test_verifier.c 385 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031100321003310034100351003610037100381003910040100411004210043100441004510046100471004810049100501005110052100531005410055100561005710058100591006010061100621006310064100651006610067100681006910070100711007210073100741007510076100771007810079100801008110082100831008410085100861008710088100891009010091100921009310094100951009610097100981009910100101011010210103101041010510106101071010810109101101011110112101131011410115101161011710118101191012010121101221012310124101251012610127101281012910130101311013210133101341013510136101371013810139101401014110142101431014410145101461014710148101491015010151101521015310154101551015610157101581015910160101611016210163101641016510166101671016810169101701017110172101731017410175101761017710178101791018010181101821018310184101851018610187101881018910190101911019210193101941019510196101971019810199102001020110202102031020410205102061020710208102091021010211102121021310214102151021610217102181021910220102211022210223102241022510226102271022810229102301023110232102331023410235102361023710238102391024010241102421024310244102451024610247102481024910250102511025210253102541025510256102571025810259102601026110262102631026410265102661026710268102691027010271102721027310274102751027610277102781027910280102811028210283102841028510286102871028810289102901029110292102931029410295102961029710298102991030010301103021030310304103051030610307103081030910310103111031210313103141031510316103171031810319103201032110322103231032410325103261032710328103291033010331103321033310334103351033610337103381033910340103411034210343103441034510346103471034810349103501035110352103531035410355103561035710358103591036010361103621036310364103651036610367103681036910370103711037210373103741037510376103771037810379103801038110382103831038410385103861038710388103891039010391103921039310394103951039610397103981039910400104011040210403104041040510406104071040810409104101041110412104131041410415104161041710418104191042010421104221042310424104251042610427104281042910430104311043210433104341043510436104371043810439104401044110442104431044410445104461044710448104491045010451104521045310454104551045610457104581045910460104611046210463104641046510466104671046810469104701047110472104731047410475104761047710478104791048010481104821048310484104851048610487104881048910490104911049210493104941049510496104971049810499105001050110502105031050410505105061050710508105091051010511105121051310514105151051610517105181051910520105211052210523105241052510526105271052810529105301053110532105331053410535105361053710538105391054010541105421054310544105451054610547105481054910550105511055210553105541055510556105571055810559105601056110562105631056410565105661056710568105691057010571105721057310574105751057610577105781057910580105811058210583105841058510586105871058810589105901059110592105931059410595105961059710598105991060010601106021060310604106051060610607106081060910610106111061210613106141061510616106171061810619106201062110622106231062410625106261062710628106291063010631106321063310634106351063610637106381063910640106411064210643106441064510646106471064810649106501065110652106531065410655106561065710658106591066010661106621066310664106651066610667106681066910670106711067210673106741067510676106771067810679106801068110682106831068410685106861068710688106891069010691106921069310694106951069610697106981069910700107011070210703107041070510706107071070810709107101071110712107131071410715107161071710718107191072010721107221072310724107251072610727107281072910730107311073210733107341073510736107371073810739107401074110742107431074410745107461074710748107491075010751107521075310754107551075610757107581075910760107611076210763107641076510766107671076810769107701077110772107731077410775107761077710778107791078010781107821078310784107851078610787107881078910790107911079210793107941079510796107971079810799108001080110802108031080410805108061080710808108091081010811108121081310814108151081610817108181081910820108211082210823108241082510826108271082810829108301083110832108331083410835108361083710838108391084010841108421084310844108451084610847108481084910850108511085210853108541085510856108571085810859108601086110862108631086410865108661086710868108691087010871108721087310874108751087610877108781087910880108811088210883108841088510886108871088810889108901089110892108931089410895108961089710898108991090010901109021090310904109051090610907109081090910910109111091210913109141091510916109171091810919109201092110922109231092410925109261092710928109291093010931109321093310934109351093610937109381093910940109411094210943109441094510946109471094810949109501095110952109531095410955109561095710958109591096010961109621096310964109651096610967109681096910970109711097210973109741097510976109771097810979109801098110982109831098410985109861098710988109891099010991109921099310994109951099610997109981099911000110011100211003110041100511006110071100811009110101101111012110131101411