|
@@ -9715,6 +9715,57 @@ static struct bpf_test tests[] = {
|
|
|
.result = REJECT,
|
|
|
.prog_type = BPF_PROG_TYPE_XDP,
|
|
|
},
|
|
|
+ {
|
|
|
+ "search pruning: all branches should be verified (nop operation)",
|
|
|
+ .insns = {
|
|
|
+ BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
|
|
|
+ BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
|
|
|
+ BPF_LD_MAP_FD(BPF_REG_1, 0),
|
|
|
+ BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
|
|
|
+ BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
|
|
|
+ BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_4, 0),
|
|
|
+ BPF_JMP_A(1),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_4, 1),
|
|
|
+ BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16),
|
|
|
+ BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16),
|
|
|
+ BPF_JMP_IMM(BPF_JEQ, BPF_REG_5, 0, 2),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_6, 0),
|
|
|
+ BPF_ST_MEM(BPF_DW, BPF_REG_6, 0, 0xdead),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .fixup_map1 = { 3 },
|
|
|
+ .errstr = "R6 invalid mem access 'inv'",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_TRACEPOINT,
|
|
|
+ },
|
|
|
+ {
|
|
|
+ "search pruning: all branches should be verified (invalid stack access)",
|
|
|
+ .insns = {
|
|
|
+ BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
|
|
|
+ BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
|
|
|
+ BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
|
|
|
+ BPF_LD_MAP_FD(BPF_REG_1, 0),
|
|
|
+ BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
|
|
|
+ BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
|
|
|
+ BPF_MOV64_IMM(BPF_REG_4, 0),
|
|
|
+ BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2),
|
|
|
+ BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16),
|
|
|
+ BPF_JMP_A(1),
|
|
|
+ BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -24),
|
|
|
+ BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
|
|
|
+ BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16),
|
|
|
+ BPF_EXIT_INSN(),
|
|
|
+ },
|
|
|
+ .fixup_map1 = { 3 },
|
|
|
+ .errstr = "invalid read from stack off -16+0 size 8",
|
|
|
+ .result = REJECT,
|
|
|
+ .prog_type = BPF_PROG_TYPE_TRACEPOINT,
|
|
|
+ },
|
|
|
};
|
|
|
|
|
|
static int probe_filter_length(const struct bpf_insn *fp)
|