ifname, sizeof(ifr.ifr_name) - 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1349:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1363:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name));
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1538:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(if6.ifr_name, ifreqP->ifr_name, sizeof(if6.ifr_name) - 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1631:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1645:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1782:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, name, sizeof(if2.ifr_name) - 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1832:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/NetworkInterface.c:1846:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(if2.ifr_name, ifname, sizeof(if2.ifr_name) - 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c:220:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(format) + strlen(hostname) + strlen(error_string) + 2;
data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c:220:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(format) + strlen(hostname) + strlen(error_string) + 2;
data/openjdk-16-16~14/src/java.base/unix/native/libnet/net_util_md.c:220:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size = strlen(format) + strlen(hostname) + strlen(error_string) + 2;
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/FileDispatcherImpl.c:85:34:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, read(fd, buf, len), JNI_TRUE);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/IOUtil.c:121:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        int n = read(fd, buf, sizeof(buf));
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/IOUtil.c:137:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    res = read(fd, buf, 1);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/Net.c:104:9:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
        strcpy(uts.sysname, "?");
data/openjdk-16-16~14/src/java.base/unix/native/libnio/ch/SocketDispatcher.c:43:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
     jint n = read(fd, buf, len);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixCopyFile.c:61:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        RESTARTABLE(read((int)src, &buf, sizeof(buf)), n);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:327:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jsize len = (jsize)strlen(buf);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:344:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(tmpbuf);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:463:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read((int)fd, bufp, (size_t)nbytes), n);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:809:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jsize len = strlen(ptr->d_name);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:951:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (jsize)strlen(target);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:972:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jsize len = (jsize)strlen(resolved);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:1086:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            jsize len = strlen(p->pw_name);
data/openjdk-16-16~14/src/java.base/unix/native/libnio/fs/UnixNativeDispatcher.c:1138:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            jsize len = strlen(g->gr_name);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:265:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (*env)->NewString(env, pattern, (jsize)wcslen(pattern));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:371:50:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ret = (*env)->NewString(env, pattern, (jsize)wcslen(pattern));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:411:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:474:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:495:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:558:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:760:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, buf, (jsize)wcslen(buf));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:852:66:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                tmp_string = (*env)->NewString(env, name, (jsize)wcslen(name));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:870:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), number);      // "+12.34"
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:872:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), fix);         // "+12.34$"
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:873:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), L";");        // "+12.34$;"
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:875:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), fix);         // "+12.34$;("
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:876:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), number);      // "+12.34$;(12.34"
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:878:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wcscat_s(ret, BUFLEN-wcslen(ret), fix);         // "+12.34$;(12.34$)"
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:1074:60:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        (*env)->NewString(env, era, (jsize)wcslen(era)));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/HostLocaleProviderAdapter_md.c:1083:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    jsize len = (jsize)wcslen(buf);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:479:47:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       (jsize)wcslen(exeName));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:486:55:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                               (jsize)wcslen(longPath));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:530:63:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s = (*env)->NewString(env, (const jchar *)str, (jsize)wcslen(str));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:533:9:  [1] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant
  character.
        wcscat(domain, L"\\");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/ProcessHandleImpl_win.c:535:66:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        s = (*env)->NewString(env, (const jchar *)domain, (jsize)wcslen(domain));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:432:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mapFileName = malloc(strlen(java_home_dir) + strlen(MAPPINGS_FILE) + 1);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/TimeZone_md.c:432:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    mapFileName = malloc(strlen(java_home_dir) + strlen(MAPPINGS_FILE) + 1);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:242:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int len = (int)wcslen(path);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:248:60:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    rv = (*env)->NewString(env, cp, (jsize)wcslen(cp));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:255:63:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            rv = (*env)->NewString(env, canonicalPath, (jsize)wcslen(canonicalPath));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:274:28:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            int len = (int)wcslen(canonicalPrefix) + MAX_PATH;
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:281:62:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      rv = (*env)->NewString(env, cp, (jsize)wcslen(cp));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:290:67:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                rv = (*env)->NewString(env, canonicalPath, (jsize)wcslen(canonicalPath));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:650:36:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    search_path = (WCHAR*)malloc(2*wcslen(pathbuf) + 6);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:669:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (int)wcslen(search_path);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:681:9:  [1] (buffer) wcscat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Risk is low because the source is a constant
  character.
        wcscat(search_path, L"*");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:714:41:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 (jsize)wcslen(find_data.cFileName));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/WinNTFileSystem_md.c:869:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    ret = (*env)->NewString(env, p, (jsize)wcslen(p));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:107:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (wcslen(p) > 4 && !wcsncmp(p, L"\\\\.\\", 4))
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:227:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((pathlen = (int)wcslen(path)) > MAX_PATH - 1) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:239:44:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            fd.cFileName + wcslen(fd.cFileName)))){
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:246:61:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
               if (!(dst = wcp(dst, dend, L'\0', src, src + wcslen(src)))){
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:290:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((pathlen=(int)wcslen(pathWithCanonicalPrefix)) > MAX_PATH - 1) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:301:43:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        canonicalPrefix + wcslen(canonicalPrefix)))) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:306:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        fd.cFileName + wcslen(fd.cFileName)))) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/canonicalize_md.c:311:58:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (!(dst = wcp(dst, dend, L'\0', src, src + wcslen(src)))) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/dirent_md.c:66:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    dirp->path = (char *)malloc(strlen(dirname) + 5);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:95:27:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            dirlen = (int)wcslen(dir);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:106:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                curDirLenCached = (int)wcslen(dir);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:156:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pathlen = (int)wcslen(ps);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:488:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      &read,      /* number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libjava/io_util_md.c:497:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return (jint)read;
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:126:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(systemPath) + strlen(gb18030Font) < MAX_PATH + 1) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:126:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                strlen(systemPath) + strlen(gb18030Font) < MAX_PATH + 1) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:187:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(ret, "-");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:300:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(*script) != 4) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:413:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            len = MAX_PATH - (UINT)strlen("\\kernel32.dll") - 1;
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:418:13:  [1] (buffer) wcsncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, or
  automatically resizing strings. Risk is low because the source is a
  constant string.
            wcsncat(kernel32_path, L"\\kernel32.dll", MAX_PATH - ret);
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:598:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (uname != NULL && wcslen(uname) > 0) {
data/openjdk-16-16~14/src/java.base/windows/native/libjava/java_props_md.c:731:49:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return (*env)->NewString(env, wcstr, (jsize)wcslen(wcstr));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.c:36:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(path, "\\");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jdk_util_md.c:43:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(path, "\\");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c:48:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(jniEntryName, sym, (p - sym));
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c:51:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(jniEntryName, "_");
data/openjdk-16-16~14/src/java.base/windows/native/libjava/jni_util_md.c:57:13:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
            strcat(jniEntryName, "_");
data/openjdk-16-16~14/src/java.base/windows/native/libjimage/osSupport_windows.cpp:67:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
jlong osSupport::read(jint fd, char *buf, jlong nBytes, jlong offset) {
data/openjdk-16-16~14/src/java.base/windows/native/libjli/cmdtoargs.c:283:13:  [1] (buffer) getchar:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = getchar();
data/openjdk-16-16~14/src/java.base/windows/native/libjli/cmdtoargs.c:326:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char* cptr = (char*) malloc(strlen(argv[0]) + sizeof(char) * 3 + strlen(cmdline) + 1);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/cmdtoargs.c:326:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char* cptr = (char*) malloc(strlen(argv[0]) + sizeof(char) * 3 + strlen(cmdline) + 1);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:524:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    prefix_len = wcslen(prefix);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:531:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(*wpath, prefix, prefix_len);
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:550:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t path_len = strlen(path) + 1; /* includes the terminating NULL */
data/openjdk-16-16~14/src/java.base/windows/native/libjli/java_md.c:567:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(name) < MAX_PATH) {
data/openjdk-16-16~14/src/java.base/windows/native/libnet/DefaultProxySelector.c:271:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t maxlen = wcslen(s);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/DefaultProxySelector.c:330:71:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    jhost = (*env)->NewString(env, head->host, (jsize)wcslen(head->host));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NTLMAuthSequence.c:123:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AuthId.UserLength = (unsigned long) strlen( pUser );
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NTLMAuthSequence.c:128:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AuthId.PasswordLength = (unsigned long) strlen( pPassword );
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NTLMAuthSequence.c:133:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            AuthId.DomainLength = (unsigned long) strlen( pDomain );
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c:280:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            curr->name = (char *)malloc(strlen(dev_name) + 1);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c:304:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(curr->displayName, ifrowP->bDescr, ifrowP->dwDescrLen);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface.c:577:47:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                       (jsize)wcslen ((PWCHAR)ifs->displayName));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:376:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        nif->name = malloc (strlen(newname)+1);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:377:52:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        nif->displayName = malloc (wcslen(ptr->FriendlyName)*2+2);
data/openjdk-16-16~14/src/java.base/windows/native/libnet/NetworkInterface_winXP.c:562:48:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                        (jsize)wcslen ((PWCHAR)ifs->displayName));
data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:62:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(s1)+1;
data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:65:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len + strlen(s2) > MAX_STR_LEN)     /* insufficient space */
data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:69:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(s1, ",");
data/openjdk-16-16~14/src/java.base/windows/native/libnet/ResolverConfigurationImpl.c:104:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (strlen(result) > 0) {
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:63:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            &read,          /* receives number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:84:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, (jint)read, JNI_TRUE);
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:113:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            &read,          /* receives number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/DatagramDispatcher.c:137:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertLongReturnVal(env, (jlong)read, JNI_TRUE);
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:57:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      &read,      /* number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:70:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, (jint)read, JNI_TRUE);
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:97:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                          &read,            /* number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:99:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read > 0) {
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:100:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            totalRead += read;
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:102:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read < num) {
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:151:24:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                      &read,            /* number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/FileDispatcherImpl.c:174:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, (jint)read, JNI_TRUE);
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/IOUtil.c:172:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                          &read,      /* number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/IOUtil.c:183:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read > 0) {
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/IOUtil.c:184:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            totalRead += read;
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/Iocp.c:153:70:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, (const jchar *)message, (jsize)wcslen(message));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:65:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            &read,          /* receives number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:83:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertReturnVal(env, (jint)read, JNI_TRUE);
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:122:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            &read,          /* receives number of bytes read */
data/openjdk-16-16~14/src/java.base/windows/native/libnio/ch/SocketDispatcher.c:143:45:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    return convertLongReturnVal(env, (jlong)read, JNI_TRUE);
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/RegistryFileTypeDetector.c:54:36:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                jsize len = (jsize)wcslen((WCHAR*)data);
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:188:70:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, (const jchar *)message, (jsize)wcslen(message));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:321:70:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jstring name = (*env)->NewString(env, data.cFileName, (jsize)wcslen(data.cFileName));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:356:63:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, data->cFileName, (jsize)wcslen(data->cFileName));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:374:72:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jstring name = (*env)->NewString(env, data.cStreamName, (jsize)wcslen(data.cStreamName));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:399:64:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, data.cStreamName, (jsize)wcslen(data.cStreamName));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:554:72:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    str = (*env)->NewString(env, (const jchar *)fileSystemName, (jsize)wcslen(fileSystemName));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:558:68:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    str = (*env)->NewString(env, (const jchar *)volumeName, (jsize)wcslen(volumeName));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:641:73:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        return (*env)->NewString(env, (const jchar *)volumeName, (jsize)wcslen(volumeName));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:841:62:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = (*env)->NewString(env, (const jchar *)domain, (jsize)wcslen(domain));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:846:60:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    s = (*env)->NewString(env, (const jchar *)name, (jsize)wcslen(name));
data/openjdk-16-16~14/src/java.base/windows/native/libnio/fs/WindowsNativeDispatcher.c:895:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (jsize)wcslen(string));
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:658:5:  [1] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant character.
