The following issues were found
drivers/video/fbdev/i810/i810-i2c.c
1 issues
Line: 94
Column: 9
CWE codes:
120
Suggestion:
Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused)
{
int rc;
strcpy(chan->adapter.name, name);
chan->adapter.owner = THIS_MODULE;
chan->adapter.algo_data = &chan->algo;
chan->adapter.dev.parent = &chan->par->dev->dev;
chan->algo.setsda = i810i2c_setsda;
chan->algo.setscl = i810i2c_setscl;
Reported by FlawFinder.
drivers/video/fbdev/i810/i810_main.c
1 issues
Line: 1093
Column: 6
CWE codes:
120
Suggestion:
Consider using snprintf, strcpy_s, or strlcpy (warning: strncpy easily misused)
memset(fix, 0, sizeof(struct fb_fix_screeninfo));
strcpy(fix->id, "I810");
mutex_lock(&info->mm_lock);
fix->smem_start = par->fb.physical;
fix->smem_len = par->fb.size;
mutex_unlock(&info->mm_lock);
fix->type = FB_TYPE_PACKED_PIXELS;
Reported by FlawFinder.
drivers/staging/rtl8712/rtl8712_xmit.c
1 issues
Line: 414
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
struct ht_priv *phtpriv = &pmlmepriv->htpriv;
struct tx_desc txdesc_mp;
memcpy(&txdesc_mp, ptxdesc, sizeof(struct tx_desc));
memset(ptxdesc, 0, sizeof(struct tx_desc));
/* offset 0 */
ptxdesc->txdw0 |= cpu_to_le32(sz & 0x0000ffff);
if (pdvobj->ishighspeed) {
if (((sz + TXDESC_SIZE) % 512) == 0)
Reported by FlawFinder.
drivers/staging/rtl8712/rtl871x_ht.h
1 issues
Line: 23
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct ht_priv {
unsigned int ht_option;
unsigned int ampdu_enable;/*for enable Tx A-MPDU*/
unsigned char baddbareq_issued[16];
unsigned int tx_amsdu_enable;/*for enable Tx A-MSDU */
unsigned int tx_amdsu_maxlen; /* 1: 8k, 0:4k ; default:8k, for tx */
unsigned int rx_ampdu_maxlen; /* for rx reordering ctrl win_sz,
* updated when join_callback.
*/
Reported by FlawFinder.
drivers/spi/spi-xcomm.c
1 issues
Line: 117
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
if (t->tx_buf) {
spi_xcomm->buf[0] = SPI_XCOMM_CMD_WRITE;
memcpy(spi_xcomm->buf + 1, t->tx_buf, t->len);
ret = i2c_master_send(spi_xcomm->i2c, spi_xcomm->buf, t->len + 1);
if (ret < 0)
return ret;
else if (ret != t->len + 1)
Reported by FlawFinder.
drivers/staging/rtl8712/rtl871x_ioctl_set.h
1 issues
Line: 22
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
typedef u8 NDIS_802_11_PMKID_VALUE[16];
struct BSSIDInfo {
unsigned char BSSID[6];
NDIS_802_11_PMKID_VALUE PMKID;
};
u8 r8712_set_802_11_authentication_mode(struct _adapter *pdapter,
enum NDIS_802_11_AUTHENTICATION_MODE authmode);
Reported by FlawFinder.
drivers/staging/rtl8712/rtl871x_mp.h
1 issues
Line: 96
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
u8 check_mp_pkt;
uint ForcedDataRate;
struct wlan_network mp_network;
unsigned char network_macaddr[6];
/*Testing Flag*/
u32 mode;/*0 for normal type packet,
* 1 for loopback packet (16bytes TXCMD)
*/
sint prev_fw_state;
Reported by FlawFinder.
drivers/spi/spi-ti-qspi.c
1 issues
Line: 499
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
dma_src, xfer_len);
if (ret != 0)
return ret;
memcpy(to, qspi->rx_bb_addr, xfer_len);
readsize -= xfer_len;
dma_src += xfer_len;
to += xfer_len;
}
Reported by FlawFinder.
drivers/spi/spi-test.h
1 issues
Line: 73
Column: 2
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
*/
struct spi_test {
char description[64];
struct spi_message msg;
struct spi_transfer transfers[SPI_TEST_MAX_TRANSFERS];
unsigned int transfer_count;
int (*run_test)(struct spi_device *spi, struct spi_test *test,
void *tx, void *rx);
Reported by FlawFinder.
drivers/staging/rtl8712/sta_info.h
1 issues
Line: 85
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
unsigned int expire_to;
unsigned int auth_seq;
unsigned int authalg;
unsigned char chg_txt[128];
unsigned int tx_ra_bitmap;
};
struct sta_priv {
u8 *pallocated_stainfo_buf;
Reported by FlawFinder.