target/xtensa: fix clang analyzer warnings
authorIan Thompson <ianst@cadence.com>
Sun, 21 Aug 2022 22:56:41 +0000 (15:56 -0700)
committerAntonio Borneo <borneo.antonio@gmail.com>
Sat, 27 Aug 2022 16:20:44 +0000 (16:20 +0000)
Scan-build of target/xtensa/ has no clang analyzer warnings from xtensa source files.

Signed-off-by: Ian Thompson <ianst@cadence.com>
Change-Id: I11a125c923ece9a6fd0d9ee1698f742f88ee5cab
Reviewed-on: https://review.openocd.org/c/openocd/+/7141
Tested-by: jenkins
Reviewed-by: Antonio Borneo <borneo.antonio@gmail.com>
src/target/xtensa/xtensa.c

index 4e18e3eb480ca214078cca5cb5139a70f73ad8d9..2fd2c7ca5775ba47af7a111cc779f81f8c7697f5 100644 (file)
@@ -2608,6 +2608,7 @@ static int xtensa_gdbqc_qxtreg(struct target *target, const char *packet, char *
                goto xtensa_gdbqc_qxtreg_fail;
        }
        uint8_t regbuf[XT_QUERYPKT_RESP_MAX];
+       memset(regbuf, 0, XT_QUERYPKT_RESP_MAX);
        LOG_DEBUG("TIE reg 0x%08" PRIx32 " %s (%d bytes)", regnum, iswrite ? "write" : "read", reglen);
        if (reglen * 2 + 1 > XT_QUERYPKT_RESP_MAX) {
                LOG_ERROR("TIE register too large");
@@ -2990,6 +2991,7 @@ COMMAND_HELPER(xtensa_cmd_exe_do, struct target *target)
        }
 
        uint8_t ops[32];
+       memset(ops, 0, 32);
        unsigned int oplen = parm_len / 2;
        char encoded_byte[3] = { 0, 0, 0 };
        for (unsigned int i = 0; i < oplen; i++) {