lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190509155600.4yypxncilarbayh4@kafai-mbp> Date: Thu, 9 May 2019 15:56:07 +0000 From: Martin Lau <kafai@...com> To: unlisted-recipients:; (no To-header on input) CC: "bpf@...r.kernel.org" <bpf@...r.kernel.org>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, "ast@...nel.org" <ast@...nel.org>, "daniel@...earbox.net" <daniel@...earbox.net> Subject: Re: [PATCH bpf v2] selftests: bpf: initialize bpf_object pointers where needed On Wed, May 08, 2019 at 05:49:32PM +0100, Lorenz Bauer wrote: > There are a few tests which call bpf_object__close on uninitialized > bpf_object*, which may segfault. Explicitly zero-initialise these pointers > to avoid this. Acked-by: Martin KaFai Lau <kafai@...com>
Powered by blists - more mailing lists