https://bugzilla.kernel.org/show_bug.cgi?id=14998





--- Comment #31 from Dan Carpenter <[email protected]>  2010-04-20 05:49:10 ---
If we take the last bit of initialized data:

000110000000adde000220000000adde627574746f6e2f6c6964000000000000
 i i i i i i i i i i i i i i i i i i i i i i i i i i i u u u u u

unsigned short a[] = {0x6275, 0x7474, 0x6f6e, 0x2f6c, 0x6964, 0x0000};
printf("%s\n", a);

That prints "ubttnol/di" or "button/lid" after we swap the characters. 
So basically there are some uninitialized bytes after the NULL terminator.

This looks like a false positive.  BTW we don't leak the uninitialized 
bytes to the user do we?  I'll post a patch that probably will get rid
of the message.

-- 
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

------------------------------------------------------------------------------
Download Intel&#174; Parallel Studio Eval
Try the new software tools for yourself. Speed compiling, find bugs
proactively, and fine-tune applications for parallel performance.
See why Intel Parallel Studio got high marks during beta.
http://p.sf.net/sfu/intel-sw-dev
_______________________________________________
acpi-bugzilla mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/acpi-bugzilla

Reply via email to