summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--netdissect.c116
-rw-r--r--netdissect.h23
-rw-r--r--print-esp.c13
-rw-r--r--print-ether.c2
-rw-r--r--print-ip.c2
-rw-r--r--print-ip6.c6
-rw-r--r--print.c7
-rw-r--r--tests/TESTLIST2
-rw-r--r--tests/ipv6-too-long-jumbo.out1
-rw-r--r--tests/ipv6-too-long-jumbo.pcapbin0 -> 530 bytes
10 files changed, 86 insertions, 86 deletions
diff --git a/netdissect.c b/netdissect.c
index a706a6a0..72923a17 100644
--- a/netdissect.c
+++ b/netdissect.c
@@ -149,7 +149,7 @@ nd_smi_version_string(void)
int
nd_push_buffer(netdissect_options *ndo, u_char *new_buffer,
- const u_char *new_packetp, const u_char *new_snapend)
+ const u_char *new_packetp, u_int newlen)
{
struct netdissect_saved_packet_info *ndspi;
@@ -162,20 +162,30 @@ nd_push_buffer(netdissect_options *ndo, u_char *new_buffer,
ndspi->ndspi_prev = ndo->ndo_packet_info_stack;
ndo->ndo_packetp = new_packetp;
- ndo->ndo_snapend = new_snapend;
+ ndo->ndo_snapend = new_packetp + newlen;
ndo->ndo_packet_info_stack = ndspi;
return (1); /* success */
}
+
/*
- * Set a new snapshot end to the minimum of the existing snapshot end
- * and the new snapshot end.
+ * In a given netdissect_options structure:
+ *
+ *, push the current packet information onto the packet informaton
+ * stack;
+ *
+ * given a pointer into the packet and a length past that point in
+ * the packet, calculate a new snapshot end that's at the lower
+ * of the current snapshot end and that point in the packet;
+ *
+ * set the snapshot end to that new value.
*/
int
-nd_push_snapend(netdissect_options *ndo, const u_char *new_snapend)
+nd_push_snaplen(netdissect_options *ndo, const u_char *bp, u_int newlen)
{
struct netdissect_saved_packet_info *ndspi;
+ u_int snaplen_remaining;
ndspi = (struct netdissect_saved_packet_info *)malloc(sizeof(struct netdissect_saved_packet_info));
if (ndspi == NULL)
@@ -186,76 +196,86 @@ nd_push_snapend(netdissect_options *ndo, const u_char *new_snapend)
ndspi->ndspi_prev = ndo->ndo_packet_info_stack;
/*
- * Make sure the new snapend is sane.
- *
- * If it's after the current snapend, it's not valid. We
- * silently ignore the new setting; that means that our callers
- * don't have to do this check themselves, and also means that
- * if the new length is used when dissecting, we'll go past the
- * snapend and report an error.
+ * Push the saved previous data onto the stack.
+ */
+ ndo->ndo_packet_info_stack = ndspi;
+
+ /*
+ * Find out how many bytes remain after the current snapend.
*
- * If it's before the beginning of the packet, it's not valid.
- * That "should not happen", but might happen with a *very*
- * large adjustment to the snapend; our callers *should* check
- * for that, so we fail if they haven't done so.
+ * We're restricted to packets with at most UINT_MAX bytes;
+ * cast the result to u_int, so that we don't get truncation
+ * warnings on LP64 and LLP64 platforms. (ptrdiff_t is
+ * signed and we want an unsigned difference; the pointer
+ * should at most be equal to snapend, and must *never*
+ * be past snapend.)
*/
- if (new_snapend <= ndo->ndo_snapend) {
+ snaplen_remaining = (u_int)(ndo->ndo_snapend - bp);
+
+ /*
+ * If the new snapend is smaller than the one calculated
+ * above, set the snapend to that value, otherwise leave
+ * it unchanged.