    wcscpy(statusWindow->status, L"");
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:740:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    "[InputMethod ON]", strlen("[InputMethod ON]"));
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1230:21:  [1] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant character.
                    wcscpy(statusWindow->status, L"");
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1239:21:  [1] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant character.
                    wcscpy(statusWindow->status, L"");
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1243:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(statusWindow->status,
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1267:13:  [1] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant character.
            wcscpy(statusWindow->status, L"");
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1283:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int32_t)wcslen(string);
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1397:28:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cur_len = (int32_t)wcslen(cur_text);
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1464:29:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (statusWindow->on && wcslen(statusWindow->peText) > 0)
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1466:14:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    else if (wcslen(statusWindow->status) == 0)
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1547:41:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (str != NULL &&  (len = (int32_t)wcslen(str)) != 0) {
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1616:31:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        && (len_pe = (int32_t)wcslen(statusWindow->peText)) > 0) {
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1670:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!(imserver = calloc(1,strlen(immodifiers)+strlen(XIM_SERVER_CATEGORY)+1))) return True;
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1670:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (!(imserver = calloc(1,strlen(immodifiers)+strlen(XIM_SERVER_CATEGORY)+1))) return True;
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1672:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    immodifiers += strlen(XIMMODIFIER);
data/openjdk-16-16~14/src/java.desktop/aix/native/libawt_xawt/awt/awt_InputMethod.c:1674:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    imserverPtr = imserver + strlen(imserver);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:36:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(fmt) > 0) {
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:59:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (enumerate != NULL && strlen(enumerate) > 0
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:147:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                totalLen = strlen(ALSAVersionString);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_CommonUtils.c:183:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer, ALSAVersionString, len);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:234:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
        strncat(buffer, "]", sizeof(buffer) - strlen(buffer) - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:234:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(buffer, "]", sizeof(buffer) - strlen(buffer) - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:235:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(desc->name,
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:239:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                desc->strLen - strlen(buffer));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:240:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(desc->name, buffer, desc->strLen - strlen(desc->name));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:240:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(desc->name, buffer, desc->strLen - strlen(desc->name));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:243:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(desc->description, snd_ctl_card_info_get_name(cardinfo),
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:245:13:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
            strncat(desc->description, ", ",
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:246:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:248:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(desc->description, snd_rawmidi_info_get_id(rawmidi_info),
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:249:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:250:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
        strncat(desc->description, ", ", desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:250:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(desc->description, ", ", desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:251:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(desc->description, snd_rawmidi_info_get_name(rawmidi_info),
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:252:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:307:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(name, desc.name, nameLength - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:317:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, ALSA_VENDOR, nameLength - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_MidiUtils.c:332:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(name, desc.description, nameLength - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:189:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant character.
        strncat(buffer, "]", sizeof(buffer) - strlen(buffer) - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:189:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(buffer, "]", sizeof(buffer) - strlen(buffer) - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:190:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(desc->name,
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:194:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                desc->strLen - strlen(buffer));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:195:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(desc->name, buffer, desc->strLen - strlen(desc->name));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:195:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(desc->name, buffer, desc->strLen - strlen(desc->name));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:196:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(desc->vendor, "ALSA (http://www.alsa-project.org)", desc->strLen);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:197:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(desc->description,
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:202:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
        strncat(desc->description, ", ", desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:202:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(desc->description, ", ", desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:203:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(desc->description, snd_pcm_info_get_id(pcminfo), desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:203:81:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(desc->description, snd_pcm_info_get_id(pcminfo), desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:204:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
        strncat(desc->description, ", ", desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:204:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(desc->description, ", ", desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:205:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(desc->description, snd_pcm_info_get_name(pcminfo), desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_PCMUtils.c:205:83:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat(desc->description, snd_pcm_info_get_name(pcminfo), desc->strLen - strlen(desc->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:129:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(description->name, snd_ctl_card_info_get_id(card_info), PORT_STRING_LENGTH - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:131:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(description->name, buffer, PORT_STRING_LENGTH - 1 - strlen(description->name));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:131:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(description->name, buffer, PORT_STRING_LENGTH - 1 - strlen(description->name));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:132:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
    strncpy(description->vendor, "ALSA (http://www.alsa-project.org)", PORT_STRING_LENGTH - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:133:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(description->description, snd_ctl_card_info_get_name(card_info), PORT_STRING_LENGTH - 1);
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:134:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
    strncat(description->description, ", ", PORT_STRING_LENGTH - 1 - strlen(description->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:134:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(description->description, ", ", PORT_STRING_LENGTH - 1 - strlen(description->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:135:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(description->description, snd_ctl_card_info_get_mixername(card_info), PORT_STRING_LENGTH - 1 - strlen(description->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:135:108:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strncat(description->description, snd_ctl_card_info_get_mixername(card_info), PORT_STRING_LENGTH - 1 - strlen(description->description));
data/openjdk-16-16~14/src/java.desktop/linux/native/libjsound/PLATFORM_API_LinuxOS_ALSA_Ports.c:313:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(name, nam, len - 1);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:91:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(desc->name, "Default Audio Device", DAUDIO_STRING_LENGTH);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:92:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(desc->description, "Default Audio Device", DAUDIO_STRING_LENGTH);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:316:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read((Byte *)dstBuffer, Pos2Offset(readPos), len);
data/openjdk-16-16~14/src/java.desktop/macosx/native/libjsound/PLATFORM_API_MacOSX_PCM.cpp:393:10:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    void read(Byte *dstBuffer, int srcOffset, int len) {
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_mem.c:231:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(header->filename, filename, FILENAME_MAX);
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.c:81:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t      lengthOne = strlen(fileOne);
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.c:82:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t      lengthTwo = strlen(fileTwo);
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/debug/debug_trace.c:221:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DASSERT(strlen(DTraceBuffer) < MAX_TRACE_BUFFER);
data/openjdk-16-16~14/src/java.desktop/share/native/common/awt/medialib/mlib_sys.c:85:19:  [1] (free) memalign:
  On some systems (though not Linux-based systems) an attempt to free()
  results from memalign() may fail. This may, on a few systems, be
  exploitable. Also note that memalign() may not check that the boundary
  parameter is correct (CWE-676). Use posix_memalign instead (defined in
  POSIX's 1003.1d). Don't switch to valloc(); it is marked as obsolete in BSD
  4.3, as legacy in SUSv2, and is no longer defined in SUSv3. In some cases,
  malloc()'s alignment may be sufficient.
  return (void *) memalign(8, size);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c:624:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    end = p + strlen(p);
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c:629:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if ((strlen(extName) == n) && (strncmp(extName, p, n) == 0)) {
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c:1060:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(vendor) + 1 + strlen(renderer) + 1 + 1+strlen(version)+1 + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c:1060:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(vendor) + 1 + strlen(renderer) + 1 + 1+strlen(version)+1 + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/common/java2d/opengl/OGLContext.c:1060:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(vendor) + 1 + strlen(renderer) + 1 + 1+strlen(version)+1 + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h:88:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define ft_strlen   strlen
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/config/ftstdlib.h:90:21:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
#define ft_strncpy  strncpy
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/include/freetype/ftsystem.h:336:26:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    FT_Stream_IoFunc     read;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:63:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:65:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( stream->read( stream, pos, 0, 0 ) )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:137:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:138:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read_bytes = stream->read( stream, pos, buffer, count );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:174:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:175:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read_bytes = stream->read( stream, stream->pos, buffer, count );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:218:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( stream && stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:247:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:276:28:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      read_bytes = stream->read( stream, stream->pos,
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:333:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:470:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:472:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( stream->read( stream, stream->pos, &result, 1L ) != 1L )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:511:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:513:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ( stream->read( stream, stream->pos, reads, 2L ) != 2L )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:556:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:558:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ( stream->read( stream, stream->pos, reads, 2L ) != 2L )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:601:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:603:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (stream->read( stream, stream->pos, reads, 3L ) != 3L )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:646:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:648:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ( stream->read( stream, stream->pos, reads, 4L ) != 4L )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:691:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ( stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstream.c:693:22:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ( stream->read( stream, stream->pos, reads, 4L ) != 4L )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstroke.c:720:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ( *read & FT_STROKE_TAG_ON )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/base/ftstroke.c:722:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        else if ( *read & FT_STROKE_TAG_CUBIC )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c:143:42:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                         FT_Short*       read,
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c:166:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        reference = read[1];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c:167:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        delta     = read[0] - reference;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c:175:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        reference = read[0];
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c:176:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        delta     = read[1] - reference;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c:657:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      FT_Short*  read;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c:674:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          write->org = *read;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshglob.c:693:25:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          write->org = *read;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshrec.c:343:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if ( read[0] & rmask )
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshrec.c:436:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        FT_Byte*  read;
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/pshinter/pshrec.c:459:44:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          write[0] = (FT_Byte)( write[0] | read[0] );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/sfnt/sfobjs.c:74:30:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      code = FT_NEXT_USHORT( read );
data/openjdk-16-16~14/src/java.desktop/share/native/libfreetype/src/type1/t1parse.c:212:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if ( !stream->read )
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_gif.c:63:18:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int rc = io->read(io, buf, n);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:341:13:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int c = fgetc(f);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:401:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(fileName) + strlen("@100pct") + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:401:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strlen(fileName) + strlen("@100pct") + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:427:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            lengthPct = strlen(dupFileName) +
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:428:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(scaledImgPct) + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:430:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                lengthX = strlen(dupFileName) +
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:431:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        strlen(scaledImgX) + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:450:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            lengthPct = length_Without_Ext + strlen(scaledImgPct) +
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:451:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    strlen(fileExtension) + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:453:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                lengthX = length_Without_Ext + strlen(scaledImgX) +
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.c:454:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        strlen(fileExtension) + 1;
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_impl.h:162:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int (*read)(void* pStream, void* pData, int nBytes);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_jpeg.c:68:27:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    nbytes = src->stream->read(src->stream, src->buffer, INPUT_BUF_SIZE);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_png.c:40:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    check = stream->read(stream, data, length);
data/openjdk-16-16~14/src/java.desktop/share/native/libsplashscreen/splashscreen_png.c:189:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    stream->read(stream, sig, SIG_BYTES);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:179:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            compareLength = strlen ( onePath );
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:236:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        onePath = SAFE_SIZE_ARRAY_ALLOC(malloc, strlen (fDirP->name[index]) + 2, sizeof( char ) );
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:249:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat ( onePath, "/" );
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:315:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        slen = strlen(fontdirs[pos]);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:415:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pathLen += (strlen(fontdirs[i]) + 1);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/awt/fontpath.c:421:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(fontPath, ":");
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glx.h:308:48:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                   GLXDrawable read, GLXContext ctx );
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glx.h:334:92:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
typedef Bool (* PFNGLXMAKECONTEXTCURRENTPROC) (Display *dpy, GLXDrawable draw, GLXDrawable read, GLXContext ctx);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h:151:92:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
typedef Bool ( *PFNGLXMAKECONTEXTCURRENTPROC) (Display *dpy, GLXDrawable draw, GLXDrawable read, GLXContext ctx);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h:169:73:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Bool glXMakeContextCurrent (Display *dpy, GLXDrawable draw, GLXDrawable read, GLXContext ctx);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h:947:92:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
typedef Bool ( *PFNGLXMAKECURRENTREADSGIPROC) (Display *dpy, GLXDrawable draw, GLXDrawable read, GLXContext ctx);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/J2D_GL/glxext.h:950:73:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
Bool glXMakeCurrentReadSGI (Display *dpy, GLXDrawable draw, GLXDrawable read, GLXContext ctx);
data/openjdk-16-16~14/src/java.desktop/unix/native/common/java2d/opengl/OGLFuncs_md.h:65:98:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
typedef Bool (GLAPIENTRY *glXMakeContextCurrentType)(Display *dpy, GLXDrawable draw, GLXDrawable read, GLXContext ctx);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt/awt/awt_LoadLibrary.c:125:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(buf);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt/awt/awt_LoadLibrary.c:160:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(p, tk, MAXPATHLEN-len-1);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_GraphicsEnv.c:685:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(getenv("_AWT_IGNORE_XKB")) > 0) {
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_InputMethod.c:792:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(statusWindow->status));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_InputMethod.c:796:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    "[InputMethod ON]", strlen("[InputMethod ON]"));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_InputMethod.c:1234:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(statusWindow->status, text->string.multi_byte, MAX_STATUS_LEN);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/awt_InputMethod.c:1238:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(statusWindow->status, mbstr, MAX_STATUS_LEN);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c:774:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    sizeof(ENV_PREFIX), 1, strlen (gtk_modules_env));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c:780:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                size_t PREFIX_LENGTH = strlen(ENV_PREFIX);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c:785:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        if (strlen(new_env) > PREFIX_LENGTH) {
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk2_interface.c:786:39:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                            new_env = strcat(new_env, ":");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.c:609:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    sizeof(ENV_PREFIX), 1, strlen (gtk_modules_env));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.c:615:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                size_t PREFIX_LENGTH = strlen(ENV_PREFIX);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.c:620:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        if (strlen(new_env) > PREFIX_LENGTH) {
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/awt/gtk3_interface.c:621:39:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                            new_env = strcat(new_env, ":");
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:135:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t pkgFileNameLen = strlen(pkgFileName);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:136:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t pos, len = strlen(info.dli_fname);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:147:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(pkgInfoPath, info.dli_fname, pos);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:161:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            size_t versionPrefixLen = strlen(versionPrefix);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/java2d/x11/XRBackendNative.c:165:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
              size_t lineLen = strlen(line);
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XToolkit.c:686:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            count = read(AWT_READPIPE, read_buf, AWT_POLL_BUFSIZE );
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:887:70:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    (Atom)type, format, mode, (unsigned char*)chars, strlen(chars));
data/openjdk-16-16~14/src/java.desktop/unix/native/libawt_xawt/xawt/XlibWrapper.c:1216:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    long length = strlen((char*)str);
data/openjdk-16-16~14/src/java.desktop/unix/native/libsplashscreen/splashscreen_sys.c:80:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    inSize = strlen(in);
data/openjdk-16-16~14/src/java.desktop/unix/native/libsplashscreen/splashscreen_sys.c:599:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            if (read(ctl, &buf, sizeof(buf)) > 0) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPipelineManager.cpp:367:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (wcslen(id) > 21) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPipelineManager.cpp:369:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(vendorId, id+8, 4);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DPipelineManager.cpp:373:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(deviceId, id+17, 4);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/java2d/d3d/D3DShaderGen.c:122:22:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        while ((ch = fgetc(fpTmp)) != EOF) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:38:102:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define JNU_NewStringPlatform(env, x) env->NewString(reinterpret_cast<jchar*>(x), static_cast<jsize>(_tcslen(x)))
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:229:40:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    static_cast<jsize>(wcslen(pStrret->pOleStr)));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:235:102:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define JNU_NewStringPlatform(env, x) env->NewString(reinterpret_cast<jchar*>(x), static_cast<jsize>(_tcslen(x)))
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/ShellFolder2.cpp:791:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(reinterpret_cast<LPWSTR>(wszPath), reinterpret_cast<LPCWSTR>(strPath), nLength);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/WPrinterJob.cpp:109:8:  [1] (buffer) lstrcpyn:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
       lstrcpyn(pPrinterName, cBuffer, index+1);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt.h:198:108:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define JNU_NewStringPlatform(env, x) env->NewString(reinterpret_cast<const jchar*>(x), static_cast<jsize>(_tcslen(x)))
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DataTransferer.cpp:196:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jsize length = (jsize)strlen(encoding);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Desktop.cpp:133:13:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            _tcsncpy(fileBuffer, pathStr, BUFFER_LIMIT - 2);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDS.cpp:1537:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read > 0) memmove(pv, (void *)(m_buffer + m_off), read);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDS.cpp:1537:59:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read > 0) memmove(pv, (void *)(m_buffer + m_off), read);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDS.cpp:1539:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    m_off += read;
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_DnDDS.cpp:1542:20:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        *pcbRead = read;
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_FileDialog.cpp:301:13:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            _tcsncpy(fileBuffer, tmp, bufferLimit - 2); // the fileBuffer is double null terminated string
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_FileDialog.cpp:385:29:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                    : (jint)_tcslen(ofn.lpstrFile);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:392:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (wcslen(text)<=wcslen(tail)) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:392:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (wcslen(text)<=wcslen(tail)) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:395:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wchar_t* p = text+wcslen(text)-wcslen(tail);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:395:36:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wchar_t* p = text+wcslen(text)-wcslen(tail);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1737:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(m_szCodePageSubkey) > 0) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1754:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(szSubKey) + strlen(lpszCP)) >= KEYLEN) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1754:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(szSubKey) + strlen(lpszCP)) >= KEYLEN) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1757:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    strcpy(&(szSubKey[strlen(szSubKey)]), lpszCP);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1801:13:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (wcslen(m_szDefaultEUDCFile) > 0) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1824:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DASSERT(strlen((LPCSTR)szFileName) > 0);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Font.cpp:1841:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (wcslen(szEUDCFileName) > 0) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintControl.cpp:466:39:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    ? _tcslen(info2->pDriverName)
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintControl.cpp:469:40:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                     ? _tcslen(pPrinterName)
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintControl.cpp:472:39:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                    ? _tcslen(info2->pPortName)
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintControl.cpp:1048:24:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        LPTSTR pbuf = (_tcslen(lpcNames + devnames->wDeviceOffset) == 0 ?
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintControl.cpp:1057:17:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pbuf = (_tcslen(lpcNames + devnames->wOutputOffset) == 0 ?
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:1318:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                size_t len = wcslen(defPort);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:2298:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t nameLen = wcslen(fontNameW);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:2481:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t strLen = wcslen(wText);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:4140:39:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  WORD drvNameLen = static_cast<WORD>(_tcslen(p2->pDriverName));  // driver name
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:4141:39:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  WORD ptrNameLen = static_cast<WORD>(_tcslen(p2->pPrinterName)); // printer name
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_PrintJob.cpp:4142:39:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  WORD porNameLen = static_cast<WORD>(_tcslen(p2->pPortName));    // port name
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TextComponent.cpp:313:37:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            return static_cast<int>(wcslen(pStr));
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:236:22:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = _tcslen(buf);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_Toolkit.cpp:409:41:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        const size_t searchedStrLen = ::_tcslen(searchedStr);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TrayIcon.cpp:722:9:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        _tcsncpy(m_nid.szTip, tooltip, TRAY_ICON_TOOLTIP_MAX_SIZE);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TrayIcon.cpp:828:9:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        _tcsncpy(m_nid.szInfoTitle, caption, TRAY_ICON_BALLOON_TITLE_MAX_SIZE);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_TrayIcon.cpp:841:9:  [1] (buffer) _tcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        _tcsncpy(m_nid.szInfo, text, TRAY_ICON_BALLOON_INFO_MAX_SIZE);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:61:29:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t iFormatLen = _tcslen(lpszFormat);
data/openjdk-16-16~14/src/java.desktop/windows/native/libawt/windows/awt_ole.cpp:63:27:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t iTimeLen = _tcslen(szTime);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:70:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(windir) > BSIZE-7) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:78:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(fontpath,";");
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:145:9:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (wcslen((LPWSTR)fullName) >= LF_FACESIZE) {
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:211:41:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 (jsize)wcslen((LPWSTR)lpelfe->elfFullName));
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:299:12:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    slen = wcslen(lpelfe->elfLogFont.lfFaceName);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:389:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t TTSLEN = wcslen(TTSUFFIX);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:392:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = wcslen(name);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:418:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t dslen = wcslen(data);
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:444:59:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            fontStr = (*env)->NewString(env, ptr1, (jsize)wcslen(ptr1));
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:481:55:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fontStr = (*env)->NewString(env, name, (jsize)wcslen(name));
data/openjdk-16-16~14/src/java.desktop/windows/native/libfontmanager/fontpath.c:656:5:  [1] (buffer) wcscpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using a function version that stops copying at the end
  of the buffer. Risk is low because the source is a constant character.
    wcscpy(lfw.lfFaceName, L"");      /* one face per family (CHECK) */
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Charset_Util.cpp:45:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(dest, utf8EncodedName, maxLength - 1);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:264:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(desc->description, "DirectSound Playback", DAUDIO_STRING_LENGTH);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_DirectSound.cpp:267:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(desc->description, "DirectSound Capture", DAUDIO_STRING_LENGTH);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_MidiOut.c:128:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(name, desc, nameLength-1);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:116:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r += strlen(ret);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:222:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        r += strlen(ret);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:363:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
        strncpy(description->description, "Port Mixer", PORT_STRING_LENGTH-1);
data/openjdk-16-16~14/src/java.desktop/windows/native/libjsound/PLATFORM_API_WinOS_Ports.c:564:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            strncpy(name, line->szName, len-1);
data/openjdk-16-16~14/src/java.desktop/windows/native/libsplashscreen/splashscreen_sys.c:70:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(in);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:73:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (pos == NULL) ? (int)strlen(tail) : (int)(pos - tail);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:85:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char * str = (char*)malloc( (int)strlen(pos + 1) + 1 );
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:203:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        oldLen = (int)strlen(premainClass);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:374:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        oldLen = (int)strlen(agentClass);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:512:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    oldLen = (int) strlen(agentClass);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/InvocationAdapter.c:737:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = (int)strlen(s);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAgent.c:346:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        ourCopyOfAgentClassName = allocate(jvmti(agent), strlen(agentClassName)+1);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAgent.c:351:65:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ourCopyOfOptionsString = allocate(jvmti(agent), strlen(optionsString)+1);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JPLISAgent.c:781:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(pkg_name_buf, cname, len);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JarFacade.c:58:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            end = &begin[strlen(begin)];
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/JarFacade.c:77:17:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                strncpy(attribute->value, begin, value_len);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/PathCharsValidator.c:49:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t n = strlen(s);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/PathCharsValidator.c:62:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t n = strlen(s);
data/openjdk-16-16~14/src/java.instrument/share/native/libinstrument/PathCharsValidator.c:179:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    n = strlen(path);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/EncodingSupport_md.c:82:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (env_lang == NULL || strlen(env_lang) == 0) &&
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/EncodingSupport_md.c:83:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (env_lc_all == NULL || strlen(env_lc_all) == 0) &&
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/EncodingSupport_md.c:84:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        (env_lc_ctype == NULL || strlen(env_lc_ctype) == 0)) {
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:78:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    sb = (char*)malloc(strlen(pathname)+1);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:105:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = strlen(pathname);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:120:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int pn = strlen(parent);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:121:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int cn = strlen(child);
data/openjdk-16-16~14/src/java.instrument/unix/native/libinstrument/FileSystemSupport_md.c:157:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = strlen(path);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:200:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = (int)strlen(path);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:228:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int pn = (int)strlen(parent);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:229:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int cn = (int)strlen(child);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:289:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int n = (int)strlen(path);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:314:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)strlen(path);
data/openjdk-16-16~14/src/java.instrument/windows/native/libinstrument/FileSystemSupport_md.c:327:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (start == 0 && len == (int)strlen(path)) {
data/openjdk-16-16~14/src/java.prefs/unix/native/libprefs/FileSystemPreferences.c:94:21:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        old_umask = umask(0);
data/openjdk-16-16~14/src/java.prefs/unix/native/libprefs/FileSystemPreferences.c:97:9:  [1] (access) umask:
  Ensure that umask is given most restrictive possible setting (e.g., 066 or
  077) (CWE-732).
        umask(old_umask);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:294:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t oldlen = wcslen(input);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:295:34:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t newlen = oldlen + 1 + wcslen(realm) + 1;
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:534:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t namelen = wcslen(fullname);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libsspi_bridge/sspi.cpp:582:20:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int len = (int)wcslen(names);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:687:21:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Length = (ULONG)wcslen(TargetPrefix.Buffer) * sizeof(WCHAR);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:781:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    Name.Length = (USHORT)strlen(Name.Buffer);
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:855:25:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        Length = (ULONG)wcslen( SourceString ) * sizeof( WCHAR );
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:916:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(realm, domainName.Buffer, domainName.Length/sizeof(WCHAR));
data/openjdk-16-16~14/src/java.security.jgss/windows/native/libw2k_lsa_auth/NativeCreds.c:956:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    realmLen = (ULONG)wcslen((PWCHAR)realm);
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:136:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp += (strlen(cp) + 1);
data/openjdk-16-16~14/src/java.smartcardio/share/native/libj2pcsc/pcsc.c:150:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cp += (strlen(cp) + 1);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:48:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        auto envFilePathLength = strlen(envfilePath);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:49:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        auto fileNameLength = strlen(fileName);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:90:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy((char *)retbuf, msg, sizeof(retbuf));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:110:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings. Risk is low because the source is a
  constant string.
        strncat((char *)retbuf, ": ", sizeof(retbuf) - strlen(retbuf) - 1);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:110:56:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat((char *)retbuf, ": ", sizeof(retbuf) - strlen(retbuf) - 1);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:111:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat((char *)retbuf, (char *)lpMsgBuf, sizeof(retbuf) - strlen(retbuf) - 1);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/common/AccessBridgeDebug.cpp:111:68:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strncat((char *)retbuf, (char *)lpMsgBuf, sizeof(retbuf) - strlen(retbuf) - 1);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:351:44:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                dataLength = dataLength + (_tcslen(STR_ACCESSBRIDGE) + 1) * sizeof(TCHAR);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jabswitch/jabswitch.cpp:417:31:  [1] (buffer) _tcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                dataLength = (_tcslen(newStr) + 1) * sizeof(TCHAR);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:195:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer, announcement, sizeof(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:197:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufOffset = (char *)(buffer + strlen(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:199:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       (int)(sizeof(buffer) - strlen(buffer)) );
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:212:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buffer, announcement, sizeof(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:214:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    bufOffset = (char *) (buffer + strlen(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:216:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                       (int)(sizeof(buffer) - strlen(buffer)) );
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:617:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bufOffset = (char *) (buffer + strlen(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:619:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           (int)(sizeof(buffer) - strlen(buffer)) );
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:625:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bufOffset = (char *) (buffer + strlen(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:627:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                          (int)(sizeof(buffer) - strlen(buffer)) );
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:657:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bufOffset = (char *) (buffer + strlen(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:659:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           (int)(sizeof(buffer) - strlen(buffer)) );
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:666:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        bufOffset = (char *) (buffer + strlen(buffer));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccessinspector/jaccessinspector.cpp:668:51:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                           (int)(sizeof(buffer) - strlen(buffer)) );
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:529:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        tvi.cchTextMax = (int)strlen(s);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:552:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        tvi.cchTextMax = (int)strlen(s);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:597:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(accessibleName, name, MAX_STRING_SIZE);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/jaccesswalker/jaccesswalker.cpp:605:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(accessibleRole, role, SHORT_STRING_SIZE);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeATInstance.cpp:49:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(memoryMappedFileName, memoryFilename, cMemoryMappedNameSize);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:983:61:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jstring textString = jniEnv->NewString(text, (jsize)wcslen(text));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1019:59:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jstring roleName = jniEnv->NewString(role, (jsize)wcslen(role));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1089:59:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jstring roleName = jniEnv->NewString(role, (jsize)wcslen(role));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1216:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(name, stringBytes, nameSize - 1);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1379:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(test_attributes.fullAttributesString, stringBytes, (sizeof(test_attributes.fullAttributesString) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1543:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->bridgeJavaDLLVersion,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1548:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->VMversion,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1553:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->bridgeJavaClassVersion,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1558:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->bridgeWinDLLVersion,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1736:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->name, stringBytes, (sizeof(info->name) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1768:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->description, stringBytes, (sizeof(info->description) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1800:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->role, stringBytes, (sizeof(info->role) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1832:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->role_en_US, stringBytes, (sizeof(info->role_en_US) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1863:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->states, stringBytes, (sizeof(info->states) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:1894:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(info->states_en_US, stringBytes, (sizeof(info->states_en_US) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:2810:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(relationSet->relations[i].key, stringBytes, (sizeof(relationSet->relations[i].key ) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:2912:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(hypertext->links[i].text, stringBytes, (sizeof(hypertext->links[i].text) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3048:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(hypertext->links[bufIndex].text, stringBytes,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3167:9:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        wcsncpy(info->text, stringBytes,
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3297:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(icons->iconInfo[i].description, stringBytes, (sizeof(icons->iconInfo[i].description) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3376:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(actions->actionInfo[i].name , stringBytes, (sizeof(actions->actionInfo[i].name ) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3422:65:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        jstring javaName = jniEnv->NewString(actionName, (jsize)wcslen(actionName));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3560:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(textItems->word, stringBytes, (sizeof(textItems->word) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3592:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(textItems->sentence, stringBytes, (sizeof(textItems->sentence) / sizeof(wchar_t))-2);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3672:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(selectionInfo->selectedText, stringBytes, (sizeof(selectionInfo->selectedText) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3889:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(attributes->backgroundColor, stringBytes, (sizeof(attributes->backgroundColor) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3926:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(attributes->foregroundColor, stringBytes, (sizeof(attributes->foregroundColor) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:3963:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(attributes->fontFamily, stringBytes, (sizeof(attributes->fontFamily) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:4169:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(attributes->fullAttributesString, stringBytes, (sizeof(attributes->fullAttributesString) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:4411:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(text, stringBytes, len);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:4458:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(value, stringBytes, len);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:4501:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(value, stringBytes, len);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/AccessBridgeJavaEntryPoints.cpp:4544:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(value, stringBytes, len);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1818:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->oldDescription, stringBytes, (sizeof(pkg->oldDescription) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1821:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->oldDescription, L"(null)", (sizeof(pkg->oldDescription) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1835:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->newDescription, stringBytes, (sizeof(pkg->newDescription) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1838:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->newDescription, L"(null)", (sizeof(pkg->newDescription) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1904:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->oldName, stringBytes, (sizeof(pkg->oldName) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1907:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->oldName, L"(null)", (sizeof(pkg->oldName) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1921:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->newName, stringBytes, (sizeof(pkg->newName) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:1924:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->newName, L"(null)", (sizeof(pkg->newName) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2041:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->oldState, stringBytes, (sizeof(pkg->oldState) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2044:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->oldState, L"(null)", (sizeof(pkg->oldState) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2058:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->newState, stringBytes, (sizeof(pkg->newState) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2061:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->newState, L"(null)", (sizeof(pkg->newState) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2178:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->oldValue, stringBytes, (sizeof(pkg->oldValue) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2181:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->oldValue, L"(null)", (sizeof(pkg->oldValue) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2195:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->newValue, stringBytes, (sizeof(pkg->newValue) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2198:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->newValue, L"(null)", (sizeof(pkg->newValue) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2433:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->oldValue, stringBytes, (sizeof(pkg->oldValue) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2436:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->oldValue, L"(null)", (sizeof(pkg->oldValue) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2450:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
