[PATCHv2] net: bpf: reject invalid shifts
Eric Dumazet
eric.dumazet at gmail.com
Tue Jan 12 18:11:38 PST 2016
On Tue, 2016-01-12 at 15:47 -0800, Alexei Starovoitov wrote:
> I would agree if those loaded programs would do something sensible,
> but they're broken. As shown arm and arm64 would execute them
> differently without JIT, because HW treats such shifts differently.
> I also checked that libpcap is sane and doesn't generate broken shifts.
> imo we're not breaking backward compatiblity here.
>
How did you prove a particular code path was even taken in a BPF
program ? This is new to me.
As I said, it is possible some guys never noticed their BPF program were
'broken' because this invalid shift was hidden in a dead code part.
So a program might appear as 'weak' when in fact its behavior was
absolutely correct.
You assume everybody uses libpcap, this is wrong, and for very obvious
reasons.
Try to encode the QUEUE, RXHASH, or CPU instructions in libpcap, for a
start.
More information about the linux-arm-kernel
mailing list