Florian Westphal <f...@strlen.de> writes:

> Markus Trippelsdorf reports:
>
> WARNING: kmemcheck: Caught 64-bit read from uninitialized memory 
> (ffff88001e605480)
> 4055601e0088ffff000000000000000090686d81ffffffff0000000000000000
>  u u u u u u u u u u u u u u u u i i i i i i i i u u u u u u u u
>  ^
> |RIP: 0010:[<ffffffff8166e561>]  [<ffffffff8166e561>] 
> nf_register_net_hook+0x51/0x160
> [..]
>  [<ffffffff8166e561>] nf_register_net_hook+0x51/0x160
>  [<ffffffff8166eaaf>] nf_register_net_hooks+0x3f/0xa0
>  [<ffffffff816d6715>] ipt_register_table+0xe5/0x110
> [..]
>
> This warning is harmless; we copy 'uninitialized' data from the hook ops
> but it will not be used.
> Long term the structures keeping run-time data should be disentangled
> from those only containing config-time data (such as where in the list
> to insert a hook), but thats -next material.
>
> Reported-by: Markus Trippelsdorf <mar...@trippelsdorf.de>
> Suggested-by: Al Viro <v...@zeniv.linux.org.uk>
> Signed-off-by: Florian Westphal <f...@strlen.de>
> ---
>  net/netfilter/x_tables.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>

ACK
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to