                wcsncpy(pkg->newValue, stringBytes, (sizeof(pkg->newValue) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libjavaaccessbridge/JavaAccessBridge.cpp:2453:17:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
                wcsncpy(pkg->newValue, L"(null)", (sizeof(pkg->newValue) / sizeof(wchar_t)));
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/AccessBridgeJavaVMInstance.cpp:166:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(pkg->filename, memoryMappedFileName, cMemoryMappedNameSize);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2236:5:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    wcsncpy(pkg->text, text, sizeof(pkg->text)/sizeof(wchar_t)); // wide character copy
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:2465:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(name, pkg->rName, max);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3026:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(text, pkg->rText, len);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3058:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(value, pkg->rValue, len);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3085:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(value, pkg->rValue, len);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/libwindowsaccessbridge/WinAccessBridge.cpp:3112:13:  [1] (buffer) wcsncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
            wcsncpy(value, pkg->rValue, len);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:112:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t warningLength = strlen(warning) + 1;
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:125:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t spaceRemaining = buflen - strlen(buf) - 1;
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:127:9:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
        strncat(buf, warning, spaceRemaining);
data/openjdk-16-16~14/src/jdk.accessibility/windows/native/toolscommon/AccessInfo.cpp:130:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(buf, tmpbuf, spaceRemaining);
data/openjdk-16-16~14/src/jdk.attach/aix/native/libattach/VirtualMachineImpl.c:83:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(addr.sun_path, p, sizeof(addr.sun_path) - 1);
data/openjdk-16-16~14/src/jdk.attach/aix/native/libattach/VirtualMachineImpl.c:220:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, len), n);
data/openjdk-16-16~14/src/jdk.attach/linux/native/libattach/VirtualMachineImpl.c:86:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(addr.sun_path, p, sizeof(addr.sun_path) - 1);
data/openjdk-16-16~14/src/jdk.attach/linux/native/libattach/VirtualMachineImpl.c:223:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, len), n);
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:88:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(addr.sun_path, p, sizeof(addr.sun_path) - 1);
data/openjdk-16-16~14/src/jdk.attach/macosx/native/libattach/VirtualMachineImpl.c:225:17:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    RESTARTABLE(read(fd, buf, len), n);
data/openjdk-16-16~14/src/jdk.attach/windows/native/libattach/VirtualMachineImpl.c:628:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(cstr, str, len);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_util.c:718:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *ckpLength = (CK_ULONG) strlen(pCharArray);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_util.c:1266:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        malloc(strlen(exceptionMsgPrefix) + strlen(classNameString) + 1);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/share/native/libj2pkcs11/p11_util.c:1266:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        malloc(strlen(exceptionMsgPrefix) + strlen(classNameString) + 1);
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/p11_md.c:108:60:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        exceptionMessage = (char *) malloc(sizeof(char) * (strlen(systemErrorMessage) + strlen(libraryNameStr) + 1));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/unix/native/libj2pkcs11/p11_md.c:108:89:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        exceptionMessage = (char *) malloc(sizeof(char) * (strlen(systemErrorMessage) + strlen(libraryNameStr) + 1));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/p11_md.c:112:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                (strlen((LPTSTR) lpMsgBuf) + strlen(libraryNameStr) + 1));
data/openjdk-16-16~14/src/jdk.crypto.cryptoki/windows/native/libj2pkcs11/p11_md.c:112:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                (strlen((LPTSTR) lpMsgBuf) + strlen(libraryNameStr) + 1));
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecc_impl.h:118:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
#define PORT_Strlen(s)                  strlen((s))
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c:74:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int tmp = (int)strlen(str);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c:123:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(curveParams->genx) + strlen(curveParams->geny)) > 2 * 2 * MAX_ECKEY_LEN) {
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecdecode.c:123:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(curveParams->genx) + strlen(curveParams->geny)) > 2 * 2 * MAX_ECKEY_LEN) {
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl.c:344:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                int n = strlen(params->text) + 1;
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:62:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ret->text = kmem_alloc(strlen(params->text) + 1, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:63:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                bcopy(params->text, ret->text, strlen(params->text) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:72:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ret->irr = kmem_alloc(strlen(params->irr) + 1, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:73:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                bcopy(params->irr, ret->irr, strlen(params->irr) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:80:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ret->curvea = kmem_alloc(strlen(params->curvea) + 1, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:81:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                bcopy(params->curvea, ret->curvea, strlen(params->curvea) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:88:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ret->curveb = kmem_alloc(strlen(params->curveb) + 1, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:89:52:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                bcopy(params->curveb, ret->curveb, strlen(params->curveb) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:96:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ret->genx = kmem_alloc(strlen(params->genx) + 1, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:97:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                bcopy(params->genx, ret->genx, strlen(params->genx) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:104:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ret->geny = kmem_alloc(strlen(params->geny) + 1, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:105:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                bcopy(params->geny, ret->geny, strlen(params->geny) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:112:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                ret->order = kmem_alloc(strlen(params->order) + 1, kmflag);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:113:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                bcopy(params->order, ret->order, strlen(params->order) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:150:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                kmem_free(params->text, strlen(params->text) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:156:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                kmem_free(params->irr, strlen(params->irr) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:162:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                kmem_free(params->curvea, strlen(params->curvea) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:168:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                kmem_free(params->curveb, strlen(params->curveb) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:174:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                kmem_free(params->genx, strlen(params->genx) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:180:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                kmem_free(params->geny, strlen(params->geny) + 1);
data/openjdk-16-16~14/src/jdk.crypto.ec/share/native/libsunec/impl/ecl_curve.c:186:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                kmem_free(params->order, strlen(params->order) + 1);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:226:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int i = read(fd, &elf_ident, sizeof(elf_ident));
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:262:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(PREFIX) + strlen(path) + 1;
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/LinuxDebuggerLocal.cpp:262:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(PREFIX) + strlen(path) + 1;
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/dwarf.cpp:78:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  _buf += strlen(augmentation_string) + 1; // includes '\0'
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:55:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(alt_root) + strlen(name) > PATH_MAX) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:55:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(alt_root) + strlen(name) > PATH_MAX) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:60:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(alt_path, alt_root, PATH_MAX);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:62:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  alt_path_end = alt_path + strlen(alt_path);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:68:5:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
    strncat(alt_path, s, free_space);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/libproc_impl.c:246:8:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
   if (strlen(libname) >= sizeof(newlib->name)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_core.c:271:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (read(ph->core->core_fd, buf, size) != size) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/ps_proc.c:242:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t state_len = strlen(state_string);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:142:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    int len = read(fd, buffer, sizeof buffer);
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:169:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int offset = (strlen(debug_filename) + 4) >> 2;
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:172:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  char *debug_pathname = malloc(strlen(debug_filename)
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:173:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                + strlen(name)
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:174:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                + strlen(".debug/")
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:175:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                + strlen(debug_file_directory)
data/openjdk-16-16~14/src/jdk.hotspot.agent/linux/native/libsaproc/symtab.c:247:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  filename = malloc(strlen (debug_file_directory) + (sizeof "/.build-id/" - 1) + 1
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:39:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      alt_root_len = strlen(alt_root);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:118:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, (void *)&fatheader, sizeof(struct fat_header)) != sizeof(struct fat_header)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:124:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read(fd, (void *)&fatarch, sizeof(struct fat_arch)) != sizeof(struct fat_arch)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:158:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, (void *)&fhdr, sizeof(mach_header_64)) != sizeof(mach_header_64)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/libproc_impl.c:224:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(libname) >= sizeof(newlib->name)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:234:6:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if(read(fd, (void *)&fhead, sizeof(mach_header_64)) != sizeof(mach_header_64)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:241:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, (void *)&lcmd, sizeof(load_command)) != sizeof(load_command)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:248:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read(fd, (void *)&segcmd, sizeof(segment_command_64)) != sizeof(segment_command_64)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:267:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read(fd, (void *)&fc, sizeof(thread_fc)) != sizeof(thread_fc)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:274:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if (read(fd, (void *)&thrstate, sizeof(x86_thread_state_t)) != sizeof(x86_thread_state_t)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:318:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if (read(fd, (void *)&flstate, sizeof(x86_float_state_t)) != sizeof(x86_float_state_t)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:325:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if (read(fd, (void *)&excpstate, sizeof(x86_exception_state_t)) != sizeof(x86_exception_state_t)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:356:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(filepath, jdk_dir, BUF_SIZE);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:358:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(filepath, jdk_subdir, BUF_SIZE - 1 - strlen(filepath));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:358:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncat(filepath, jdk_subdir, BUF_SIZE - 1 - strlen(filepath));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:359:3:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
  strncat(filepath, filename, BUF_SIZE - 1 - strlen(filepath));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:359:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  strncat(filepath, filename, BUF_SIZE - 1 - strlen(filepath));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:399:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(jdk_dir, execname, posbin - execname);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:417:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(jdk_dir, execname, posbin - execname);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:434:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(filepath, dypath, BUF_SIZE);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:436:7:  [1] (buffer) strncat:
  Easily used incorrectly (e.g., incorrectly computing the correct maximum
  size to add) [MS-banned] (CWE-120). Consider strcat_s, strlcat, snprintf,
  or automatically resizing strings.
