Here's the latest Coverity scan report. I think the test/dm/clk_ccf.c
report is just a "works as intended" but I'm not sure off-hand about the
fdtdec.c test. Might be the case the previous test in the file also has
this problem, and since it's just test code, might also be fine enough.

---------- Forwarded message ---------
From: <[email protected]>
Date: Mon, Dec 8, 2025 at 1:23 PM
Subject: New Defects reported by Coverity Scan for Das U-Boot
To: <[email protected]>


Hi,

Please find the latest report on new defect(s) introduced to *Das U-Boot*
found with Coverity Scan.

   - *New Defects Found:* 2
   - 1 defect(s), reported by Coverity Scan earlier, were marked fixed in
   the recent build analyzed by Coverity Scan.
   - *Defects Shown:* Showing 2 of 2 defect(s)

Defect Details

** CID 639831:         (TAINTED_SCALAR)


_____________________________________________________________________________________________
*** CID 639831:           (TAINTED_SCALAR)
/test/dm/fdtdec.c: 153             in dm_test_fdt_chosen_smbios()
147
148             blob_sz = fdt_totalsize(gd->fdt_blob) + 4096;
149             blob = memalign(8, blob_sz);
150             ut_assertnonnull(blob);
151
152             /* Make a writable copy of the fdt blob */
>>>     CID 639831:           (TAINTED_SCALAR)
>>>     Passing tainted expression "gd->fdt_blob->totalsize" to 
>>> "fdt_open_into", which uses it as an offset.
153             ut_assertok(fdt_open_into(gd->fdt_blob, blob, blob_sz));
154
155             /* Mock SMBIOS table */
156             entry = map_sysmem(gd->arch.smbios_start, sizeof(struct
smbios3_entry));
157             memcpy(entry->anchor, "_SM3_", 5);
158             entry->length = sizeof(struct smbios3_entry);
/test/dm/fdtdec.c: 153             in dm_test_fdt_chosen_smbios()
147
148             blob_sz = fdt_totalsize(gd->fdt_blob) + 4096;
149             blob = memalign(8, blob_sz);
150             ut_assertnonnull(blob);
151
152             /* Make a writable copy of the fdt blob */
>>>     CID 639831:           (TAINTED_SCALAR)
>>>     Passing tainted expression "gd->fdt_blob->size_dt_strings" to 
>>> "fdt_open_into", which uses it as an offset.
153             ut_assertok(fdt_open_into(gd->fdt_blob, blob, blob_sz));
154
155             /* Mock SMBIOS table */
156             entry = map_sysmem(gd->arch.smbios_start, sizeof(struct
smbios3_entry));
157             memcpy(entry->anchor, "_SM3_", 5);
158             entry->length = sizeof(struct smbios3_entry);
/test/dm/fdtdec.c: 153             in dm_test_fdt_chosen_smbios()
147
148             blob_sz = fdt_totalsize(gd->fdt_blob) + 4096;
149             blob = memalign(8, blob_sz);
150             ut_assertnonnull(blob);
151
152             /* Make a writable copy of the fdt blob */
>>>     CID 639831:           (TAINTED_SCALAR)
>>>     Passing tainted expression "gd->fdt_blob->size_dt_struct" to 
>>> "fdt_open_into", which uses it as an offset.
153             ut_assertok(fdt_open_into(gd->fdt_blob, blob, blob_sz));
154
155             /* Mock SMBIOS table */
156             entry = map_sysmem(gd->arch.smbios_start, sizeof(struct
smbios3_entry));
157             memcpy(entry->anchor, "_SM3_", 5);
158             entry->length = sizeof(struct smbios3_entry);

** CID 639830:       Integer handling issues  (INTEGER_OVERFLOW)
/test/dm/clk_ccf.c: 68           in dm_test_clk_ccf()


_____________________________________________________________________________________________
*** CID 639830:         Integer handling issues  (INTEGER_OVERFLOW)
/test/dm/clk_ccf.c: 68             in dm_test_clk_ccf()
62      ut_asserteq(CLK_SET_RATE_NO_REPARENT, clk->flags);
63
64      rate = clk_get_parent_rate(clk);
65      ut_asserteq(rate, 60000000);
66
67      rate = clk_set_rate(clk, 60000000);
>>>     CID 639830:         Integer handling issues  (INTEGER_OVERFLOW)
>>>     Expression "_val1", where "rate" is known to be equal to -38, overflows 
>>> the type of "_val1", which is type "unsigned int".
68      ut_asserteq(rate, -ENOSYS);
69
70      rate = clk_get_rate(clk);
71      ut_asserteq(rate, 60000000);
72
73      ret = clk_get_by_id(CLK_ID(dev, SANDBOX_CLK_PLL3_80M), &pclk);



View Defects in Coverity Scan
<https://scan.coverity.com/projects/das-u-boot?tab=overview>

Best regards,

The Coverity Scan Admin Team

----- End forwarded message -----

-- 
Tom

Attachment: signature.asc
Description: PGP signature

Reply via email to