lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <526d4ac8f6788d3323d29fdbad0e0e5d09a534db.camel@gmail.com> Date: Fri, 15 Dec 2023 02:49:51 +0200 From: Eduard Zingerman <eddyz87@...il.com> To: Andrii Nakryiko <andrii.nakryiko@...il.com> Cc: Hao Sun <sunhao.th@...il.com>, Alexei Starovoitov <ast@...nel.org>, Andrii Nakryiko <andrii@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, bpf <bpf@...r.kernel.org>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org> Subject: Re: [Bug Report] bpf: incorrectly pruning runtime execution path On Thu, 2023-12-14 at 16:06 -0800, Andrii Nakryiko wrote: [...] > If you agree with the analysis, we can start discussing what's the > best way to fix this. Ok, yeap, I agree with you. Backtracker marks both registers in 'if' statement if one of them is tracked, but r8 is not marked at block entry and we miss r0.
Powered by blists - more mailing lists