The following issues were found

drivers/net/ethernet/atheros/atl1c/atl1c_ethtool.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 210 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		}
	}

	memcpy(bytes, (u8 *)eeprom_buff + (eeprom->offset & 3),
			eeprom->len);
	kfree(eeprom_buff);

	return ret_val;
	return 0;

            

Reported by FlawFinder.

drivers/net/ethernet/atheros/atl1c/atl1c_hw.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 191 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	if (err)
		eth_random_addr(hw->perm_mac_addr);

	memcpy(hw->mac_addr, hw->perm_mac_addr, sizeof(hw->perm_mac_addr));
	return err;
}

/*
 * atl1c_hash_mc_addr

            

Reported by FlawFinder.

drivers/media/dvb-frontends/mn88472.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 659 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		goto err_regmap_2_regmap_exit;

	/* Create dvb frontend */
	memcpy(&dev->fe.ops, &mn88472_ops, sizeof(struct dvb_frontend_ops));
	dev->fe.demodulator_priv = client;
	*pdata->fe = &dev->fe;
	i2c_set_clientdata(client, dev);

	/* Init stats to indicate which stats are supported */

            

Reported by FlawFinder.

drivers/media/dvb-frontends/mn88443x.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 737 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              
	chip->clk_freq = clk_get_rate(chip->mclk);

	memcpy(&chip->fe.ops, &mn88443x_ops, sizeof(mn88443x_ops));
	chip->fe.demodulator_priv = chip;
	i2c_set_clientdata(client, chip);

	mn88443x_cmn_power_on(chip);
	mn88443x_s_sleep(chip);

            

Reported by FlawFinder.

drivers/media/dvb-frontends/mb86a20s.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 2067 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	state->i2c = i2c;

	/* create dvb_frontend */
	memcpy(&state->frontend.ops, &mb86a20s_ops,
		sizeof(struct dvb_frontend_ops));
	state->frontend.demodulator_priv = state;

	/* Check if it is a mb86a20s frontend */
	rev = mb86a20s_readreg(state, 0);

            

Reported by FlawFinder.

drivers/media/dvb-frontends/m88rs2000.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 801 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	state->fec_inner = 0;

	/* create dvb_frontend */
	memcpy(&state->frontend.ops, &m88rs2000_ops,
			sizeof(struct dvb_frontend_ops));
	state->frontend.demodulator_priv = state;
	return &state->frontend;

error:

            

Reported by FlawFinder.

drivers/net/ethernet/atheros/atlx/atl2.h
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 341 Column: 11 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              
struct rx_desc {
	struct rx_pkt_status	status;
	unsigned char     	packet[1536-sizeof(struct rx_pkt_status)];
};

enum atl2_speed_duplex {
	atl2_10_half = 0,
	atl2_10_full = 1,

            

Reported by FlawFinder.

drivers/media/dvb-frontends/m88ds3103.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 1878 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		goto err_kfree;

	/* create dvb_frontend */
	memcpy(&dev->fe.ops, &m88ds3103_ops, sizeof(struct dvb_frontend_ops));
	if (dev->chiptype == M88DS3103_CHIPTYPE_3103B)
		strscpy(dev->fe.ops.info.name, "Montage Technology M88DS3103B",
			sizeof(dev->fe.ops.info.name));
	else if (dev->chip_id == M88RS6000_CHIP_ID)
		strscpy(dev->fe.ops.info.name, "Montage Technology M88RS6000",

            

Reported by FlawFinder.

drivers/media/dvb-frontends/lgs8gxx.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 1031 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              
	lgs8gxx_read_reg(priv, 1, &data);

	memcpy(&priv->frontend.ops, &lgs8gxx_ops,
	       sizeof(struct dvb_frontend_ops));
	priv->frontend.demodulator_priv = priv;

	if (config->prod == LGS8GXX_PROD_LGS8G75)
		lgs8g75_init_data(priv);

            

Reported by FlawFinder.

drivers/media/dvb-frontends/lgs8gl5.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 391 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		goto error;

	/* Create dvb_frontend */
	memcpy(&state->frontend.ops, &lgs8gl5_ops,
		sizeof(struct dvb_frontend_ops));
	state->frontend.demodulator_priv = state;
	return &state->frontend;

error:

            

Reported by FlawFinder.