+ */
+ if (newlen <= snaplen_remaining) {
/* Snapend isn't past the previous snapend */
- if (new_snapend >= ndo->ndo_packetp) {
- /* And it isn't before the beginning of the packet */
- ndo->ndo_snapend = new_snapend;
- } else {
- /* But it's before the beginning of the packet */
- ND_PRINT(" [new snapend before beginning of packet in nd_push_snapend]");
- nd_bug_longjmp(ndo);
- }
+ ndo->ndo_snapend = bp + newlen;
}
- ndo->ndo_packet_info_stack = ndspi;
return (1); /* success */
}
/*
- * Change an already-pushed snapshot end. This may increase the
+ * In a given netdissect_options structure:
+ *
+ * given a pointer into the packet and a length past that point in
+ * the packet, calculate a new snapshot end that's at the lower
+ * of the previous snapshot end - or, if there is no previous
+ * snapshot end, the current snapshot end - and that point in the
+ * packet;
+ *
+ * set the snapshot end to that new value.
+ *
+ * This is to change the current snapshot end. This may increase the
* snapshot end, as it may be used, for example, for a Jumbo Payload
* option in IPv6. It must not increase it past the snapshot length
* atop which the current one was pushed, however.
*/
void
-nd_change_snapend(netdissect_options *ndo, const u_char *new_snapend)
+nd_change_snaplen(netdissect_options *ndo, const u_char *bp, u_int newlen)
{
struct netdissect_saved_packet_info *ndspi;
const u_char *previous_snapend;
+ u_int snaplen_remaining;
ndspi = ndo->ndo_packet_info_stack;
if (ndspi->ndspi_prev != NULL)
previous_snapend = ndspi->ndspi_prev->ndspi_snapend;
else
previous_snapend = ndo->ndo_snapend;
+
/*
- * Make sure the new snapend is sane.
- *
- * If it's after the current snapend, it's not valid. We
- * silently ignore the new setting; that means that our callers
- * don't have to do this check themselves, and also means that
- * if the new length is used when dissecting, we'll go past the
- * snapend and report an error.
+ * Find out how many bytes remain after the previous
+ * snapend - or, if there is no previous snapend, after
+ * the current snapend.
*
- * If it's before the beginning of the packet, it's not valid.
- * That "should not happen", but might happen with a *very*
- * large adjustment to the snapend; our callers *should* check
- * for that, so we fail if they haven't done so.
+ * We're restricted to packets with at most UINT_MAX bytes;
+ * cast the result to u_int, so that we don't get truncation
+ * warnings on LP64 and LLP64 platforms. (ptrdiff_t is
+ * signed and we want an unsigned difference; the pointer
+ * should at most be equal to snapend, and must *never*
+ * be past snapend.)
+ */
+ snaplen_remaining = (u_int)(previous_snapend - bp);
+
+ /*
+ * If the new snapend is smaller than the one calculated
+ * above, set the snapend to that value, otherwise leave
+ * it unchanged.
*/
- if (new_snapend <= previous_snapend) {
+ if (newlen <= snaplen_remaining) {
/* Snapend isn't past the previous snapend */
- if (new_snapend >= ndo->ndo_packetp) {
- /* And it isn't before the beginning of the packet */
- ndo->ndo_snapend = new_snapend;
- } else {
- /* But it's before the beginning of the packet */
- ND_PRINT(" [new snapend before beginning of packet in nd_push_snapend]");
- nd_bug_longjmp(ndo);
- }
+ ndo->ndo_snapend = bp + newlen;
}
}
diff --git a/netdissect.h b/netdissect.h
index 605a9c9b..f53499e9 100644
--- a/netdissect.h
+++ b/netdissect.h
@@ -193,8 +193,7 @@ struct netdissect_saved_packet_info {
};
/* 'val' value(s) for longjmp */
-#define ND_TRUNCATED 1 /* packet data too short */
-#define ND_BUG 2 /* bug of some sort */
+#define ND_TRUNCATED 1
struct netdissect_options {
int ndo_bflag; /* print 4 byte ASes in ASDOT notation */
@@ -264,9 +263,9 @@ struct netdissect_options {
};
extern int nd_push_buffer(netdissect_options *, u_char *, const u_char *,
- const u_char *);
-extern int nd_push_snapend(netdissect_options *, const u_char *);
-extern void nd_change_snapend(netdissect_options *, const u_char *);
+ u_int);
+extern int nd_push_snaplen(netdissect_options *, const u_char *, u_int);
+extern void nd_change_snaplen(netdissect_options *, const u_char *, u_int);
extern void nd_pop_packet_info(netdissect_options *);
extern void nd_pop_all_packet_info(netdissect_options *);
@@ -284,20 +283,6 @@ nd_trunc_longjmp(netdissect_options *ndo)
#endif /* _AIX */
}
-static inline NORETURN void
-nd_bug_longjmp(netdissect_options *ndo)
-{
- longjmp(ndo->ndo_early_end, ND_BUG);
-#ifdef _AIX
- /*
- * In AIX <setjmp.h> decorates longjmp() with "#pragma leaves", which tells
- * XL C that the function is noreturn, but GCC remains unaware of that and
- * yields a "'noreturn' function does return" warning.
