The following issues were found

drivers/net/wireless/intel/iwlwifi/mvm/fw.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 560 Column: 3 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              					IWL_FW_CMD_VER_UNKNOWN);
	if (cmd_ver == 3) {
		iwl_mvm_phy_filter_init(mvm, &phy_filters);
		memcpy(&phy_cfg_cmd.phy_specific_cfg, &phy_filters,
		       sizeof(struct iwl_phy_specific_cfg));
	}

	IWL_DEBUG_INFO(mvm, "Sending Phy CFG command: 0x%x\n",
		       phy_cfg_cmd.phy_cfg);

            

Reported by FlawFinder.

drivers/net/wireless/ath/carl9170/debug.h
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 50 Column: 2 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              
struct hw_stat_reg_entry {
	u32 reg;
	char nreg[32];
};

#define	STAT_MAC_REG(reg)	\
	{ (AR9170_MAC_REG_##reg), #reg }


            

Reported by FlawFinder.

drivers/net/wireless/intel/iwlwifi/fw/notif-wait.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 96 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	wait_entry->fn = fn;
	wait_entry->fn_data = fn_data;
	wait_entry->n_cmds = n_cmds;
	memcpy(wait_entry->cmds, cmds, n_cmds * sizeof(u16));
	wait_entry->triggered = false;
	wait_entry->aborted = false;

	spin_lock_bh(&notif_wait->notif_wait_lock);
	list_add(&wait_entry->list, &notif_wait->notif_waits);

            

Reported by FlawFinder.

drivers/net/ethernet/mellanox/mlx4/en_selftest.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 68 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              
	ethh = skb_put(skb, sizeof(struct ethhdr));
	packet = skb_put(skb, packet_size);
	memcpy(ethh->h_dest, priv->dev->dev_addr, ETH_ALEN);
	eth_zero_addr(ethh->h_source);
	ethh->h_proto = htons(ETH_P_ARP);
	skb_reset_mac_header(skb);
	for (i = 0; i < packet_size; ++i)	/* fill our packet */
		packet[i] = (unsigned char)(i & 0xff);

            

Reported by FlawFinder.

drivers/net/ethernet/netronome/nfp/nfp_port.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 44 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		return -EOPNOTSUPP;

	ppid->id_len = nfp_cpp_serial(port->app->cpp, &serial);
	memcpy(&ppid->id, serial, ppid->id_len);

	return 0;
}

int nfp_port_setup_tc(struct net_device *netdev, enum tc_setup_type type,

            

Reported by FlawFinder.

drivers/net/ethernet/netronome/nfp/nfp_net_main.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 542 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		port->type = NFP_PORT_INVALID;
	}

	memcpy(port->eth_port, eth_port, sizeof(*eth_port));

	return 0;
}

int nfp_net_refresh_port_table_sync(struct nfp_pf *pf)

            

Reported by FlawFinder.

drivers/net/ethernet/mellanox/mlx5/core/en/rep/tc.h
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 27 Column: 17 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              void mlx5e_rep_update_flows(struct mlx5e_priv *priv,
			    struct mlx5e_encap_entry *e,
			    bool neigh_connected,
			    unsigned char ha[ETH_ALEN]);

int mlx5e_rep_encap_entry_attach(struct mlx5e_priv *priv,
				 struct mlx5e_encap_entry *e,
				 struct mlx5e_neigh *m_neigh,
				 struct net_device *neigh_dev);

            

Reported by FlawFinder.

drivers/net/wireless/ath/dfs_pattern_detector.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 299 Column: 5 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		struct pri_sequence *ps = pd->add_pulse(pd, event);
		if (ps != NULL) {
			if (rs != NULL)
				memcpy(rs, pd->rs, sizeof(*rs));
			ath_dbg(dpd->common, DFS,
				"DFS: radar found on freq=%d: id=%d, pri=%d, "
				"count=%d, count_false=%d\n",
				event->freq, pd->rs->type_id,
				ps->pri, ps->count, ps->count_falses);

            

Reported by FlawFinder.

drivers/net/wireless/ath/dfs_pri_detector.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 295 Column: 3 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              			DFS_POOL_STAT_INC(pseq_allocated);
			DFS_POOL_STAT_INC(pseq_used);
		}
		memcpy(new_ps, &ps, sizeof(ps));
		INIT_LIST_HEAD(&new_ps->head);
		list_add(&new_ps->head, &pde->sequences);
	}
	return true;
}

            

Reported by FlawFinder.

drivers/net/wireless/ath/hw.c
1 issues
read - Check buffer boundaries if used in a loop including recursive loops
Security

Line: 23 Column: 34 CWE codes: 120 20

              #include "ath.h"
#include "reg.h"

#define REG_READ			(common->ops->read)
#define REG_WRITE(_ah, _reg, _val)	(common->ops->write)(_ah, _val, _reg)

/**
 * ath_hw_setbssidmask - filter out bssids we listen
 *

            

Reported by FlawFinder.