The following issues were found
drivers/media/dvb-frontends/rtl2832_sdr.c
1 issues
Line: 179
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (dev->pixelformat == V4L2_SDR_FMT_CU8) {
/* native stream, no need to convert */
memcpy(dst, src, src_len);
dst_len = src_len;
} else if (dev->pixelformat == V4L2_SDR_FMT_CU16LE) {
/* convert u8 to u16 */
unsigned int i;
u16 *u16dst = dst;
Reported by FlawFinder.
drivers/net/ethernet/amd/xgbe/xgbe-main.c
1 issues
Line: 270
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
netdev->irq = pdata->dev_irq;
netdev->base_addr = (unsigned long)pdata->xgmac_regs;
memcpy(netdev->dev_addr, pdata->mac_addr, netdev->addr_len);
/* Initialize ECC timestamps */
pdata->tx_sec_period = jiffies;
pdata->tx_ded_period = jiffies;
pdata->rx_sec_period = jiffies;
Reported by FlawFinder.
drivers/media/dvb-frontends/rtl2832.c
1 issues
Line: 1091
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
goto err_regmap_exit;
/* create dvb_frontend */
memcpy(&dev->fe.ops, &rtl2832_ops, sizeof(struct dvb_frontend_ops));
dev->fe.demodulator_priv = dev;
/* setup callbacks */
pdata->get_dvb_frontend = rtl2832_get_dvb_frontend;
pdata->get_i2c_adapter = rtl2832_get_i2c_adapter;
Reported by FlawFinder.
drivers/media/dvb-frontends/rtl2830.c
1 issues
Line: 759
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
};
buf[0] = *(u8 const *)reg;
memcpy(&buf[1], val, val_len);
ret = __i2c_transfer(client->adapter, msg, 1);
if (ret != 1) {
dev_warn(&client->dev, "i2c reg write failed %d\n", ret);
if (ret >= 0)
Reported by FlawFinder.
drivers/media/dvb-frontends/or51132.c
1 issues
Line: 566
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
state->current_modulation = -1;
/* Create dvb_frontend */
memcpy(&state->frontend.ops, &or51132_ops, sizeof(struct dvb_frontend_ops));
state->frontend.demodulator_priv = state;
return &state->frontend;
}
static const struct dvb_frontend_ops or51132_ops = {
Reported by FlawFinder.
drivers/net/ethernet/apm/xgene-v2/main.h
1 issues
Line: 55
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct xge_desc_ring *tx_ring;
struct xge_desc_ring *rx_ring;
struct platform_device *pdev;
char irq_name[IRQ_ID_SIZE];
struct mii_bus *mdio_bus;
struct net_device *ndev;
struct napi_struct napi;
struct xge_stats stats;
int phy_speed;
Reported by FlawFinder.
drivers/media/dvb-frontends/nxt6000.c
1 issues
Line: 574
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (nxt6000_readreg(state, OFDM_MSC_REV) != NXT6000ASICDEVICE) goto error;
/* create dvb_frontend */
memcpy(&state->frontend.ops, &nxt6000_ops, sizeof(struct dvb_frontend_ops));
state->frontend.demodulator_priv = state;
return &state->frontend;
error:
kfree(state);
Reported by FlawFinder.
drivers/net/ethernet/apm/xgene/xgene_enet_main.c
1 issues
Line: 1737
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (!device_get_mac_address(dev, ndev->dev_addr, ETH_ALEN))
eth_hw_addr_random(ndev);
memcpy(ndev->perm_addr, ndev->dev_addr, ndev->addr_len);
pdata->phy_mode = device_get_phy_mode(dev);
if (pdata->phy_mode < 0) {
dev_err(dev, "Unable to get phy-connection-type\n");
return pdata->phy_mode;
Reported by FlawFinder.
drivers/net/ethernet/apm/xgene/xgene_enet_main.h
1 issues
Line: 99
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
u16 exp_buf_tail;
u16 slots;
u16 irq;
char irq_name[IRQ_ID_SIZE];
u32 size;
u32 state[X2_NUM_RING_CONFIG];
void __iomem *cmd_base;
void __iomem *cmd;
dma_addr_t dma;
Reported by FlawFinder.
drivers/net/ethernet/apple/mace.c
1 issues
Line: 597
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
if (dev->flags & IFF_PROMISC) {
mp->maccc |= PROM;
} else {
unsigned char multicast_filter[8];
struct netdev_hw_addr *ha;
if (dev->flags & IFF_ALLMULTI) {
for (i = 0; i < 8; i++)
multicast_filter[i] = 0xff;
Reported by FlawFinder.