Error: GCC_ANALYZER_WARNING (CWE-775): [#def1] crun-HEAD/src/libcrun/criu.c:1016:32: warning[-Wanalyzer-fd-leak]: leak of file descriptor 'open(**_189.path, 0)' crun-HEAD/src/libcrun/utils.h:57:40: note: in definition of macro 'UNLIKELY' crun-HEAD/src/libcrun/criu.c:866:17: note: in expansion of macro 'YAJL_IS_ARRAY' # 1014| if (value == CLONE_NEWNET && def->linux->namespaces[i]->path != NULL) # 1015| { # 1016|-> inherit_new_net_fd = open (def->linux->namespaces[i]->path, open_flags_for_inherit); # 1017| if (UNLIKELY (inherit_new_net_fd < 0)) # 1018| return crun_make_error (err, errno, "unable to open(): `%s`", def->linux->namespaces[i]->path); Error: GCC_ANALYZER_WARNING (CWE-775): [#def2] crun-HEAD/src/libcrun/criu.c:1027:32: warning[-Wanalyzer-fd-leak]: leak of file descriptor 'open(**_210.path, 0)' crun-HEAD/src/libcrun/utils.h:57:40: note: in definition of macro 'UNLIKELY' crun-HEAD/src/libcrun/criu.c:866:17: note: in expansion of macro 'YAJL_IS_ARRAY' # 1025| if (value == CLONE_NEWPID && def->linux->namespaces[i]->path != NULL) # 1026| { # 1027|-> inherit_new_pid_fd = open (def->linux->namespaces[i]->path, open_flags_for_inherit); # 1028| if (UNLIKELY (inherit_new_pid_fd < 0)) # 1029| return crun_make_error (err, errno, "unable to open(): `%s`", def->linux->namespaces[i]->path); Error: GCC_ANALYZER_WARNING (CWE-775): [#def3] crun-HEAD/src/libcrun/seccomp.c: scope_hint: In function 'store_seccomp_cache' crun-HEAD/src/libcrun/seccomp.c:467:21: warning[-Wanalyzer-fd-leak]: leak of file descriptor 'open_rundir_dirfd(*container_44->context.state_root, err)' crun-HEAD/src/libcrun/utils.h:57:40: note: in definition of macro 'UNLIKELY' crun-HEAD/src/libcrun/seccomp.c: scope_hint: In function 'store_seccomp_cache' crun-HEAD/src/libcrun/seccomp.c: scope_hint: In function 'store_seccomp_cache' crun-HEAD/src/libcrun/utils.h:57:40: note: in definition of macro 'UNLIKELY' # 465| # 466| ret = libcrun_get_state_directory (&dir, state_root, NULL, err); # 467|-> if (UNLIKELY (ret < 0)) # 468| return ret; # 469| Error: GCC_ANALYZER_WARNING (CWE-775): [#def4] crun-HEAD/src/libcrun/seccomp.c: scope_hint: In function 'libcrun_open_seccomp_bpf' crun-HEAD/src/libcrun/seccomp.c:467:21: warning[-Wanalyzer-fd-leak]: leak of file descriptor 'open_rundir_dirfd(*container_50->context.state_root, err)' crun-HEAD/src/libcrun/utils.h:57:40: note: in definition of macro 'UNLIKELY' crun-HEAD/src/libcrun/seccomp.c: scope_hint: In function 'libcrun_open_seccomp_bpf' crun-HEAD/src/libcrun/utils.h:57:40: note: in definition of macro 'UNLIKELY' # 465| # 466| ret = libcrun_get_state_directory (&dir, state_root, NULL, err); # 467|-> if (UNLIKELY (ret < 0)) # 468| return ret; # 469|
| analyzer-version-clippy | 1.89.0 |
| analyzer-version-cppcheck | 2.18.3 |
| analyzer-version-gcc | 15.2.1 |
| analyzer-version-gcc-analyzer | 15.2.1 |
| analyzer-version-shellcheck | 0.11.0 |
| analyzer-version-unicontrol | 0.0.2 |
| diffbase-analyzer-version-clippy | 1.89.0 |
| diffbase-analyzer-version-cppcheck | 2.18.3 |
| diffbase-analyzer-version-gcc | 15.2.1 |
| diffbase-analyzer-version-gcc-analyzer | 15.2.1 |
| diffbase-analyzer-version-shellcheck | 0.11.0 |
| diffbase-analyzer-version-unicontrol | 0.0.2 |
| diffbase-enabled-plugins | clippy, cppcheck, gcc, shellcheck, unicontrol |
| diffbase-exit-code | 0 |
| diffbase-host | ip-172-16-1-119.us-west-2.compute.internal |
| diffbase-known-false-positives | /usr/share/csmock/known-false-positives.js |
| diffbase-known-false-positives-rpm | known-false-positives-0.0.0.20250521.132812.g8eff701.main-1.el9.noarch |
| diffbase-mock-config | fedora-rawhide-x86_64 |
| diffbase-project-name | crun-1.23.1-1.20250909183424546507.pr1875.49.g54693209 |
| diffbase-store-results-to | /tmp/tmp_5gc3c7x/crun-1.23.1-1.20250909183424546507.pr1875.49.g54693209.tar.xz |
| diffbase-time-created | 2025-09-09 19:40:24 |
| diffbase-time-finished | 2025-09-09 19:45:21 |
| diffbase-tool | csmock |
| diffbase-tool-args | '/usr/bin/csmock' '-r' 'fedora-rawhide-x86_64' '-t' 'unicontrol,shellcheck,gcc,clippy,cppcheck' '-o' '/tmp/tmp_5gc3c7x/crun-1.23.1-1.20250909183424546507.pr1875.49.g54693209.tar.xz' '--gcc-analyze' '--unicontrol-notests' '--unicontrol-bidi-only' '--install' 'pam' '/tmp/tmp_5gc3c7x/crun-1.23.1-1.20250909183424546507.pr1875.49.g54693209.src.rpm' |
| diffbase-tool-version | csmock-3.8.2.20250811.215846.gf3b3dbf-1.el9 |
| enabled-plugins | clippy, cppcheck, gcc, shellcheck, unicontrol |
| exit-code | 0 |
| host | ip-172-16-1-119.us-west-2.compute.internal |
| known-false-positives | /usr/share/csmock/known-false-positives.js |
| known-false-positives-rpm | known-false-positives-0.0.0.20250521.132812.g8eff701.main-1.el9.noarch |
| mock-config | fedora-rawhide-x86_64 |
| project-name | crun-1.23.1-1.20250909113742832857.main.46.gddc09534 |
| store-results-to | /tmp/tmp1ph7w3s0/crun-1.23.1-1.20250909113742832857.main.46.gddc09534.tar.xz |
| time-created | 2025-09-09 19:34:35 |
| time-finished | 2025-09-09 19:39:59 |
| title | Fixed findings |
| tool | csmock |
| tool-args | '/usr/bin/csmock' '-r' 'fedora-rawhide-x86_64' '-t' 'unicontrol,shellcheck,gcc,clippy,cppcheck' '-o' '/tmp/tmp1ph7w3s0/crun-1.23.1-1.20250909113742832857.main.46.gddc09534.tar.xz' '--gcc-analyze' '--unicontrol-notests' '--unicontrol-bidi-only' '--install' 'pam' '/tmp/tmp1ph7w3s0/crun-1.23.1-1.20250909113742832857.main.46.gddc09534.src.rpm' |
| tool-version | csmock-3.8.2.20250811.215846.gf3b3dbf-1.el9 |