The following issues were found
drivers/gpu/drm/nouveau/nvkm/engine/fifo/channv50.c
1 issues
Line: 85
/* do the kickoff... */
nvkm_wr32(device, 0x0032fc, chan->base.inst->addr >> 12);
if (nvkm_msec(device, 2000,
if (nvkm_rd32(device, 0x0032fc) != 0xffffffff)
break;
) < 0) {
nvkm_error(subdev, "channel %d [%s] unload timeout\n",
chan->base.chid, chan->base.object.client->name);
Reported by Cppcheck.
drivers/leds/leds-mlxreg.c
1 issues
Line: 42
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct led_classdev led_cdev;
u8 base_color;
void *data_parent;
char led_cdev_name[MLXREG_CORE_LABEL_MAX_SIZE];
};
#define cdev_to_priv(c) container_of(c, struct mlxreg_led_data, led_cdev)
/**
Reported by FlawFinder.
drivers/infiniband/ulp/rtrs/rtrs-pri.h
1 issues
Line: 105
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct list_head entry;
struct sockaddr_storage dst_addr;
struct sockaddr_storage src_addr;
char sessname[NAME_MAX];
uuid_t uuid;
struct rtrs_con **con;
unsigned int con_num;
unsigned int irq_con_num;
unsigned int recon_cnt;
Reported by FlawFinder.
drivers/leds/leds-netxbig.c
1 issues
Line: 265
Column: 9
CWE codes:
120
Suggestion:
Use sprintf_s, snprintf, or vsnprintf
struct netxbig_led_data *led_dat =
container_of(led_cdev, struct netxbig_led_data, cdev);
return sprintf(buf, "%d\n", led_dat->sata);
}
static DEVICE_ATTR_RW(sata);
static struct attribute *netxbig_led_attrs[] = {
Reported by FlawFinder.
drivers/gpu/drm/nouveau/nvkm/engine/fifo/chang84.c
1 issues
Line: 88
engn = fifo->base.func->engine_id(&fifo->base, engine);
save = nvkm_mask(device, 0x002520, 0x0000003f, 1 << engn);
nvkm_wr32(device, 0x0032fc, chan->base.inst->addr >> 12);
done = nvkm_msec(device, 2000,
if (nvkm_rd32(device, 0x0032fc) != 0xffffffff)
break;
) >= 0;
nvkm_wr32(device, 0x002520, save);
if (!done) {
Reported by Cppcheck.
drivers/infiniband/ulp/rtrs/rtrs.c
1 issues
Line: 430
Column: 3
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
if (strncmp(addr, "gid:", 4) == 0) {
return rtrs_str_gid_to_sockaddr(addr + 4, len - 4, port, dst);
} else if (strncmp(addr, "ip:", 3) == 0) {
char port_str[8];
char *cpy;
int err;
snprintf(port_str, sizeof(port_str), "%u", port);
cpy = kstrndup(addr + 3, len - 3, GFP_KERNEL);
Reported by FlawFinder.
drivers/gpu/drm/nouveau/nvkm/engine/fifo/chan.c
1 issues
Line: 136
static const struct nvkm_oproxy_func
nvkm_fifo_chan_child_func = {
.dtor[0] = nvkm_fifo_chan_child_del,
.init[0] = nvkm_fifo_chan_child_init,
.fini[0] = nvkm_fifo_chan_child_fini,
};
static int
Reported by Cppcheck.
drivers/infiniband/ulp/srp/ib_srp.h
1 issues
Line: 215
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct srp_host *srp_host;
struct Scsi_Host *scsi_host;
struct srp_rport *rport;
char target_name[32];
unsigned int scsi_id;
unsigned int sg_tablesize;
unsigned int target_can_queue;
int mr_pool_size;
int mr_per_cmd;
Reported by FlawFinder.
drivers/gpu/drm/nouveau/nvkm/engine/dma/usernv50.c
1 issues
Line: 142
Column: 23
CWE codes:
362/367!
Suggestion:
Set up the correct permissions (e.g., using setuid()) and try to open the file directly
return -EINVAL;
}
switch (dmaobj->base.access) {
case NV_MEM_ACCESS_VM:
break;
case NV_MEM_ACCESS_RO:
dmaobj->flags0 |= 0x00040000;
break;
Reported by FlawFinder.
drivers/infiniband/ulp/srpt/ib_srpt.h
1 issues
Line: 392
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct mutex mutex;
struct list_head tpg_list;
struct se_wwn wwn;
char name[64];
};
/**
* struct srpt_port - information associated by SRPT with a single IB port
* @sdev: backpointer to the HCA information.
Reported by FlawFinder.