The following issues were found
drivers/net/ethernet/actions/owl-emac.c
1 issues
Line: 1176
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (netif_running(netdev))
return -EBUSY;
memcpy(netdev->dev_addr, skaddr->sa_data, netdev->addr_len);
owl_emac_set_hw_mac_addr(netdev);
return owl_emac_setup_frame_xmit(netdev_priv(netdev));
}
Reported by FlawFinder.
drivers/net/ethernet/adaptec/starfire.c
1 issues
Line: 562
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
/* MII transceiver section. */
struct mii_if_info mii_if; /* MII lib hooks/info */
int phy_cnt; /* MII device addresses. */
unsigned char phys[PHY_CNT]; /* MII device addresses. */
void __iomem *base;
};
static int mdio_read(struct net_device *dev, int phy_id, int location);
Reported by FlawFinder.
drivers/net/ethernet/alacritech/slicoss.c
1 issues
Line: 1524
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
static void slic_get_strings(struct net_device *dev, u32 stringset, u8 *data)
{
if (stringset == ETH_SS_STATS) {
memcpy(data, slic_stats_strings, sizeof(slic_stats_strings));
data += sizeof(slic_stats_strings);
}
}
static void slic_get_drvinfo(struct net_device *dev,
Reported by FlawFinder.
drivers/net/ethernet/allwinner/sun4i-emac.c
1 issues
Line: 359
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (netif_running(dev))
return -EBUSY;
memcpy(dev->dev_addr, addr->sa_data, ETH_ALEN);
writel(dev->dev_addr[0] << 16 | dev->dev_addr[1] << 8 | dev->
dev_addr[2], db->membase + EMAC_MAC_A1_REG);
writel(dev->dev_addr[3] << 16 | dev->dev_addr[4] << 8 | dev->
dev_addr[5], db->membase + EMAC_MAC_A0_REG);
Reported by FlawFinder.
drivers/net/ethernet/alteon/acenic.c
1 issues
Line: 2721
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if(netif_running(dev))
return -EBUSY;
memcpy(dev->dev_addr, addr->sa_data,dev->addr_len);
da = (u8 *)dev->dev_addr;
writel(da[0] << 8 | da[1], ®s->MacAddrHi);
writel((da[2] << 24) | (da[3] << 16) | (da[4] << 8) | da[5],
Reported by FlawFinder.
drivers/net/ethernet/cisco/enic/vnic_resource.h
1 issues
Line: 72
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
u32 version; /* header format version */
u16 lif; /* loopback lif for mgmt frames */
u16 pci_slot; /* installed pci slot */
char serial[16]; /* card serial number */
};
struct vnic_resource {
u8 type;
u8 bar;
Reported by FlawFinder.
drivers/media/dvb-frontends/stb0899_priv.h
1 issues
drivers/net/ethernet/amazon/ena/ena_ethtool.c
1 issues
Line: 12
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
#include "ena_netdev.h"
struct ena_stats {
char name[ETH_GSTRING_LEN];
int stat_offset;
};
#define ENA_STAT_ENA_COM_ENTRY(stat) { \
.name = #stat, \
Reported by FlawFinder.
drivers/net/ethernet/cisco/enic/vnic_vic.c
1 issues
Line: 67
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
tlv->type = htons(type);
tlv->length = htons(length);
memcpy(tlv->value, value, length);
vp->num_tlvs = htonl(ntohl(vp->num_tlvs) + 1);
vp->length = htonl(ntohl(vp->length) +
offsetof(struct vic_provinfo_tlv, value) + length);
Reported by FlawFinder.
drivers/net/ethernet/amd/amd8111e.c
1 issues
Line: 1503
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
int i;
struct sockaddr *addr = p;
memcpy(dev->dev_addr, addr->sa_data, dev->addr_len);
spin_lock_irq(&lp->lock);
/* Setting the MAC address to the device */
for (i = 0; i < ETH_ALEN; i++)
writeb(dev->dev_addr[i], lp->mmio + PADR + i);
Reported by FlawFinder.