      strncat(filepath, filename, BUF_SIZE - 1 - strlen(filepath));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:436:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      strncat(filepath, filename, BUF_SIZE - 1 - strlen(filepath));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:476:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, (void *)&v, sizeof(uint32_t)) == sizeof(uint32_t)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:486:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read(fd, (void *)&v, sizeof(uint32_t)) != sizeof(uint32_t)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:495:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if (read(fd, (void *)&header, sizeof(mach_header_64)) != sizeof(mach_header_64)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:505:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        if (read(fd, (void *)&lcmd, sizeof(load_command)) != sizeof(load_command)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:516:15:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
          if (read(fd, (void *)&dylibcmd, sizeof(dylib_command)) != sizeof(dylib_command)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:523:13:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            read(fd, (void *)(name + j), sizeof(char));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:559:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, (void *)core_header, sizeof(mach_header_64)) != sizeof(mach_header_64)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:593:3:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
  strncpy(ph->core->exec_path, exec_file, sizeof(ph->core->exec_path));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/ps_core.c:745:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   if (read(ph->core->core_fd, buf, size) != size) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:65:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    key.size = strlen(key.data) + 1;
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:74:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      char* tmp = (char *)malloc(strlen(symtab->symbols[i].name) + 1);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:80:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        rkey.size = strlen(tmp) + 1;
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:109:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, (void *)&header, sizeof(mach_header_64)) != sizeof(mach_header_64)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:128:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, (void *)&lcmd, sizeof(load_command)) != sizeof(load_command)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:143:7:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  if (read(fd, (void *)&symtabcmd, sizeof(symtab_command)) != sizeof(symtab_command)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:170:14:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  int size = read(fd, (void *)(symtab->strs), symtabcmd.strsize * sizeof(char));
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:180:9:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    if (read(fd, (void *)&lentry, sizeof(nlist_64)) != sizeof(nlist_64)) {
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:198:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    symtab->symbols[i].size = strlen(symtab->symbols[i].name);
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:360:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        key.size = strlen(sym_name) + 1;
data/openjdk-16-16~14/src/jdk.hotspot.agent/macosx/native/libsaproc/symtab.c:406:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  key.size = strlen(sym_name) + 1;
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/ps_core_common.c:360:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
      if ((n = read(fd, &header, sizeof(CDSFileMapHeaderBase)))
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:104:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return strlen(buf);
data/openjdk-16-16~14/src/jdk.hotspot.agent/share/native/libsaproc/sadis.c:237:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t flen = strlen(format);
data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp:184:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      AutoArrayPtr<char> errmsg(new char[strlen(str) + 32]); \
data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp:307:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(msg) + 1;
data/openjdk-16-16~14/src/jdk.hotspot.agent/windows/native/libsaproc/sawindbg.cpp:316:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    char* newBuffer = (char*)realloc(m_msgBuffer, len + strlen(m_msgBuffer));
data/openjdk-16-16~14/src/jdk.incubator.jpackage/linux/native/applauncher/Executor.cpp:47:27:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
            const int c = fgetc(stream);
data/openjdk-16-16~14/src/jdk.incubator.jpackage/windows/native/libjpackage/ResourceEditor.cpp:112:19:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
        srcStream.read(reinterpret_cast<char*>(buf.data()), size);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:100:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int msg_len = (int)strlen(newmsg) + (int)strlen(join_str) +
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:100:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int msg_len = (int)strlen(newmsg) + (int)strlen(join_str) +
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:101:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      (int)strlen(buf) + 3;
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:109:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msg = (*callbacks->alloc)((int)strlen(newmsg)+1);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:125:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i=0; i<strlen(hello); i++) {
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:136:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i=0; i<strlen(hello); i++) {
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:188:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            name2 = (callbacks->alloc)((int)strlen(name) + 1);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBack.c:334:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *msgP = (*callbacks->alloc)((int)strlen(msg)+1);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:191:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msg = (*callback->alloc)((int)strlen(newmsg)+1);
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:739:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(address) >= MAX_IPC_PREFIX) {
data/openjdk-16-16~14/src/jdk.jdi/share/native/libdt_shmem/shmemBase.c:803:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(address) >= MAX_IPC_PREFIX) {
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:118:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int msg_len = (int)strlen(newmsg) + (int)strlen(join_str) +
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:118:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int msg_len = (int)strlen(newmsg) + (int)strlen(join_str) +
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:119:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      (int)strlen(buf) + 3;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:127:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msg = (*callback->alloc)((int)strlen(newmsg)+1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:193:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    helloLen = (int)strlen(hello);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:249:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (eptr != s_port + strlen(s_port)) {
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:436:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    err = getAddrInfo(buffer, strlen(buffer), NULL, &hints, &addrInfo);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:694:50:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        *actualAddress = (*callback->alloc)((int)strlen(buf) + 1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1243:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    *msgP = (*callback->alloc)((int)strlen(msg)+1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libdt_socket/socketTransport.c:1262:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(allowed_peers);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.c:175:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        pattLen = (int)strlen(pattern);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.c:182:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        offset = (int)strlen(classname) - compLen;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/SDE.c:660:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(sourceDebugExtension) <= 4 ||
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/VirtualMachineImpl.c:833:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    buf = jvmtiAllocate((int)strlen(string)+1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/VirtualMachineImpl.c:850:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            plen = (int)strlen(pos);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:966:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    originalLength = strlen(options);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:968:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                (jint)strlen(new_options) + 1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:974:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    (void)strcat(combinedOptions, ",");
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1053:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        length = (int)strlen(options);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1090:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            current += strlen(current) + 1;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1101:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            current += strlen(current) + 1;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1112:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            current += strlen(current) + 1;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1123:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            current += strlen(current) + 1;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1130:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            current += strlen(current) + 1;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1164:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            current += strlen(current) + 1;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/debugInit.c:1192:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            current += strlen(current) + 1;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/error_messages.c:75:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (int)strlen((char*)utf8buf);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventFilter.c:257:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pattLen = (int)strlen(pattern);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventFilter.c:264:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        offset = (int)strlen(classname) - compLen;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHandler.c:481:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    classname = jvmtiAllocate((int)strlen(signature)+1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/eventHandler.c:500:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            char *durableSignature = jvmtiAllocate((int)strlen(signature)+1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/outStream.c:308:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jint      length = string != NULL ? (int)strlen(string) : 0;
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:79:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (int)strlen(msg);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:134:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (int)strlen(libdir);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:141:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(libname) == 0) {
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:433:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    commandLine = jvmtiAllocate((int)strlen(command) +
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:434:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 (int)strlen(name) +
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:435:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                                 (int)strlen(address) + 3);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:440:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    (void)strcat(commandLine, " ");
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:442:11:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
    (void)strcat(commandLine, " ");
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:446:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (int)strlen(commandLine);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:519:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        info->name = jvmtiAllocate((int)strlen(name)+1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:527:48:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            info->address = jvmtiAllocate((int)strlen(address)+1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:546:58:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                info->allowed_peers = jvmtiAllocate((int)strlen(allowed_peers) + 1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:572:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (int)strlen(name) + (int)strlen(retAddress) + 2; /* ':' and '\0' */
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:572:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (int)strlen(name) + (int)strlen(retAddress) + 2; /* ':' and '\0' */
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/transport.c:579:9:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
        strcat(prop_value, ":");
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/util.c:1485:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(signature);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/util.c:1661:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        len = (int)strlen(propertyValue);
data/openjdk-16-16~14/src/jdk.jdwp.agent/share/native/libjdwp/util.c:1707:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            value = jvmtiAllocate((int)strlen(utf) + 1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libdt_socket/socket_md.c:271:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(buf, msg, size-1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/exec_md.c:62:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    args = jvmtiAllocate((jint)strlen(cmdLine)+1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c:51:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    paths_copy = jvmtiAllocate((int)strlen(paths) + 1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c:96:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int pnamelen = pname ? strlen(pname) : 0;
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c:99:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (pnamelen + (int)strlen(fname) + 10 > holderlen) {
data/openjdk-16-16~14/src/jdk.jdwp.agent/unix/native/libjdwp/linker_md.c:115:15:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        (void)strncpy(err_buf, dlerror(), err_buflen-2);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:48:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    paths_copy = jvmtiAllocate((int)strlen(paths) + 1);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:98:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        int n = (int)strlen(s);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:100:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(buf, s, n);
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:114:39:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    const int pnamelen = pname ? (int)strlen(pname) : 0;
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:117:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (pnamelen + (int)strlen(fname) + 10 > holderlen) {
data/openjdk-16-16~14/src/jdk.jdwp.agent/windows/native/libjdwp/linker_md.c:135:13:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120). Risk is low because the source is a
  constant string.
