New Defects reported by Coverity Scan for Das U-Boot
Kory Maincent
kory.maincent at bootlin.com
Wed Nov 12 09:53:50 CET 2025
On Mon, 10 Nov 2025 12:55:07 -0600
Tom Rini <trini at konsulko.com> wrote:
> Here's the latest report. Just 2 new issues, both from the extensions
> series. Can we please address these shortly? Thanks!
Ok I will take a look at these errors!
>
> ---------- Forwarded message ---------
> From: <scan-admin at coverity.com>
> Date: Mon, Nov 10, 2025 at 12:44 PM
> Subject: New Defects reported by Coverity Scan for Das U-Boot
> To: <tom.rini at gmail.com>
>
>
> Hi,
>
> Please find the latest report on new defect(s) introduced to *Das U-Boot*
> found with Coverity Scan.
>
> - *New Defects Found:* 2
> - 1 defect(s), reported by Coverity Scan earlier, were marked fixed in
> the recent build analyzed by Coverity Scan.
> - *Defects Shown:* Showing 2 of 2 defect(s)
>
> Defect Details
>
> ** CID 638558: Memory - illegal accesses (UNINIT)
> /boot/pxe_utils.c: 485 in label_boot_extension()
>
>
> _____________________________________________________________________________________________
> *** CID 638558: Memory - illegal accesses (UNINIT)
> /boot/pxe_utils.c: 485 in label_boot_extension()
> 479 return;
> 480
> 481 snprintf(overlay_dir, dir_len, "%s%s", label->fdtdir,
> 482 slash);
> 483 } else {
> 484 dir_len = 2;
> >>> CID 638558: Memory - illegal accesses (UNINIT)
> >>> Using uninitialized value "overlay_dir" when calling "snprintf".
> >>> [Note: The source code implementation of the function has been overridden
> >>> by a builtin model.]
> 485 snprintf(overlay_dir, dir_len, "/");
> 486 }
> 487
> 488 alist_for_each(extension, extension_list) {
> 489 char *overlay_file;
> 490 ulong size;
>
> ** CID 638557: Null pointer dereferences (NULL_RETURNS)
>
>
> _____________________________________________________________________________________________
> *** CID 638557: Null pointer dereferences (NULL_RETURNS)
> /cmd/extension_board.c: 102 in do_extension_list()
> 96 {
> 97 struct alist *extension_list;
> 98 struct extension *extension;
> 99 int i = 0;
> 100
> 101 extension_list = extension_get_list();
> >>> CID 638557: Null pointer dereferences (NULL_RETURNS)
> >>> Dereferencing a pointer that might be "NULL" "extension_list" when
> >>> calling "alist_get_ptr".
> 102 if (!alist_get_ptr(extension_list, 0)) {
> 103 printf("No extension registered - Please run
> \"extension scan\"\n"); 104 return CMD_RET_SUCCESS;
> 105 }
> 106
> 107 alist_for_each(extension, extension_list) {
>
>
>
> View Defects in Coverity Scan
> <https://scan.coverity.com/projects/das-u-boot?tab=overview>
>
> Best regards,
>
> The Coverity Scan Admin Team
>
> ----- End forwarded message -----
>
--
Köry Maincent, Bootlin
Embedded Linux and kernel engineering
https://bootlin.com
More information about the U-Boot
mailing list