- */
- ND_UNREACHABLE
-#endif /* _AIX */
-}
-
#define PT_VAT 1 /* Visual Audio Tool */
#define PT_WB 2 /* distributed White Board */
#define PT_RPC 3 /* Remote Procedure Call */
diff --git a/print-esp.c b/print-esp.c
index 1e68c9d7..22af35b3 100644
--- a/print-esp.c
+++ b/print-esp.c
@@ -329,7 +329,7 @@ int esp_decrypt_buffer_by_ikev2_print(netdissect_options *ndo,
* on the buffer stack so it can be freed; our caller must
* pop it when done.
*/
- if (!nd_push_buffer(ndo, pt, pt, pt + ctlen)) {
+ if (!nd_push_buffer(ndo, pt, pt, ctlen)) {
free(pt);
return 0;
}
@@ -877,8 +877,7 @@ esp_print(netdissect_options *ndo,
* Switch to the output buffer for dissection, and
* save it on the buffer stack so it can be freed.
*/
- ep = pt + payloadlen;
- if (!nd_push_buffer(ndo, pt, pt, ep)) {
+ if (!nd_push_buffer(ndo, pt, pt, payloadlen)) {
free(pt);
(*ndo->ndo_error)(ndo, S_ERR_ND_MEM_ALLOC,
"%s: can't push buffer on buffer stack", __func__);
@@ -893,14 +892,14 @@ esp_print(netdissect_options *ndo,
* it was not decrypted with the correct key, so that the
* "plaintext" is not what was being sent.
*/
- padlen = GET_U_1(ep - 2);
+ padlen = GET_U_1(pt + payloadlen - 2);
if (padlen + 2 > payloadlen) {
nd_print_trunc(ndo);
return;
}
/* Get the next header */
- nh = GET_U_1(ep - 1);
+ nh = GET_U_1(pt + payloadlen - 1);
ND_PRINT(": ");
@@ -908,7 +907,7 @@ esp_print(netdissect_options *ndo,
* Don't put padding + padding length(1 byte) + next header(1 byte)
* in the buffer because they are not part of the plaintext to decode.
*/
- nd_push_snapend(ndo, ep - (padlen + 2));
+ nd_push_snaplen(ndo, pt, payloadlen - (padlen + 2));
/* Now dissect the plaintext. */
ip_demux_print(ndo, pt, payloadlen - (padlen + 2), ver, fragmented,
@@ -916,7 +915,7 @@ esp_print(netdissect_options *ndo,
/* Pop the buffer, freeing it. */
nd_pop_packet_info(ndo);
- /* Pop the nd_push_snapend */
+ /* Pop the nd_push_snaplen */
nd_pop_packet_info(ndo);
#endif
}
diff --git a/print-ether.c b/print-ether.c
index 5607bfc3..1b273e16 100644
--- a/print-ether.c
+++ b/print-ether.c
@@ -306,7 +306,7 @@ recurse:
* Cut off the snapshot length to the end of the
* payload.
*/
- nd_push_snapend(ndo, p + length);
+ nd_push_snaplen(ndo, p, length);
if (ndo->ndo_eflag) {
ND_PRINT("802.3");
diff --git a/print-ip.c b/print-ip.c
index a0df9591..4f9617a3 100644
--- a/print-ip.c
+++ b/print-ip.c
@@ -377,7 +377,7 @@ ip_print(netdissect_options *ndo,
/*
* Cut off the snapshot length to the end of the IP payload.