            strncpy(err_buf, "Can't find dependent libraries", err_buflen-2);
data/openjdk-16-16~14/src/jdk.management/linux/native/libmanagement_ext/UnixOperatingSystem.c:66:12:  [1] (buffer) fgetc:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    while (fgetc(f) != '\n');
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:331:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(originalString);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:339:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(allocatedString, originalString, len);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:408:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fullCounterPathLen = strlen(objectName);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:409:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    fullCounterPathLen += strlen(counterName);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:420:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fullCounterPathLen += strlen(imageName);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:431:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        fullCounterPathLen += strlen(instance);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:455:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            fullCounterPathLen += strlen(instance);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:895:64:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (pCount = 0, tmp = instances; *tmp != '\0'; tmp = &tmp[strlen(tmp)+1], pCount++);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:913:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (index = 0, tmp = instances; *tmp != '\0'; tmp = &tmp[strlen(tmp)+1], ++index) {
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:1048:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pdhIDProcessCounterFmtLen = strlen(pdhProcessImageName);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:1049:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pdhIDProcessCounterFmtLen += strlen(pdhLocalizedProcessObject);
data/openjdk-16-16~14/src/jdk.management/windows/native/libmanagement_ext/OperatingSystemImpl.c:1050:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    pdhIDProcessCounterFmtLen += strlen(pdhLocalizedIDProcessCounter);
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:193:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   int read, jboolean isEOR, struct sockaddr* sap) {
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:205:35:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    remaining = ssf->ssf_length - read;
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:361:8:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
   int read, jboolean isEOR, struct sockaddr* sap) {
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:365:21:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                    read, isEOR, sap);
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:384:68:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  (JNIEnv* env, jobject resultContainerObj, struct msghdr* msg,int read,
data/openjdk-16-16~14/src/jdk.sctp/unix/native/libsctp/SctpChannelImpl.c:400:40:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
                                  isa, read, cdata->streamNumber,
data/openjdk-16-16~14/src/utils/hsdis/hsdis-demo.c:185:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    int evlen = (fmt ? fmt - event : strlen(event));
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:228:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      || (strlen(close) + 3*20 > bufsize))
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:245:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (type)    sprintf(p += strlen(p), " type='%s'", type);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:246:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (dsize)   sprintf(p += strlen(p), " dsize='%d'", dsize);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:247:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (delays)  sprintf(p += strlen(p), " delay='%d'", delays);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:420:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t plen = (q == NULL) ? strlen(p) : ((q++) - p);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:428:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(mach_option, p, plen);
data/openjdk-16-16~14/src/utils/hsdis/hsdis.c:437:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(iop, p, plen);
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:50:31:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return strncmp(str, prefix, strlen(prefix)) == 0;
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:54:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t suffix_len = strlen(suffix);
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:55:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_len = strlen(str);
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:127:34:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strncmp(argv[i], "-jdk", strlen(argv[i])) == 0) {
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:131:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return argv[i] + strlen("--jdk=");
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:134:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      return argv[i] + strlen("-jdk:");
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:144:33:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const char* v = argv[i] + strlen("-new-thread");
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:145:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      if (strlen(v) == 0) {
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:228:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(java_home) + strlen("/lib/jli/libjli.dylib") + 1;
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:228:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(java_home) + strlen("/lib/jli/libjli.dylib") + 1;
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:236:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(java_home) + strlen(java_home_var) + 2;
data/openjdk-16-16~14/test/hotspot/gtest/gtestMain.cpp:236:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(java_home) + strlen(java_home_var) + 2;
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:97:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t temp_file_len = strlen(tmp_dir) + strlen(file_sep) + strlen(filename) + 28;
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:97:44:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t temp_file_len = strlen(tmp_dir) + strlen(file_sep) + strlen(filename) + 28;
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:97:63:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t temp_file_len = strlen(tmp_dir) + strlen(file_sep) + strlen(filename) + 28;
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:108:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t temp_file_len = strlen(prefix) + strlen(tmp_dir) + strlen(file_sep) + strlen(filename) + 1;
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:108:43:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t temp_file_len = strlen(prefix) + strlen(tmp_dir) + strlen(file_sep) + strlen(filename) + 1;
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:108:61:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t temp_file_len = strlen(prefix) + strlen(tmp_dir) + strlen(file_sep) + strlen(filename) + 1;
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:108:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t temp_file_len = strlen(prefix) + strlen(tmp_dir) + strlen(file_sep) + strlen(filename) + 1;
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:125:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  while (ret != NULL && buf[strlen(buf) - 1] != '\n' && !feof(fp)) {
data/openjdk-16-16~14/test/hotspot/gtest/logging/logTestUtils.inline.hpp:149:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t match_len = strlen(substrs[idx]);
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:100:17:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ASSERT_LT(strlen(expected_buf), sizeof(expected_buf));
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:101:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      ret = jio_snprintf(expected_buf + strlen(expected_buf),
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:102:49:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         sizeof(expected_buf) - strlen(expected_buf),
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logConfiguration.cpp:104:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                         strlen(expected_buf) > 0 ? "," : "",
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorations.cpp:62:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  EXPECT_EQ(3, read) << "Invalid uptime decoration: " << uptime;
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorations.cpp:142:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ASSERT_EQ(7, read) << "Invalid format: " << timestr;
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logDecorations.cpp:179:16:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
  ASSERT_EQ(9, read) << "Invalid format: " << timestr;
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logFileOutput.cpp:109:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(filename) + 3;
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp:150:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  for (size_t i = strlen(start_marker); i < size; i++) {
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp:153:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  sprintf(data + size - strlen(end_marker) - 1, "%s", end_marker);
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logMessageTest.cpp:189:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  const size_t prefix_len = strlen(prefix);
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logStream.cpp:100:15:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_TRUE(strlen(line_buffer) == 1*M - 1);
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSet.cpp:166:11:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
      if (equal) {
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:38:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jio_snprintf(expected + strlen(expected),
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:39:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 sizeof(expected) - strlen(expected),
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:62:29:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jio_snprintf(expected + strlen(expected),
data/openjdk-16-16~14/test/hotspot/gtest/logging/test_logTagSetDescriptions.cpp:63:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                 sizeof(expected) - strlen(expected),
data/openjdk-16-16~14/test/hotspot/gtest/memory/test_guardedMemory.cpp:137:19:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t str_sz = strlen(str) + 1;
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:167:16:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = wcslen(to_copy);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:173:17:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  return dest + wcslen(to_copy);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:357:51:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    os::snprintf(buf, JVM_MAXPATHLEN, "%d", (int) wcslen(path));
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:374:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t buf_len = strlen(buf);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:442:56:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  printf("Checking \"%ls\" (%d chars):\n", path, (int) wcslen(path));
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:443:64:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  printf("_wfullpath             %ls (%d chars)\n", abs, (int) wcslen(abs));
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:503:23:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int cwd_len = (int) wcslen(cwd);
data/openjdk-16-16~14/test/hotspot/gtest/runtime/test_os_windows.cpp:504:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  int dir_prefix_len = (int) wcslen(dir_prefix);
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_ostream.cpp:41:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  static const size_t len_lorem = strlen(lorem);
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_spinYield.cpp:77:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_TRUE(strncmp(expected, buffer, strlen(expected)) == 0);
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_spinYield.cpp:92:41:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_TRUE(strncmp(expected, buffer, strlen(expected)) == 0);
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_stringUtils.cpp:32:54:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_NEAR(0.95349, StringUtils::similarity(str1, strlen(str1), str2, strlen(str2)), 1e-5);
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_stringUtils.cpp:32:74:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  EXPECT_NEAR(0.95349, StringUtils::similarity(str1, strlen(str1), str2, strlen(str2)), 1e-5);
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_utf8.cpp:39:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_EQ(strlen(res), (size_t) 9) << "string should be truncated here";
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_utf8.cpp:42:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_EQ(strlen(res), (size_t) 15) << "string should be truncated here";
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_utf8.cpp:45:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_EQ(strlen(res), (size_t) 18) << "string should be truncated here";
data/openjdk-16-16~14/test/hotspot/gtest/utilities/test_utf8.cpp:49:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  ASSERT_EQ(strlen(res), (size_t) 3 * 19) << "string should end here";
data/openjdk-16-16~14/test/hotspot/jtreg/gc/g1/libTestPeriodicCollectionJNI.c:54:9:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
        usleep(1000);
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:239:12:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  optlen = strlen(CLASS_PATH_OPT) + strlen(javaclasspath) + 1;
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/StackGuardPages/exeinvoke.c:239:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  optlen = strlen(CLASS_PATH_OPT) + strlen(javaclasspath) + 1;
data/openjdk-16-16~14/test/hotspot/jtreg/runtime/handshake/libHandshakeTransitionTest.c:38:3:  [1] (obsolete) usleep:
  This C routine is considered obsolete (as opposed to the shell command by
  the same name). The interaction of this function with SIGALRM and other
  timer functions such as sleep(), alarm(), setitimer(), and nanosleep() is
  unspecified (CWE-676). Use nanosleep(2) or setitimer(2) instead.
  usleep(ms*1000);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/FieldAccessWatch/libFieldAccessWatch.c:98:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        char *fieldName = (char *)malloc(strlen(name) + 16);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HiddenClass/libHiddenClassSigTest.cpp:31:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
static const size_t SIG_START_LEN = strlen(SIG_START);
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HiddenClass/libHiddenClassSigTest.cpp:262:7:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(sig) > strlen(SIG_START) &&
data/openjdk-16-16~14/test/hotspot/jtreg/serviceability/jvmti/HiddenClass/libHiddenClassSigTest.cpp:262:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (strlen(sig) > strlen(SIG_START) &&
data/openjdk-16-16~14/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:66:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      size_t n = strlen(FROM);
data/openjdk-16-16~14/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:119:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(to) == strlen(from) &&
data/openjdk-16-16~14/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:119:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(to) == strlen(from) &&
data/openjdk-16-16~14/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:120:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(class_name) > 0 &&
data/openjdk-16-16~14/test/hotspot/jtreg/testlibrary/jvmti/libSimpleClassFileLoadHook.c:121:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
          strlen(to) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent00.cpp:54:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(optionsString);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/aod/VirtualMachine/VirtualMachine07/agent01.cpp:57:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t length = strlen(optionsString);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/FramePop/framepop002/framepop002.cpp:80:53:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    return strncmp(inf.name, TEST_THREAD_NAME_BASE, strlen(TEST_THREAD_NAME_BASE)) == 0;
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.cpp:226:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                     (ind == 4 || strlen(inf.name) ==
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetAllThreads/allthr001/allthr001.cpp:227:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                      strlen(thrInfo[ind].thrNames[i])));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.cpp:114:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (extList[i].id != NULL && strlen(extList[i].id) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.cpp:140:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (extList[i].short_description != NULL && strlen(extList[i].short_description) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionEvents/extevents001/extevents001.cpp:157:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            || strlen(extList[i].params[j].name) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.cpp:125:42:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (extList[i].id != NULL && strlen(extList[i].id) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.cpp:151:57:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            if (extList[i].short_description != NULL && strlen(extList[i].short_description) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetExtensionFunctions/extfuncs001/extfuncs001.cpp:168:32:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                            || strlen(extList[i].params[j].name) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadGroupChildren/getthrdgrpchld001/getthrdgrpchld001.cpp:244:28:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t threadNameLen = strlen(expectedThreadName);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.cpp:87:25:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (ind < 2 && strlen(inf.name) != strlen(threads[ind].name))) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/GetThreadInfo/thrinfo001/thrinfo001.cpp:87:45:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            (ind < 2 && strlen(inf.name) != strlen(threads[ind].name))) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.cpp:261:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  if (value_length != (jint) wcslen(STRING)) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/callbacks/Callbacks.cpp:266:19:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                  wcslen(STRING));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/IterateThroughHeap/filter-tagged/HeapFilter.cpp:278:25:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    field->size = (int) wcslen((wchar_t*)field->value);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst001/resumethrdlst001.cpp:169:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/ResumeThreadList/resumethrdlst002/resumethrdlst002.cpp:185:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.cpp:96:47:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER)))
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.cpp:96:62:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER)))
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.cpp:96:80:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER)))
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/RetransformClasses/retransform003/retransform003.cpp:96:95:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (name == NULL || strncmp(TRIGGER, name,strlen(name) < strlen(TRIGGER) ? strlen(name) : strlen(TRIGGER)))
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.cpp:108:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fld_name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldAccessWatch/setfldw001/setfldw001.cpp:110:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len != strlen(fields[0].name) || !isdigit(fld_name[len - 1])) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.cpp:102:11:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = strlen(fld_name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetFieldModificationWatch/setfmodw001/setfmodw001.cpp:104:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (len != strlen(fields[0].name) || !isdigit(fld_name[len - 1])) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SetLocalVariable/setlocal004/setlocal004.cpp:75:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(table[i].name) != 1) continue;
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst001/suspendthrdlst001.cpp:161:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/SuspendThreadList/suspendthrdlst002/suspendthrdlst002.cpp:177:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t len = strlen(name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM04/em04t001/em04t001.cpp:69:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(rec->name, name, NAME_LENGTH);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/events/EM07/em07t002/em07t002.cpp:85:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(rec->name, name, NAME_LENGTH);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp:431:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(chbuffer, "");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t001/hs201t001.cpp:463:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(chbuffer, "");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp:431:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(chbuffer, "");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/scenarios/hotswap/HS201/hs201t002/hs201t002.cpp:463:5:  [1] (buffer) strcpy:
  Does not check for buffer overflows when copying to destination [MS-banned]
  (CWE-120). Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy
  easily misused). Risk is low because the source is a constant character.
