The following issues were found
include/trace/events/ib_umad.h
1 issues
Line: 70
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
__entry->gid_index = umad_hdr->gid_index;
__entry->hop_limit = umad_hdr->hop_limit;
__entry->traffic_class = umad_hdr->traffic_class;
memcpy(__entry->gid, umad_hdr->gid, sizeof(umad_hdr->gid));
__entry->flow_label = umad_hdr->flow_label;
__entry->pkey_index = umad_hdr->pkey_index;
__entry->base_version = mad_hdr->base_version;
__entry->mgmt_class = mad_hdr->mgmt_class;
Reported by FlawFinder.
net/bridge/netfilter/nft_meta_bridge.c
1 issues
Line: 63
Column: 2
CWE codes:
120
return nft_meta_get_eval(expr, regs, pkt);
}
strncpy((char *)dest, br_dev ? br_dev->name : "", IFNAMSIZ);
return;
err:
regs->verdict.code = NFT_BREAK;
}
Reported by FlawFinder.
net/caif/caif_socket.c
1 issues
Line: 812
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (addr_len != sizeof(struct sockaddr_caif))
goto out;
memcpy(&cf_sk->conn_req.sockaddr, uaddr,
sizeof(struct sockaddr_caif));
/* Move to connecting socket, start sending Connect Requests */
sock->state = SS_CONNECTING;
sk->sk_state = CAIF_CONNECTING;
Reported by FlawFinder.
net/caif/cfcnfg.c
1 issues
Line: 285
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (l->u.utility.paramlen > sizeof(l->u.utility.params))
l->u.utility.paramlen = sizeof(l->u.utility.params);
memcpy(l->u.utility.params, s->param.data,
l->u.utility.paramlen);
break;
case CAIFPROTO_DEBUG:
l->linktype = CFCTRL_SRV_DBG;
Reported by FlawFinder.
net/nfc/core.c
1 issues
Line: 850
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
dev->active_target = NULL;
if (dev->n_targets) {
memcpy(&dev->targets[i], &dev->targets[i + 1],
(dev->n_targets - i) * sizeof(struct nfc_target));
} else {
kfree(dev->targets);
dev->targets = NULL;
}
Reported by FlawFinder.
net/caif/cfsrvl.c
1 issues
Line: 179
Column: 16
CWE codes:
362
bool cfsrvl_ready(struct cfsrvl *service, int *err)
{
if (!service->open) {
*err = -ENOTCONN;
return false;
}
return true;
}
Reported by FlawFinder.
include/trace/events/host1x.h
1 issues
Line: 113
Column: 4
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
TP_fast_assign(
if (cmdbuf) {
memcpy(__get_dynamic_array(cmdbuf), cmdbuf+offset,
words * sizeof(u32));
}
__entry->cmdbuf = cmdbuf;
__entry->name = name;
__entry->bo = bo;
Reported by FlawFinder.
include/trace/events/devlink.h
1 issues
Line: 39
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
__assign_str(driver_name, devlink->dev->driver->name);
__entry->incoming = incoming;
__entry->type = type;
memcpy(__get_dynamic_array(buf), buf, len);
__entry->len = len;
),
TP_printk("bus_name=%s dev_name=%s driver_name=%s incoming=%d type=%lu buf=0x[%*phD] len=%zu",
__get_str(bus_name), __get_str(dev_name),
Reported by FlawFinder.
include/trace/events/btrfs.h
1 issues
Line: 165
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
#define TP_fast_assign_fsid(fs_info) \
({ \
if (fs_info) \
memcpy(__entry->fsid, fs_info->fs_devices->fsid, \
BTRFS_FSID_SIZE); \
else \
memset(__entry->fsid, 0, BTRFS_FSID_SIZE); \
})
Reported by FlawFinder.
net/can/raw.c
1 issues
Line: 882
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (msg->msg_name) {
__sockaddr_check_size(RAW_MIN_NAMELEN);
msg->msg_namelen = RAW_MIN_NAMELEN;
memcpy(msg->msg_name, skb->cb, msg->msg_namelen);
}
/* assign the flags that have been recorded in raw_rcv() */
msg->msg_flags |= *(raw_flags(skb));
Reported by FlawFinder.