Jann Horn 179d1c5602 bpf: don't prune branches when a scalar is replaced with a pointer
This could be made safe by passing through a reference to env and checking
for env->allow_ptr_leaks, but it would only work one way and is probably
not worth the hassle - not doing it will not directly lead to program
rejection.

Fixes: f1174f77b50c ("bpf/verifier: rework value tracking")
Signed-off-by: Jann Horn <jannh@google.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2017-12-21 02:15:41 +01:00
..
2017-11-15 13:28:48 -08:00
2017-11-15 13:28:48 -08:00
2017-12-14 16:00:49 -08:00
2017-11-17 16:10:04 -08:00
2017-12-14 16:00:48 -08:00
2017-10-20 11:02:29 +02:00
2017-11-17 16:10:04 -08:00
2017-11-17 16:10:04 -08:00
2017-11-17 16:10:04 -08:00
2017-11-15 18:21:05 -08:00
2017-11-15 10:56:56 -08:00
2017-11-17 16:10:03 -08:00
2017-10-31 17:22:58 -05:00