[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <c12873b2-d2e5-4fbc-987f-fa96cbe926da@kili.mountain>
Date: Sat, 22 Apr 2023 22:56:39 +0300
From: Dan Carpenter <dan.carpenter@...aro.org>
To: Dan Carpenter <error27@...il.com>
Cc: Dongliang Mu <dzm91@...t.edu.cn>, Vicki Pfau <vi@...rift.com>,
kernel-janitors@...r.kernel.org,
Dmitry Torokhov <dmitry.torokhov@...il.com>,
Pavel Rojtberg <rojtberg@...il.com>,
Nate Yocom <nate@...om.org>,
Mattijs Korpershoek <mkorpershoek@...libre.com>,
John Butler <radon86dev@...il.com>,
Matthias Benkmann <matthias.benkmann@...il.com>,
Christopher Crockett <chaorace@...il.com>,
Santosh De Massari <s.demassari@...il.com>,
hust-os-kernel-patches@...glegroups.com,
syzbot+a3f758b8d8cb7e49afec@...kaller.appspotmail.com,
"Pierre-Loup A. Griffais" <pgriffais@...vesoftware.com>,
linux-input@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] Input: xpad - fix GPF in xpad_probe
On Sat, Apr 22, 2023 at 10:48:32PM +0300, Dan Carpenter wrote:
> The warnings from this are quite promising.
Well... The results are over 90% false positives. But there are still
probably 15 bugs in there. The printk warning trick would probably
work.
regards,
dan carpenter
Powered by blists - more mailing lists