015110161101711018110191102011021110221102311024110251102611027110281102911030110311103211033110341103511036110371103811039110401104111042110431104411045110461104711048110491105011051110521105311054110551105611057110581105911060110611106211063110641106511066110671106811069110701107111072110731107411075110761107711078110791108011081110821108311084110851108611087110881108911090110911109211093110941109511096110971109811099111001110111102111031110411105111061110711108111091111011111111121111311114111151111611117111181111911120111211112211123111241112511126111271112811129111301113111132111331113411135111361113711138111391114011141111421114311144111451114611147111481114911150111511115211153111541115511156111571115811159111601116111162111631116411165111661116711168111691117011171111721117311174111751117611177111781117911180111811118211183111841118511186111871118811189111901119111192111931119411195111961119711198111991120011201112021120311204112051120611207112081120911210112111121211213112141121511216112171121811219112201122111222112231122411225112261122711228112291123011231112321123311234112351123611237112381123911240112411124211243112441124511246112471124811249112501125111252112531125411255112561125711258112591126011261112621126311264112651126611267112681126911270112711127211273112741127511276112771127811279112801128111282112831128411285112861128711288112891129011291112921129311294112951129611297112981129911300113011130211303113041130511306113071130811309113101131111312113131131411315113161131711318113191132011321113221132311324113251132611327113281132911330113311133211333113341133511336113371133811339113401134111342113431134411345113461134711348113491135011351113521135311354113551135611357113581135911360113611136211363113641136511366113671136811369113701137111372113731137411375113761137711378113791138011381113821138311384113851138611387113881138911390113911139211393113941139511396113971139811399114001140111402114031140411405114061140711408114091141011411114121141311414114151141611417114181141911420114211142211423114241142511426114271142811429114301143111432114331143411435114361143711438114391144011441114421144311444114451144611447114481144911450114511145211453114541145511456114571145811459114601146111462114631146411465114661146711468114691147011471114721147311474114751147611477114781147911480114811148211483114841148511486114871148811489114901149111492114931149411495114961149711498114991150011501115021150311504115051150611507115081150911510115111151211513115141151511516115171151811519115201152111522115231152411525115261152711528115291153011531115321153311534115351153611537115381153911540115411154211543115441154511546115471154811549115501155111552115531155411555115561155711558115591156011561115621156311564115651156611567115681156911570115711157211573115741157511576115771157811579115801158111582115831158411585115861158711588115891159011591115921159311594115951159611597115981159911600116011160211603116041160511606116071160811609116101161111612116131161411615116161161711618116191162011621116221162311624116251162611627116281162911630116311163211633116341163511636116371163811639116401164111642116431164411645116461164711648116491165011651116521165311654116551165611657116581165911660116611166211663116641166511666116671166811669116701167111672116731167411675116761167711678116791168011681116821168311684116851168611687116881168911690116911169211693116941169511696116971169811699117001170111702117031170411705117061170711708117091171011711117121171311714117151171611717117181171911720117211172211723117241172511726117271172811729117301173111732117331173411735117361173711738117391174011741117421174311744117451174611747117481174911750117511175211753117541175511756117571175811759117601176111762117631176411765117661176711768117691177011771117721177311774117751177611777117781177911780117811178211783117841178511786117871178811789117901179111792117931179411795117961179711798117991180011801118021180311804118051180611807118081180911810118111181211813118141181511816118171181811819118201182111822118231182411825118261182711828118291183011831118321183311834118351183611837118381183911840118411184211843118441184511846118471184811849118501185111852118531185411855118561185711858118591186011861118621186311864118651186611867118681186911870118711187211873118741187511876118771187811879118801188111882118831188411885118861188711888118891189011891118921189311894118951189611897118981189911900119011190211903119041190511906119071190811909119101191111912119131191411915119161191711918119191192011921119221192311924119251192611927119281192911930119311193211933119341193511936119371193811939119401194111942119431194411945119461194711948119491195011951119521195311954119551195611957119581195911960119611196211963119641196511966119671196811969119701197111972119731197411975119761197711978119791198011981119821198311984119851198611987119881198911990119911199211993119941199511996119971199811999120001200112002120031200412005120061200712008120091201012011120121201