One example is
I have running some static code analysis software upon Kernel code.
Seeing there is possible overflow.
maks << 1U << ((len * 8) -1);
The AI don't know, len is only the value of 1, 2, 4, and make this
a warnings
I tring to analysis this, but didn't realize the real scenario of
sign extension, and finally sent this problematic patch.
I do see some uninitialized memory reads (the values are not used
in the end, just as temporary space for API execution),
do we need to fix these?
You need to be more descriptive here. What uninitialised reads? In
general, pointing at the code and providing a full description of what
you think is incorrect would really help...
M.