*/
- nd_push_snapend(ndo, bp + len);
+ nd_push_snaplen(ndo, bp, len);
len -= hlen;
diff --git a/print-ip6.c b/print-ip6.c
index b3379baa..15b30630 100644
--- a/print-ip6.c
+++ b/print-ip6.c
@@ -305,7 +305,7 @@ ip6_print(netdissect_options *ndo, const u_char *bp, u_int length)
/*
* Cut off the snapshot length to the end of the IP payload.
*/
- nd_push_snapend(ndo, bp + len);
+ nd_push_snaplen(ndo, bp, len);
cp = (const u_char *)ip6;
advance = sizeof(struct ip6_hdr);
@@ -413,7 +413,7 @@ ip6_print(netdissect_options *ndo, const u_char *bp, u_int length)
if (length < len)
ND_PRINT("truncated-ip6 - %u bytes missing!",
len - length);
- nd_change_snapend(ndo, bp + len);
+ nd_change_snaplen(ndo, bp, len);
/*
* Now subtract the length of the IPv6
@@ -446,7 +446,7 @@ ip6_print(netdissect_options *ndo, const u_char *bp, u_int length)
* accordingly.
*/
len = sizeof(struct ip6_hdr);
- nd_change_snapend(ndo, bp + len);
+ nd_change_snaplen(ndo, bp, len);
/*
* Now subtract the length of
diff --git a/print.c b/print.c
index b595a882..fbb1b3b1 100644
--- a/print.c
+++ b/print.c
@@ -421,13 +421,6 @@ pretty_print_packet(netdissect_options *ndo, const struct pcap_pkthdr *h,
profile_func_level = pretty_print_packet_level;
#endif
break;
- case ND_BUG:
- /*
- * A printer or helper routine quit because a bug was
- * detected; report it.
- */
- ND_PRINT(" [Bug in %s protocol printer]", ndo->ndo_protocol);
- break;
}
hdrlen = ndo->ndo_ll_hdr_len;
diff --git a/tests/TESTLIST b/tests/TESTLIST
index d3c4aa37..b001f1ce 100644
--- a/tests/TESTLIST
+++ b/tests/TESTLIST
@@ -337,6 +337,8 @@ ipv6-srh-ext-header ipv6-srh-ext-header.pcap ipv6-srh-ext-header.out -v
ipv6-srh-insert-cksum ipv6-srh-insert-cksum.pcap ipv6-srh-insert-cksum.out -v
ipv6-srh-ipproto-ether-v ipv6-srh-ipproto-ether.pcap ipv6-srh-ipproto-ether-v.out -v
ipv6-srh-ipproto-ether-ev ipv6-srh-ipproto-ether.pcap ipv6-srh-ipproto-ether-ev.out -ev
+ipv6-too-long-jumbo ipv6-too-long-jumbo.pcap ipv6-too-long-jumbo.out -v
+
# Loopback/CTP test case
loopback loopback.pcap loopback.out
diff --git a/tests/ipv6-too-long-jumbo.out b/tests/ipv6-too-long-jumbo.out
new file mode 100644
index 00000000..c5ccb838
--- /dev/null
+++ b/tests/ipv6-too-long-jumbo.out
@@ -0,0 +1 @@
+ 1 12:40:23.226395 IP6 (class 0xc0, hlim 0, next-header Options (0) payload length: 0) 1:6:1a28:312:d7cb:b318:34e5:d3ea > 2b7f:cd1f:ec3c:fb9c:e731:d16b:a8fe:ba8c: HBH (opt_type 0x1a: len=0)(padn)(opt_type 0x16: len=0)(opt_type 0x64: len=114)(jumbo: 3858694210) (opt_type 0x42: len=3)(opt_type 0xfe: len=6)(pad1)(jumbo: 248 - already seen) (opt_type 0x0e: len=8)(opt_type 0x07: len=4)(opt_type 0xf1: len=60) truncated-ip6 - 3858693774 bytes missing! ip-proto-12 3858693802
diff --git a/tests/ipv6-too-long-jumbo.pcap b/tests/ipv6-too-long-jumbo.pcap
new file mode 100644
index 00000000..3a7fea93
--- /dev/null
+++ b/tests/ipv6-too-long-jumbo.pcap
Binary files differ