    strcpy(chbuffer, "");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.cpp:192:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    size_t PFX_LEN = strlen(TEST_THREAD_NAME_PREFIX);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/GetAllStackTraces/getallstktr001/getallstktr001.cpp:201:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(thr_info->name) < PFX_LEN ||
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/MethodBind/JvmtiTest/JvmtiTest.cpp:139:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/StackTrace/JvmtiTest/JvmtiTest.cpp:84:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:187:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/AddToBootstrapClassLoaderSearch/JvmtiTest/JvmtiTest.cpp:192:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment, options, (size_t) sizeof(segment)/sizeof(char));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/Dispose/JvmtiTest/JvmtiTest.cpp:93:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/ForceGarbageCollection/gc/gc.cpp:108:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/environment/JvmtiTest/JvmtiTest.cpp:77:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendMonitorInfo/JvmtiTest/JvmtiTest.cpp:112:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/nosuspendStackTrace/JvmtiTest/JvmtiTest.cpp:111:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/functions/rawmonitor/rawmonitor.cpp:190:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/heapref/heapref.cpp:413:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t len = strlen(classSig);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/refignore/refignore.cpp:411:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      const size_t len = strlen(classSig);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/setNullVMInit/JvmtiTest/JvmtiTest.cpp:141:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/jvmti/unit/timers/JvmtiTest/JvmtiTest.cpp:121:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (options && strlen(options) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/ExceptionCheckingJniEnv/exceptionjni001/exceptionjni001.cpp:53:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
  size_t len = strlen(expected_message);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/ExceptionCheckingJniEnv.cpp:167:14:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      len += strlen(strs[i]);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/ExceptionCheckingJniEnv.cpp:191:35:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    DecimalToAscii(full_message + strlen(full_message), _line);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jni/ExceptionCheckingJniEnv.cpp:193:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(full_message) >= len) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.cpp:171:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment1, p_segment1, (size_t) sizeof(segment1)/sizeof(char));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToBootstrapClassLoaderSearch/bootclssearch_agent.cpp:178:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment2, p_segment2, (size_t) sizeof(segment2)/sizeof(char));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.cpp:171:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment1, p_segment1, (size_t) sizeof(segment1)/sizeof(char));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/AddToSystemClassLoaderSearch/systemclssearch_agent.cpp:178:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(segment2, p_segment2, (size_t) sizeof(segment2)/sizeof(char));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/Injector.cpp:1065:23:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        u2 len = (u2) strlen(str);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.cpp:104:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        name_len = (jint) strlen(name) + 1;
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/hotswap/HotSwap.cpp:381:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    package_name_length = strlen(package_name);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:74:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(value) > 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:80:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(value) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:98:13:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (strlen(value) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:147:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(name, opt, opt_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:149:9:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
        strncpy(value, val, val_len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:242:36:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        if (!add_option(name, (int)strlen(name), value,
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:243:38:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
                        value ? (int)strlen(value) : 0)) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:295:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(value) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:320:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(value) <= 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:590:40:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    static const size_t prefixLength = strlen(graal_compiler_thread_name_prefix);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/jvmti/jvmti_tools.cpp:604:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if ((strlen(threadinfo.name) > prefixLength) &&
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:157:7:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
      strncpy(msg_buf2, msg_buf, sizeof(msg_buf2));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:163:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
      } else if (strlen(msg_buf2) != 0) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/share/native/nsk_tools.cpp:164:18:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        msg_buf2[strlen(msg_buf2)-1] = '\n'; // Make sure we have a newline char at the end.
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:79:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(element->str[allocs]) !=
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:83:20:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strsize += strlen(element->str[allocs])+1;
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:84:21:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (k = 0; k < strlen(element->str[allocs]); k++) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:103:27:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            for (k=0; k < strlen(element->str[j]); k++) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress001.cpp:234:14:  [1] (buffer) equal:
  Function does not check the second iterator for over-read conditions
  (CWE-126). This function is often discouraged by most C++ coding standards
  in favor of its safer alternatives provided since C++14. Consider using a
  form of this function that checks the second iterator before potentially
  overflowing it.
        if (!equal) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp:88:10:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    jint strlen;
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp:100:26:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    str = (char *)malloc(strlen*sizeof(char));
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp:115:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i=0;i<strlen;i++)
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/nsk/stress/jni/libjnistress004.cpp:118:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    for (i=0;i<strlen; i++) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.cpp:45:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(*dst, pStr, len);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.cpp:89:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(szName) + 1 > sizeof(mn->methodName) ||
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.cpp:90:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        strlen(szSignature) + 1 > sizeof(mn->classSig)) {
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.cpp:99:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mn->methodName, szName, sizeof(mn->methodName) - 1);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/mlvm/share/mlvmJvmtiUtils.cpp:102:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(mn->classSig, szSignature, sizeof(mn->classSig) - 1);
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.cpp:152:17:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                strcat(path, "\\");
data/openjdk-16-16~14/test/hotspot/jtreg/vmTestbase/vm/share/ProcessUtils.cpp:165:25:  [1] (buffer) strcat:
  Does not check for buffer overflows when concatenating to destination
  [MS-banned] (CWE-120). Consider using strcat_s, strncat, strlcat, or
  snprintf (warning: strncat is easily misused). Risk is low because the
  source is a constant character.
                        strcat(path, "\\");
data/openjdk-16-16~14/test/jdk/java/lang/String/nativeEncoding/libstringPlatformChars.c:41:16:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    len = (int)strlen(str);
data/openjdk-16-16~14/test/jdk/java/nio/channels/spi/SelectorProvider/inheritedChannel/libInheritedChannel.c:236:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(addr.sun_path, nameUtf, length);
data/openjdk-16-16~14/test/jdk/java/nio/channels/spi/SelectorProvider/inheritedChannel/libInheritedChannel.c:269:5:  [1] (buffer) strncpy:
  Easily used incorrectly; doesn't always \0-terminate or check for invalid
  pointers [MS-banned] (CWE-120).
    strncpy(addr.sun_path, nameUtf, length);
data/openjdk-16-16~14/test/jdk/java/nio/channels/spi/SelectorProvider/inheritedChannel/libInheritedChannel.c:284:11:  [1] (buffer) read:
  Check buffer boundaries if used in a loop including recursive loops
  (CWE-120, CWE-20).
    ret = read(fd, &res, 1);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:76:26:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (pName != NULL && wcslen(pName) == 2) {
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:104:22:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
            cbTest = wcslen(pName) * sizeof(wchar_t);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:131:24:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        DWORD cbTest = wcslen(pName) * sizeof(wchar_t);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:135:18:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        cbTest = wcslen(pName) * sizeof(wchar_t);
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:153:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wchar_t* pName = malloc((wcslen(lpLocaleStr) + 1) * sizeof(wchar_t *));
data/openjdk-16-16~14/test/jdk/java/util/Locale/data/deflocale.c:162:30:  [1] (buffer) wcslen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    wchar_t* pName = malloc((wcslen(lpUILangStr) + 1) * sizeof(wchar_t *));
data/openjdk-16-16~14/test/jdk/sun/management/jmxremote/bootstrap/exelauncher.c:64:30:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     cp_prop = (char*)malloc(strlen(CP_PROP)+strlen(argv[2]) +1);
data/openjdk-16-16~14/test/jdk/sun/management/jmxremote/bootstrap/exelauncher.c:64:46:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
     cp_prop = (char*)malloc(strlen(CP_PROP)+strlen(argv[2]) +1);
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:65:9:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
    if (strlen(buf) > 0) {
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:107:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(name + strlen(name), "0x%02hx%02hx%02hx%02hx%02hx%02hx",
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:117:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(name + strlen(name), "%lu",
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:126:24:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        sprintf(name + strlen(name), "-%lu",
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:153:22:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(name) + strlen(domain) + 3;
data/openjdk-16-16~14/test/jdk/sun/management/windows/exerevokeall.c:153:37:  [1] (buffer) strlen:
  Does not handle strings that are not \0-terminated; if given one it may
  perform an over-read (it could cause a crash if unprotected) (CWE-126).
        size_t len = strlen(name) + strlen(domain) + 3;

ANALYSIS SUMMARY:

Hits = 7180
Lines analyzed = 2026545 in approximately 56.82 seconds (35665 lines/second)
Physical Source Lines of Code (SLOC) = 1331478
Hits@level = [0] 15924 [1] 2650 [2] 2640 [3] 303 [4] 1559 [5]  28
Hits@level+ = [0+] 23104 [1+] 7180 [2+] 4530 [3+] 1890 [4+] 1587 [5+]  28
Hits/KSLOC@level+ = [0+] 17.3521 [1+] 5.3925 [2+] 3.40223 [3+] 1.41948 [4+] 1.19191 [5+] 0.0210293
Dot directories skipped = 3 (--followdotdir overrides)
Minimum risk level = 1
Not every hit is necessarily a security vulnerability.
There may be other security vulnerabilities; review your code!
See 'Secure Programming HOWTO'
(https://dwheeler.com/secure-programs) for more information.