Skip to content

mps2: put the .gnu.sgstubs section in a hard coded address #236

mps2: put the .gnu.sgstubs section in a hard coded address

mps2: put the .gnu.sgstubs section in a hard coded address #236

Triggered via push March 4, 2025 14:30
Status Success
Total duration 1m 9s
Artifacts

linter.yml

on: push
cpp-linter
59s
cpp-linter
Fit to window
Zoom out
Zoom in

Annotations

10 errors and 10 warnings
common/heap_4.c:39:10 [clang-diagnostic-error]: common/heap_4.c#L39
'config.h' file not found
freertos/list.c:37:10 [clang-diagnostic-error]: freertos/list.c#L37
'FreeRTOS.h' file not found
freertos/queue.c:37:10 [clang-diagnostic-error]: freertos/queue.c#L37
'FreeRTOS.h' file not found
freertos/tasks.c:39:10 [clang-diagnostic-error]: freertos/tasks.c#L39
'FreeRTOS.h' file not found
tools/ecdsa_keygen.c:62:16 [bugprone-reserved-identifier]: tools/ecdsa_keygen.c#L62
declaration uses identifier '_AES_DATA', which is a reserved identifier
tools/ecdsa_keygen.c:82:16 [readability-identifier-length]: tools/ecdsa_keygen.c#L82
variable name 'iv' is too short, expected at least 3 characters
tools/ecdsa_keygen.c:120:3 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]: tools/ecdsa_keygen.c#L120
Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
tools/ecdsa_keygen.c:121:3 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]: tools/ecdsa_keygen.c#L121
Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
tools/ecdsa_keygen.c:136:5 [clang-analyzer-unix.Malloc]: tools/ecdsa_keygen.c#L136
Potential leak of memory pointed to by 'encrypted_message'