|
@@ -7250,84 +7250,454 @@ static struct bpf_test tests[] = {
|
|
|
.prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "bpf_exit with invalid return code. test1",
|
|
|
+ "XDP pkt read, pkt_end >= pkt_data', bad access 1",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_end)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_end >= pkt_data', bad access 2",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_end)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_data' <= pkt_end, good access",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_end)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_data' <= pkt_end, bad access 1",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_end)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_data' <= pkt_end, bad access 2",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_end)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_end <= pkt_data', good access",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_end)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_end <= pkt_data', bad access 1",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_end)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_end <= pkt_data', bad access 2",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_end)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 0),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_meta' > pkt_data, good access",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_meta' > pkt_data, bad access 1",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_meta' > pkt_data, bad access 2",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 0),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_data > pkt_meta', good access",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_data > pkt_meta', bad access 1",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_data > pkt_meta', bad access 2",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_meta' < pkt_data, good access",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_meta' < pkt_data, bad access 1",
|
|
|
.insns = {
|
|
|
- BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
BPF_EXIT_INSN(),
|
|
|
},
|
|
|
- .errstr = "R0 has value (0x0; 0xffffffff)",
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
.result = REJECT,
|
|
|
- .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "bpf_exit with invalid return code. test2",
|
|
|
+ "XDP pkt read, pkt_meta' < pkt_data, bad access 2",
|
|
|
.insns = {
|
|
|
- BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
|
|
|
- BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_data < pkt_meta', good access",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
BPF_EXIT_INSN(),
|
|
|
},
|
|
|
.result = ACCEPT,
|
|
|
- .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "bpf_exit with invalid return code. test3",
|
|
|
+ "XDP pkt read, pkt_data < pkt_meta', bad access 1",
|
|
|
.insns = {
|
|
|
- BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
|
|
|
- BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 3),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
BPF_EXIT_INSN(),
|
|
|
},
|
|
|
- .errstr = "R0 has value (0x0; 0x3)",
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
.result = REJECT,
|
|
|
- .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
},
|
|
|
{
|
|
|
- "bpf_exit with invalid return code. test4",
|
|
|
+ "XDP pkt read, pkt_data < pkt_meta', bad access 2",
|
|
|
.insns = {
|
|
|
- BPF_MOV64_IMM(BPF_REG_0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 0),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
BPF_EXIT_INSN(),
|
|
|
},
|
|
|
- .result = ACCEPT,
|
|
|
- .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "bpf_exit with invalid return code. test5",
|
|
|
+ "XDP pkt read, pkt_meta' >= pkt_data, good access",
|
|
|
.insns = {
|
|
|
- BPF_MOV64_IMM(BPF_REG_0, 2),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
BPF_EXIT_INSN(),
|
|
|
},
|
|
|
- .errstr = "R0 has value (0x2; 0x0)",
|
|
|
- .result = REJECT,
|
|
|
- .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
},
|
|
|
{
|
|
|
- "bpf_exit with invalid return code. test6",
|
|
|
+ "XDP pkt read, pkt_meta' >= pkt_data, bad access 1",
|
|
|
.insns = {
|
|
|
- BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
BPF_EXIT_INSN(),
|
|
|
},
|
|
|
- .errstr = "R0 is not a known value (ctx)",
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
.result = REJECT,
|
|
|
- .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "bpf_exit with invalid return code. test7",
|
|
|
+ "XDP pkt read, pkt_meta' >= pkt_data, bad access 2",
|
|
|
.insns = {
|
|
|
- BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
|
|
|
- BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 4),
|
|
|
- BPF_ALU64_REG(BPF_MUL, BPF_REG_0, BPF_REG_2),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 0),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
BPF_EXIT_INSN(),
|
|
|
},
|
|
|
- .errstr = "R0 has unknown scalar value",
|
|
|
+ .errstr = "R1 offset is outside of the packet",
|
|
|
.result = REJECT,
|
|
|
- .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
},
|
|
|
{
|
|
|
- "XDP pkt read, pkt_end >= pkt_data', bad access 1",
|
|
|
+ "XDP pkt read, pkt_data >= pkt_meta', good access",
|
|
|
.insns = {
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
offsetof(struct xdp_md, data)),
|
|
|
+ BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
+ BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
|
|
|
