[PATCH 15/17] sandbox: Silence coverity warning in state_read_file()

Simon Glass sjg at chromium.org
Sun May 9 00:00:19 CEST 2021


In this case the value seems save to pass to os_free(). Silence the
warning.

Signed-off-by: Simon Glass <sjg at chromium.org>
Reported-by: Coverity (CID: 165109)
---

 arch/sandbox/cpu/state.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/arch/sandbox/cpu/state.c b/arch/sandbox/cpu/state.c
index f63cfd38ee4..4cd788fb22c 100644
--- a/arch/sandbox/cpu/state.c
+++ b/arch/sandbox/cpu/state.c
@@ -78,6 +78,7 @@ static int state_read_file(struct sandbox_state *state, const char *fname)
 err_read:
 	os_close(fd);
 err_open:
+	/* coverity[TAINTED_SCALAR] */
 	os_free(state->state_fdt);
 	state->state_fdt = NULL;
 
-- 
2.31.1.607.g51e8a6a459-goog



More information about the U-Boot mailing list