-
Notifications
You must be signed in to change notification settings - Fork 6.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Coverity CID :203415]Memory - illegal accesses in /subsys/shell/shell_telnet.c #18422
Comments
@pizi-nordic or @pabigot could you fix this one, since @nordic-krch is off-work? |
I don't have access to Coverity (yet? did request it) so can do nothing without details of what the problem is. |
I thought you already managed to get it, to solve the coverity fixes you pushed yesterday, sorry. |
|
@pabigot ^^ |
Ugh. I think Coverity is wrong here, and that it's not detecting that a successful call to On the other hand, the loop is grossly overcomplicated. There's a trivial and obviously correct transformation that makes it a bit more clear to a human. Under other circumstances I'd want to replace it with something less obscure, but that would introduce assumptions that other threads aren't accessing the buffer.
Not sure what to do. |
If the understanding is that this is a false positive, then I'd either lower the priority and/or move the milestone to "future" and wait for @nordic-krch to be back to discuss with him. No need for doing things in a hurry. I'll do so now, if you disagree please undo. |
Closed as false positive with this comment: All invocations of Step 18 is reached by a path where |
Static code scan issues seen in File: /subsys/shell/shell_telnet.c
Category: Memory - illegal accesses
Function: write
Component: Other
CID: 203415
Please fix or provide comments to square it off in coverity in the link: https://scan9.coverity.com/reports.htm#v32951/p12996
The text was updated successfully, but these errors were encountered: