lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 8 Feb 2017 17:41:10 -0200 From: Arnaldo Carvalho de Melo <acme@...hat.com> To: Alexei Starovoitov <ast@...com> Cc: Mickaël Salaün <mic@...ikod.net>, linux-kernel@...r.kernel.org, Daniel Borkmann <daniel@...earbox.net>, "David S . Miller" <davem@...emloft.net>, netdev@...r.kernel.org, Shuah Khan <shuah@...nel.org> Subject: Re: [PATCH net-next v3 04/11] bpf: Use bpf_load_program() from the library Em Tue, Feb 07, 2017 at 03:17:43PM -0800, Alexei Starovoitov escreveu: > On 2/7/17 1:44 PM, Mickaël Salaün wrote: > >- union bpf_attr attr; > >+ union bpf_attr attr = {}; > > > >- bzero(&attr, sizeof(attr)); > I think somebody mentioned that there are compilers out there > that don't do it correctly, hence it was done with explicit bzero. > Arnaldo, Wang, do you remember the details? Yeah, lemme dig it... - Arnaldo
Powered by blists - more mailing lists