The following issues were found
drivers/gpu/drm/i915/gt/intel_workarounds_types.h
1 issues
drivers/infiniband/hw/efa/efa_com_cmd.c
1 issues
Line: 496
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
return err;
}
memcpy(result->addr, resp.u.network_attr.addr,
sizeof(resp.u.network_attr.addr));
result->mtu = resp.u.network_attr.mtu;
return 0;
}
Reported by FlawFinder.
drivers/infiniband/hw/efa/efa_verbs.c
1 issues
Line: 327
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
{
struct efa_dev *dev = to_edev(ibdev);
memcpy(gid->raw, dev->dev_attr.addr, sizeof(dev->dev_attr.addr));
return 0;
}
int efa_query_pkey(struct ib_device *ibdev, u32 port, u16 index,
Reported by FlawFinder.
drivers/infiniband/hw/hfi1/affinity.c
1 issues
Line: 883
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct cpu_mask_set *set = NULL;
struct sdma_engine *sde = NULL;
struct hfi1_ctxtdata *rcd = NULL;
char extra[64];
int cpu = -1;
extra[0] = '\0';
cpumask_clear(&msix->mask);
Reported by FlawFinder.
drivers/gpu/drm/vmwgfx/vmwgfx_cmdbuf.c
1 issues
Line: 1144
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (IS_ERR(cmd))
return PTR_ERR(cmd);
memcpy(cmd, command, size);
header->cb_header->length = size;
header->cb_context = SVGA_CB_CONTEXT_DEVICE;
spin_lock(&man->lock);
status = vmw_cmdbuf_header_submit(header);
spin_unlock(&man->lock);
Reported by FlawFinder.
drivers/gpu/drm/virtio/virtgpu_drv.c
1 issues
Line: 53
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct pci_dev *pdev = to_pci_dev(vdev->dev.parent);
const char *pname = dev_name(&pdev->dev);
bool vga = (pdev->class >> 8) == PCI_CLASS_DISPLAY_VGA;
char unique[20];
int ret;
DRM_INFO("pci: %s detected at %s\n",
vga ? "virtio-vga" : "virtio-gpu-pci",
pname);
Reported by FlawFinder.
drivers/gpu/drm/via/via_drv.h
1 issues
Line: 90
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
ktime_t nsec_per_vblank;
atomic_t vbl_received;
drm_via_state_t hc_state;
char pci_buf[VIA_PCI_BUF_SIZE];
const uint32_t *fire_offsets[VIA_FIRE_BUF_SIZE];
uint32_t num_fire_offsets;
int chipset;
drm_via_irq_t via_irqs[VIA_NUM_IRQS];
unsigned num_irqs;
Reported by FlawFinder.
drivers/gpu/drm/via/via_dma.c
1 issues
Line: 301
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (vb == NULL)
return -EAGAIN;
memcpy(vb, dev_priv->pci_buf, cmd->size);
dev_priv->dma_low += cmd->size;
/*
* Small submissions somehow stalls the CPU. (AGP cache effects?)
Reported by FlawFinder.
drivers/infiniband/hw/hfi1/file_ops.c
1 issues
Line: 1689
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
static int user_add(struct hfi1_devdata *dd)
{
char name[10];
int ret;
snprintf(name, sizeof(name), "%s_%d", class_name(), dd->unit);
ret = hfi1_cdev_init(dd->unit, name, &hfi1_file_ops,
&dd->user_cdev, &dd->user_device,
Reported by FlawFinder.
drivers/gpu/drm/vc4/vc4_validate_shaders.c
1 issues
Line: 169
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (!temp_samples)
return false;
memcpy(&temp_samples[s],
&validation_state->tmu_setup[tmu],
sizeof(*temp_samples));
validated_shader->num_texture_samples = s + 1;
validated_shader->texture_samples = temp_samples;
Reported by FlawFinder.