The following issues were found
arch/mips/alchemy/common/dma.c
1 issues
Line: 109
Column: 11
CWE codes:
120
Suggestion:
Use sprintf_s, snprintf, or vsnprintf
for (i = 0; i < NUM_AU1000_DMA_CHANNELS; i++) {
chan = get_dma_chan(i);
if (chan != NULL)
len += sprintf(buf + len, "%2d: %s\n",
i, chan->dev_str);
}
if (fpos >= len) {
*start = buf;
Reported by FlawFinder.
arch/microblaze/kernel/setup.c
1 issues
Line: 49
Column: 1
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
* ASM code. Default position is BSS section which is cleared
* in machine_early_init().
*/
char cmd_line[COMMAND_LINE_SIZE] __section(".data");
void __init setup_arch(char **cmdline_p)
{
*cmdline_p = boot_command_line;
Reported by FlawFinder.
arch/microblaze/kernel/prom.c
1 issues
Line: 22
Column: 7
CWE codes:
126
pr_debug(" -> early_init_devtree(%p)\n", params);
early_init_dt_scan(params);
if (!strlen(boot_command_line))
strlcpy(boot_command_line, cmd_line, COMMAND_LINE_SIZE);
memblock_allow_resize();
pr_debug("Phys. mem: %lx\n", (unsigned long) memblock_phys_mem_size());
Reported by FlawFinder.
arch/microblaze/kernel/microblaze_ksyms.c
1 issues
Line: 32
Column: 15
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
EXPORT_SYMBOL(__strncpy_user);
#ifdef CONFIG_OPT_LIB_ASM
EXPORT_SYMBOL(memcpy);
EXPORT_SYMBOL(memmove);
#endif
EXPORT_SYMBOL(empty_zero_page);
Reported by FlawFinder.
arch/microblaze/include/uapi/asm/elf.h
1 issues
Line: 88
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
#define ELF_CORE_COPY_REGS(_dest, _regs) \
memcpy((char *) &_dest, (char *) _regs, \
sizeof(struct pt_regs));
/* This yields a mask that user programs can use to figure out what
* instruction set this CPU supports. This could be done in user space,
* but it's not easy, and we've already done it here.
Reported by FlawFinder.
arch/microblaze/include/asm/string.h
1 issues
Line: 16
Column: 14
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
#define __HAVE_ARCH_MEMMOVE
extern void *memset(void *, int, __kernel_size_t);
extern void *memcpy(void *, const void *, __kernel_size_t);
extern void *memmove(void *, const void *, __kernel_size_t);
#endif /* __KERNEL__ */
#endif /* _ASM_MICROBLAZE_STRING_H */
Reported by FlawFinder.
arch/microblaze/include/asm/setup.h
1 issues
Line: 13
Column: 8
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
#include <uapi/asm/setup.h>
# ifndef __ASSEMBLY__
extern char cmd_line[COMMAND_LINE_SIZE];
extern char *klimit;
extern void mmu_reset(void);
Reported by FlawFinder.
arch/um/drivers/null.c
1 issues
Line: 27
Column: 7
CWE codes:
362
*dev_out = NULL;
fd = open(DEV_NULL, O_RDWR);
return (fd < 0) ? -errno : fd;
}
static int null_read(int fd, char *c_out, void *unused)
{
Reported by FlawFinder.
crypto/asymmetric_keys/pkcs8_parser.c
1 issues
Line: 41
Column: 3
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
ctx->last_oid = look_up_OID(value, vlen);
if (ctx->last_oid == OID__NR) {
char buffer[50];
sprint_oid(value, vlen, buffer, sizeof(buffer));
pr_info("Unknown OID: [%lu] %s\n",
(unsigned long)value - ctx->data, buffer);
}
Reported by FlawFinder.
arch/arm/common/bL_switcher_dummy_if.c
1 issues
Line: 21
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
static ssize_t bL_switcher_write(struct file *file, const char __user *buf,
size_t len, loff_t *pos)
{
unsigned char val[3];
unsigned int cpu, cluster;
int ret;
pr_debug("%s\n", __func__);
Reported by FlawFinder.