312014120151201612017120181201912020120211202212023120241202512026120271202812029120301203112032120331203412035120361203712038120391204012041120421204312044120451204612047120481204912050120511205212053120541205512056120571205812059120601206112062120631206412065120661206712068120691207012071120721207312074120751207612077120781207912080120811208212083120841208512086120871208812089120901209112092120931209412095120961209712098120991210012101121021210312104121051210612107121081210912110121111211212113121141211512116121171211812119121201212112122121231212412125121261212712128121291213012131121321213312134121351213612137121381213912140121411214212143121441214512146121471214812149121501215112152121531215412155121561215712158121591216012161121621216312164121651216612167121681216912170121711217212173121741217512176121771217812179121801218112182121831218412185121861218712188121891219012191121921219312194121951219612197121981219912200122011220212203122041220512206122071220812209122101221112212122131221412215122161221712218122191222012221122221222312224122251222612227122281222912230122311223212233122341223512236122371223812239122401224112242122431224412245122461224712248122491225012251122521225312254122551225612257122581225912260122611226212263122641226512266122671226812269122701227112272122731227412275122761227712278122791228012281122821228312284122851228612287122881228912290122911229212293122941229512296122971229812299123001230112302123031230412305123061230712308123091231012311123121231312314123151231612317123181231912320123211232212323123241232512326123271232812329123301233112332123331233412335123361233712338123391234012341123421234312344123451234612347123481234912350123511235212353123541235512356123571235812359123601236112362123631236412365123661236712368123691237012371123721237312374123751237612377123781237912380123811238212383123841238512386123871238812389123901239112392123931239412395123961239712398123991240012401124021240312404124051240612407124081240912410124111241212413124141241512416124171241812419124201242112422124231242412425124261242712428124291243012431124321243312434124351243612437124381243912440124411244212443124441244512446124471244812449124501245112452124531245412455124561245712458124591246012461124621246312464124651246612467124681246912470124711247212473124741247512476124771247812479124801248112482124831248412485124861248712488124891249012491124921249312494124951249612497124981249912500125011250212503125041250512506125071250812509125101251112512125131251412515125161251712518125191252012521125221252312524125251252612527125281252912530125311253212533125341253512536125371253812539125401254112542125431254412545125461254712548125491255012551125521255312554125551255612557125581255912560125611256212563125641256512566125671256812569125701257112572125731257412575125761257712578125791258012581125821258312584125851258612587125881258912590125911259212593125941259512596125971259812599126001260112602126031260412605126061260712608126091261012611126121261312614126151261612617126181261912620126211262212623126241262512626126271262812629126301263112632126331263412635126361263712638126391264012641126421264312644126451264612647126481264912650126511265212653126541265512656126571265812659126601266112662126631266412665126661266712668126691267012671126721267312674126751267612677126781267912680126811268212683126841268512686126871268812689126901269112692126931269412695126961269712698126991270012701127021270312704127051270612707127081270912710127111271212713127141271512716127171271812719127201272112722127231272412725127261272712728127291273012731127321273312734127351273612737127381273912740127411274212743127441274512746127471274812749127501275112752127531275412755127561275712758127591276012761127621276312764127651276612767127681276912770127711277212773127741277512776127771277812779127801278112782127831278412785127861278712788127891279012791127921279312794127951279612797127981279912800128011280212803128041280512806128071280812809128101281112812128131281412815128161281712818128191282012821128221282312824128251282612827128281282912830128311283212833128341283512836128371283812839128401284112842128431284412845128461284712848128491285012851128521285312854128551285612857128581285912860128611286212863128641286512866128671286812869128701287112872128731287412875128761287712878128791288012881128821288312884128851288612887128881288912890128911289212893128941289512896128971289812899129001290112902129031290412905129061290712908129091291012911129121291312914129151291612917129181291912920129211292212923129241292512926129271292812929129301293112932129331293412935129361293712938129391294012941
  1. /*
  2. * Testsuite for eBPF verifier
  3. *
  4. * Copyright (c) 2014 PLUMgrid, http://plumgrid.com
  5. * Copyright (c) 2017 Facebook
  6. *
  7. * This program is free software; you can redistribute it and/or
  8. * modify it under the terms of version 2 of the GNU General Public
  9. * License as published by the Free Software Foundation.
