The following issues were found

drivers/scsi/elx/efct/efct_scsi.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 821 Column: 4 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              			}

			fcprsp->resp.fr_flags |= FCP_SNS_LEN_VAL;
			memcpy(sns_data, sense_data, sense_data_length);
			fcprsp->ext.fr_sns_len = cpu_to_be32(sense_data_length);
			io->wire_len += sense_data_length;
		}

		io->sgl[0].addr = io->rspbuf.phys;

            

Reported by FlawFinder.

drivers/net/wireless/marvell/mwifiex/11n.h
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 158 Column: 4 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		if (tid > priv->aggr_prio_tbl[tx_tbl->tid].ampdu_user) {
			tid = priv->aggr_prio_tbl[tx_tbl->tid].ampdu_user;
			*ptid = tx_tbl->tid;
			memcpy(ra, tx_tbl->ra, ETH_ALEN);
			ret = true;
		}
	}
	spin_unlock_bh(&priv->tx_ba_stream_tbl_lock);


            

Reported by FlawFinder.

drivers/scsi/elx/efct/efct_xport.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 299 Column: 3 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		break;

	case EFCT_XPORT_LINK_STATISTICS:
		memcpy((void *)result, &efct->xport->fc_xport_stats,
		       sizeof(union efct_xport_stats_u));
		break;
	case EFCT_XPORT_LINK_STAT_RESET: {
		/* Create a completion to synchronize the stat reset process */
		init_completion(&result->stats.done);

            

Reported by FlawFinder.

drivers/scsi/elx/libefc/efc_device.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 572 Column: 3 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		u32 d_id = ntoh24(hdr->fh_d_id);

		/* sm: / save sparams, send FLOGI acc */
		memcpy(node->nport->domain->flogi_service_params,
		       cbdata->payload->dma.virt,
		       sizeof(struct fc_els_flogi));

		/* send FC LS_ACC response, override s_id */
		efc_fabric_set_topology(node, EFC_NPORT_TOPO_P2P);

            

Reported by FlawFinder.

drivers/net/wireless/ti/wl1251/rx.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 181 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	wl1251_debug(DEBUG_RX, "rx skb 0x%p: %d B %s", skb, skb->len,
		     beacon ? "beacon" : "");

	memcpy(IEEE80211_SKB_RXCB(skb), &status, sizeof(status));
	ieee80211_rx_ni(wl->hw, skb);
}

static void wl1251_rx_ack(struct wl1251 *wl)
{

            

Reported by FlawFinder.

drivers/net/wireless/ti/wl1251/io.c
1 issues
read - Check buffer boundaries if used in a loop including recursive loops
Security

Line: 55 Column: 14 CWE codes: 120 20

              
	physical = wl1251_translate_mem_addr(wl, addr);

	wl->if_ops->read(wl, physical, buf, len);
}

void wl1251_mem_write(struct wl1251 *wl, int addr, void *buf, size_t len)
{
	int physical;

            

Reported by FlawFinder.

drivers/scsi/elx/libefc/efc_fabric.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 151 Column: 3 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              		WARN_ON(!node->els_req_cnt);
		node->els_req_cnt--;

		memcpy(node->nport->domain->flogi_service_params,
		       cbdata->els_rsp.virt,
		       sizeof(struct fc_els_flogi));

		/* Check to see if the fabric is an F_PORT or and N_PORT */
		if (!efc_rnode_is_nport(cbdata->els_rsp.virt)) {

            

Reported by FlawFinder.

drivers/net/wireless/marvell/libertas/rx.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 256 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              	}

	pradiotap_hdr = skb_push(skb, sizeof(struct rx_radiotap_hdr));
	memcpy(pradiotap_hdr, &radiotap_hdr, sizeof(struct rx_radiotap_hdr));

	priv->cur_rate = lbs_fw_index_to_data_rate(prxpd->rx_rate);

	lbs_deb_rx("rx data: size of actual packet %d\n", skb->len);
	dev->stats.rx_bytes += skb->len;

            

Reported by FlawFinder.

drivers/net/wireless/ti/wl1251/acx.h
1 issues
char - Statically-sized arrays can be improperly restricted, leading to potential overflows or other issues
Security

Line: 66 Column: 2 CWE codes: 119 120
Suggestion: Perform bounds checking, use functions that limit length, or ensure that the size is larger than the maximum possible length

              	 * in other words, a unique set of features.
	 * The first three digits identify a GA release.
	 */
	char fw_version[20];

	/*
	 * This 4 byte field specifies the WiLink hardware version.
	 * bits 0  - 15: Reserved.
	 * bits 16 - 23: Version ID - The WiLink version ID

            

Reported by FlawFinder.

drivers/scsi/elx/libefc/efc_nport.c
1 issues
memcpy - Does not check for buffer overflows when copying to destination
Security

Line: 105 Column: 2 CWE codes: 120
Suggestion: Make sure destination can always hold the source data

              			(nport->enable_tgt && enable_target_rscn(nport->efc)));

	/* Copy service parameters from domain */
	memcpy(nport->service_params, domain->service_params,
	       sizeof(struct fc_els_flogi));

	/* Update requested fc_id */
	nport->fc_id = fc_id;


            

Reported by FlawFinder.