+ BPF_JMP_IMM(BPF_JA, 0, 0, 1),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_XDP,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "XDP pkt read, pkt_data >= pkt_meta', bad access 1",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data_end)),
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
|
|
@@ -7342,12 +7712,12 @@ static struct bpf_test tests[] = {
|
|
|
.flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
},
|
|
|
{
|
|
|
- "XDP pkt read, pkt_end >= pkt_data', bad access 2",
|
|
|
+ "XDP pkt read, pkt_data >= pkt_meta', bad access 2",
|
|
|
.insns = {
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data)),
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data_end)),
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
|
|
@@ -7360,12 +7730,12 @@ static struct bpf_test tests[] = {
|
|
|
.prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "XDP pkt read, pkt_data' <= pkt_end, good access",
|
|
|
+ "XDP pkt read, pkt_meta' <= pkt_data, good access",
|
|
|
.insns = {
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data)),
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data_end)),
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
|
|
@@ -7378,12 +7748,12 @@ static struct bpf_test tests[] = {
|
|
|
.prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "XDP pkt read, pkt_data' <= pkt_end, bad access 1",
|
|
|
+ "XDP pkt read, pkt_meta' <= pkt_data, bad access 1",
|
|
|
.insns = {
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data)),
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data_end)),
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
|
|
@@ -7398,12 +7768,12 @@ static struct bpf_test tests[] = {
|
|
|
.flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
},
|
|
|
{
|
|
|
- "XDP pkt read, pkt_data' <= pkt_end, bad access 2",
|
|
|
+ "XDP pkt read, pkt_meta' <= pkt_data, bad access 2",
|
|
|
.insns = {
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data)),
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data_end)),
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
|
|
@@ -7416,12 +7786,12 @@ static struct bpf_test tests[] = {
|
|
|
.prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "XDP pkt read, pkt_end <= pkt_data', good access",
|
|
|
+ "XDP pkt read, pkt_data <= pkt_meta', good access",
|
|
|
.insns = {
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data)),
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data_end)),
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 1),
|
|
@@ -7434,12 +7804,12 @@ static struct bpf_test tests[] = {
|
|
|
.flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
},
|
|
|
{
|
|
|
- "XDP pkt read, pkt_end <= pkt_data', bad access 1",
|
|
|
+ "XDP pkt read, pkt_data <= pkt_meta', bad access 1",
|
|
|
.insns = {
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data)),
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data_end)),
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 1),
|
|
@@ -7452,12 +7822,12 @@ static struct bpf_test tests[] = {
|
|
|
.prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
{
|
|
|
- "XDP pkt read, pkt_end <= pkt_data', bad access 2",
|
|
|
+ "XDP pkt read, pkt_data <= pkt_meta', bad access 2",
|
|
|
.insns = {
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data)),
|
|
|
+ offsetof(struct xdp_md, data_meta)),
|
|
|
BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
|
|
|
- offsetof(struct xdp_md, data_end)),
|
|
|
+ offsetof(struct xdp_md, data)),
|
|
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
|
|
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
|
|
|
BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 0),
|
|
@@ -7470,6 +7840,78 @@ static struct bpf_test tests[] = {
|
|
|
.prog_type = BPF_PROG_TYPE_XDP,
|
|
|
.flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
|
|
|
},
|
|
|
+ {
|
|
|
+ "bpf_exit with invalid return code. test1",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R0 has value (0x0; 0xffffffff)",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "bpf_exit with invalid return code. test2",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
|
|
|
+ BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 1),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "bpf_exit with invalid return code. test3",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
|
|
|
+ BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 3),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R0 has value (0x0; 0x3)",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "bpf_exit with invalid return code. test4",
|
|
|
+ .insns = {
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 1),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .result = ACCEPT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "bpf_exit with invalid return code. test5",
|
|
|
+ .insns = {
|
|
|
+ BPF_MOV64_IMM(BPF_REG_0, 2),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R0 has value (0x2; 0x0)",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "bpf_exit with invalid return code. test6",
|
|
|
+ .insns = {
|
|
|
+ BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R0 is not a known value (ctx)",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "bpf_exit with invalid return code. test7",
|
|
|
+ .insns = {
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
|
|
|
+ BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 4),
|
|
|
+ BPF_ALU64_REG(BPF_MUL, BPF_REG_0, BPF_REG_2),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .errstr = "R0 has unknown scalar value",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
|
|
|
+ },
|
|
|
};
|
|
|
|
|
|
static int probe_filter_length(const struct bpf_insn *fp)
|