From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH net] net: filter: initialize A and X registers Date: Tue, 22 Apr 2014 23:57:45 -0400 (EDT) Message-ID: <20140422.235745.1219194947074686642.davem@davemloft.net> References: <1398223137-5463-1-git-send-email-ast@plumgrid.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: dborkman@redhat.com, netdev@vger.kernel.org To: ast@plumgrid.com Return-path: Received: from shards.monkeyblade.net ([149.20.54.216]:45386 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753517AbaDWD5r (ORCPT ); Tue, 22 Apr 2014 23:57:47 -0400 In-Reply-To: <1398223137-5463-1-git-send-email-ast@plumgrid.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Alexei Starovoitov Date: Tue, 22 Apr 2014 20:18:57 -0700 > exisiting BPF verifier allows uninitialized access to registers, > 'ret A' is considered to be a valid filter. > So initialize A and X to zero to prevent leaking kernel memory > In the future BPF verifier will be rejecting such filters > > Signed-off-by: Alexei Starovoitov Has the code always been like this? Did the eBPF changes introduce this problem either directly or indirectly?