  10. */
  11. #include <endian.h>
  12. #include <asm/types.h>
  13. #include <linux/types.h>
  14. #include <stdint.h>
  15. #include <stdio.h>
  16. #include <stdlib.h>
  17. #include <unistd.h>
  18. #include <errno.h>
  19. #include <string.h>
  20. #include <stddef.h>
  21. #include <stdbool.h>
  22. #include <sched.h>
  23. #include <limits.h>
  24. #include <sys/capability.h>
  25. #include <linux/unistd.h>
  26. #include <linux/filter.h>
  27. #include <linux/bpf_perf_event.h>
  28. #include <linux/bpf.h>
  29. #include <linux/if_ether.h>
  30. #include <bpf/bpf.h>
  31. #ifdef HAVE_GENHDR
  32. # include "autoconf.h"
  33. #else
  34. # if defined(__i386) || defined(__x86_64) || defined(__s390x__) || defined(__aarch64__)
  35. # define CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS 1
  36. # endif
  37. #endif
  38. #include "bpf_rlimit.h"
  39. #include "bpf_rand.h"
  40. #include "bpf_util.h"
  41. #include "../../../include/linux/filter.h"
  42. #define MAX_INSNS BPF_MAXINSNS
  43. #define MAX_FIXUPS 8
  44. #define MAX_NR_MAPS 8
  45. #define POINTER_VALUE 0xcafe4all
  46. #define TEST_DATA_LEN 64
  47. #define F_NEEDS_EFFICIENT_UNALIGNED_ACCESS (1 << 0)
  48. #define F_LOAD_WITH_STRICT_ALIGNMENT (1 << 1)
  49. #define UNPRIV_SYSCTL "kernel/unprivileged_bpf_disabled"
  50. static bool unpriv_disabled = false;
  51. struct bpf_test {
  52. const char *descr;
  53. struct bpf_insn insns[MAX_INSNS];
  54. int fixup_map1[MAX_FIXUPS];
  55. int fixup_map2[MAX_FIXUPS];
  56. int fixup_map3[MAX_FIXUPS];
  57. int fixup_map4[MAX_FIXUPS];
  58. int fixup_prog1[MAX_FIXUPS];
  59. int fixup_prog2[MAX_FIXUPS];
  60. int fixup_map_in_map[MAX_FIXUPS];
  61. int fixup_cgroup_storage[MAX_FIXUPS];
  62. const char *errstr;
  63. const char *errstr_unpriv;
  64. uint32_t retval;
  65. enum {
  66. UNDEF,
  67. ACCEPT,
  68. REJECT
  69. } result, result_unpriv;
  70. enum bpf_prog_type prog_type;
  71. uint8_t flags;
  72. __u8 data[TEST_DATA_LEN];
  73. void (*fill_helper)(struct bpf_test *self);
  74. };
  75. /* Note we want this to be 64 bit aligned so that the end of our array is
  76. * actually the end of the structure.
  77. */
  78. #define MAX_ENTRIES 11
  79. struct test_val {
  80. unsigned int index;
  81. int foo[MAX_ENTRIES];
  82. };
  83. struct other_val {
  84. long long foo;
  85. long long bar;
  86. };
  87. static void bpf_fill_ld_abs_vlan_push_pop(struct bpf_test *self)
  88. {
  89. /* test: {skb->data[0], vlan_push} x 68 + {skb->data[0], vlan_pop} x 68 */
  90. #define PUSH_CNT 51
  91. unsigned int len = BPF_MAXINSNS;
  92. struct bpf_insn *insn = self->insns;
  93. int i = 0, j, k = 0;
  94. insn[i++] = BPF_MOV64_REG(BPF_REG_6, BPF_REG_1);
  95. loop:
  96. for (j = 0; j < PUSH_CNT; j++) {
  97. insn[i++] = BPF_LD_ABS(BPF_B, 0);
  98. insn[i] = BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0x34, len - i - 2);
  99. i++;
  100. insn[i++] = BPF_MOV64_REG(BPF_REG_1, BPF_REG_6);
  101. insn[i++] = BPF_MOV64_IMM(BPF_REG_2, 1);
  102. insn[i++] = BPF_MOV64_IMM(BPF_REG_3, 2);
