https://bugzilla.kernel.org/show_bug.cgi?id=14998
--- Comment #31 from Dan Carpenter <[email protected]> 2010-04-20 05:49:10 --- If we take the last bit of initialized data: 000110000000adde000220000000adde627574746f6e2f6c6964000000000000 i i i i i i i i i i i i i i i i i i i i i i i i i i i u u u u u unsigned short a[] = {0x6275, 0x7474, 0x6f6e, 0x2f6c, 0x6964, 0x0000}; printf("%s\n", a); That prints "ubttnol/di" or "button/lid" after we swap the characters. So basically there are some uninitialized bytes after the NULL terminator. This looks like a false positive. BTW we don't leak the uninitialized bytes to the user do we? I'll post a patch that probably will get rid of the message. -- Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug. ------------------------------------------------------------------------------ Download Intel® Parallel Studio Eval Try the new software tools for yourself. Speed compiling, find bugs proactively, and fine-tune applications for parallel performance. See why Intel Parallel Studio got high marks during beta. http://p.sf.net/sfu/intel-sw-dev _______________________________________________ acpi-bugzilla mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/acpi-bugzilla
