The following issues were found
drivers/net/phy/nxp-tja11xx.c
1 issues
Line: 363
Column: 3
CWE codes:
120
int i;
for (i = 0; i < ARRAY_SIZE(tja11xx_hw_stats); i++) {
strncpy(data + i * ETH_GSTRING_LEN,
tja11xx_hw_stats[i].string, ETH_GSTRING_LEN);
}
}
static void tja11xx_get_stats(struct phy_device *phydev,
Reported by FlawFinder.
drivers/net/ethernet/intel/i40e/i40e_hmc.c
1 issues
Line: 162
Column: 3
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
pd_addr += rel_pd_idx;
/* Add the backing page physical address in the pd entry */
memcpy(pd_addr, &page_desc, sizeof(u64));
pd_entry->sd_index = sd_idx;
pd_entry->valid = true;
I40E_INC_PD_REFCNT(pd_table);
}
Reported by FlawFinder.
drivers/net/phy/phy_led_triggers.c
1 issues
Line: 63
Column: 2
CWE codes:
134
Suggestion:
Use a constant for the format specification
static void phy_led_trigger_format_name(struct phy_device *phy, char *buf,
size_t size, const char *suffix)
{
snprintf(buf, size, PHY_ID_FMT ":%s",
phy->mdio.bus->id, phy->mdio.addr, suffix);
}
static int phy_led_trigger_register(struct phy_device *phy,
struct phy_led_trigger *plt,
Reported by FlawFinder.
drivers/net/phy/sfp-bus.c
1 issues
Line: 100
Column: 6
CWE codes:
126
{
if (!qs)
return true;
if (strlen(qs) != len)
return false;
return !strncmp(qs, str, len);
}
static const struct sfp_quirk *sfp_lookup_quirk(const struct sfp_eeprom_id *id)
Reported by FlawFinder.
drivers/net/hyperv/netvsc_bpf.c
1 issues
Line: 56
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
xdp_init_buff(xdp, PAGE_SIZE, &nvchan->xdp_rxq);
xdp_prepare_buff(xdp, page_address(page), NETVSC_XDP_HDRM, len, false);
memcpy(xdp->data, data, len);
act = bpf_prog_run_xdp(prog, xdp);
switch (act) {
case XDP_PASS:
Reported by FlawFinder.
drivers/net/phy/smsc.c
1 issues
Line: 265
Column: 3
CWE codes:
120
int i;
for (i = 0; i < ARRAY_SIZE(smsc_hw_stats); i++) {
strncpy(data + i * ETH_GSTRING_LEN,
smsc_hw_stats[i].string, ETH_GSTRING_LEN);
}
}
static u64 smsc_get_stat(struct phy_device *phydev, int i)
Reported by FlawFinder.
drivers/net/phy/xilinx_gmii2rgmii.c
1 issues
Line: 90
Column: 2
CWE codes:
120
Suggestion:
Make sure destination can always hold the source data
priv->mdio = mdiodev;
priv->phy_drv = priv->phy_dev->drv;
memcpy(&priv->conv_phy_drv, priv->phy_dev->drv,
sizeof(struct phy_driver));
priv->conv_phy_drv.read_status = xgmiitorgmii_read_status;
mdiodev_set_drvdata(&priv->phy_dev->mdio, priv);
priv->phy_dev->drv = &priv->conv_phy_drv;
Reported by FlawFinder.
drivers/net/hyperv/hyperv_net.h
1 issues
Line: 172
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
#define NETVSC_HASH_KEYLEN 40
struct netvsc_device_info {
unsigned char mac_adr[ETH_ALEN];
u32 num_chn;
u32 send_sections;
u32 recv_sections;
u32 send_section_size;
u32 recv_section_size;
Reported by FlawFinder.
drivers/net/ppp/ppp_async.c
1 issues
Line: 71
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
refcount_t refcnt;
struct completion dead;
struct ppp_channel chan; /* interface to generic ppp layer */
unsigned char obuf[OBUFSIZE];
};
/* Bit numbers in xmit_flags */
#define XMIT_WAKEUP 0
#define XMIT_FULL 1
Reported by FlawFinder.
drivers/net/ppp/ppp_deflate.c
1 issues
Line: 416
Column: 11
CWE codes:
119
120
Suggestion:
Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length
struct ppp_deflate_state *state = (struct ppp_deflate_state *) arg;
int olen, seq, r;
int decode_proto, overflow;
unsigned char overflow_buf[1];
if (isize <= PPP_HDRLEN + DEFLATE_OVHD) {
if (state->debug)
printk(KERN_DEBUG "z_decompress%d: short pkt (%d)\n",
state->unit, isize);
Reported by FlawFinder.