Date: Wed, 30 Nov 2005 08:49:49 GMT From: Guy Harris <guy@alum.mit.edu> To: freebsd-gnats-submit@FreeBSD.org Subject: kern/89748: BPF indexed byte load can sign extend Message-ID: <200511300849.jAU8nnAo048824@www.freebsd.org> Resent-Message-ID: <200511300850.jAU8o2OL017470@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 89748 >Category: kern >Synopsis: BPF indexed byte load can sign extend >Confidential: no >Severity: non-critical >Priority: medium >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Nov 30 08:50:02 GMT 2005 >Closed-Date: >Last-Modified: >Originator: Guy Harris >Release: >Organization: >Environment: >Description: The code to handle BPF non-indexed loads in bpf_filter() in bpf_filter.c is: case BPF_LD|BPF_B|BPF_ABS: k = pc->k; if (k >= buflen) { #ifdef _KERNEL struct mbuf *m; int len; if (buflen != 0) return 0; m = (struct mbuf *)p; MINDEX(len, m, k); A = mtod(m, u_char *)[k]; continue; #else return 0; #endif } A = p[k]; continue; which will load the byte at the offset in the instruction into the accumulator, zero-extending it. The code to handle indexed loads is case BPF_LD|BPF_B|BPF_IND: k = X + pc->k; if (k >= buflen) { #ifdef _KERNEL struct mbuf *m; int len; if (buflen != 0) return 0; m = (struct mbuf *)p; MINDEX(len, m, k); A = mtod(m, char *)[k]; continue; #else return 0; #endif } A = p[k]; continue; which will load the byte at the offset that's the sum of the offset in the instruction and the contents of the index register; if buflen is 0, as is the case when this is called from bpf_mtap(), it will sign-extend it on most if not all platforms, as the mbuf data pointer is cast to "char *" rather than "u_char *". Otherwise, as is the case when this is called from bpf_tap(), it'll zero-extend it, as "p" is a "u_char *". Presumably those semantics are not intended, as the same instruction behaves differently depending on how the tapping is being done, and on whether the load is indexed or not. (In libpcap's user-mode filter, it's never sign-extended.) In NetBSD, it's "u_char" in both "mtod()" calls, fixing that. >How-To-Repeat: >Fix: Index: bpf_filter.c =================================================================== RCS file: /cvs/src/sys/net/bpf_filter.c,v retrieving revision 1.15 diff -c -r1.15 bpf_filter.c *** bpf_filter.c 28 Sep 2005 20:53:56 -0000 1.15 --- bpf_filter.c 30 Nov 2005 07:58:29 -0000 *************** *** 301,307 **** return 0; m = (struct mbuf *)p; MINDEX(len, m, k); ! A = mtod(m, char *)[k]; continue; #else return 0; --- 301,307 ---- return 0; m = (struct mbuf *)p; MINDEX(len, m, k); ! A = mtod(m, u_char *)[k]; continue; #else return 0; >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200511300849.jAU8nnAo048824>