  103. insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  104. BPF_FUNC_skb_vlan_push),
  105. insn[i] = BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, len - i - 2);
  106. i++;
  107. }
  108. for (j = 0; j < PUSH_CNT; j++) {
  109. insn[i++] = BPF_LD_ABS(BPF_B, 0);
  110. insn[i] = BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0x34, len - i - 2);
  111. i++;
  112. insn[i++] = BPF_MOV64_REG(BPF_REG_1, BPF_REG_6);
  113. insn[i++] = BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  114. BPF_FUNC_skb_vlan_pop),
  115. insn[i] = BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, len - i - 2);
  116. i++;
  117. }
  118. if (++k < 5)
  119. goto loop;
  120. for (; i < len - 1; i++)
  121. insn[i] = BPF_ALU32_IMM(BPF_MOV, BPF_REG_0, 0xbef);
  122. insn[len - 1] = BPF_EXIT_INSN();
  123. }
  124. static void bpf_fill_jump_around_ld_abs(struct bpf_test *self)
  125. {
  126. struct bpf_insn *insn = self->insns;
  127. unsigned int len = BPF_MAXINSNS;
  128. int i = 0;
  129. insn[i++] = BPF_MOV64_REG(BPF_REG_6, BPF_REG_1);
  130. insn[i++] = BPF_LD_ABS(BPF_B, 0);
  131. insn[i] = BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 10, len - i - 2);
  132. i++;
  133. while (i < len - 1)
  134. insn[i++] = BPF_LD_ABS(BPF_B, 1);
  135. insn[i] = BPF_EXIT_INSN();
  136. }
  137. static void bpf_fill_rand_ld_dw(struct bpf_test *self)
  138. {
  139. struct bpf_insn *insn = self->insns;
  140. uint64_t res = 0;
  141. int i = 0;
  142. insn[i++] = BPF_MOV32_IMM(BPF_REG_0, 0);
  143. while (i < self->retval) {
  144. uint64_t val = bpf_semi_rand_get();
  145. struct bpf_insn tmp[2] = { BPF_LD_IMM64(BPF_REG_1, val) };
  146. res ^= val;
  147. insn[i++] = tmp[0];
  148. insn[i++] = tmp[1];
  149. insn[i++] = BPF_ALU64_REG(BPF_XOR, BPF_REG_0, BPF_REG_1);
  150. }
  151. insn[i++] = BPF_MOV64_REG(BPF_REG_1, BPF_REG_0);
  152. insn[i++] = BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 32);
  153. insn[i++] = BPF_ALU64_REG(BPF_XOR, BPF_REG_0, BPF_REG_1);
  154. insn[i] = BPF_EXIT_INSN();
  155. res ^= (res >> 32);
  156. self->retval = (uint32_t)res;
  157. }
  158. static struct bpf_test tests[] = {
  159. {
  160. "add+sub+mul",
  161. .insns = {
  162. BPF_MOV64_IMM(BPF_REG_1, 1),
  163. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 2),
  164. BPF_MOV64_IMM(BPF_REG_2, 3),
  165. BPF_ALU64_REG(BPF_SUB, BPF_REG_1, BPF_REG_2),
  166. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -1),
  167. BPF_ALU64_IMM(BPF_MUL, BPF_REG_1, 3),
  168. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  169. BPF_EXIT_INSN(),
  170. },
  171. .result = ACCEPT,
  172. .retval = -3,
  173. },
  174. {
  175. "DIV32 by 0, zero check 1",
  176. .insns = {
  177. BPF_MOV32_IMM(BPF_REG_0, 42),
  178. BPF_MOV32_IMM(BPF_REG_1, 0),
  179. BPF_MOV32_IMM(BPF_REG_2, 1),
  180. BPF_ALU32_REG(BPF_DIV, BPF_REG_2, BPF_REG_1),
  181. BPF_EXIT_INSN(),
  182. },
  183. .result = ACCEPT,
  184. .retval = 42,
  185. },
  186. {
  187. "DIV32 by 0, zero check 2",
  188. .insns = {
  189. BPF_MOV32_IMM(BPF_REG_0, 42),
  190. BPF_LD_IMM64(BPF_REG_1, 0xffffffff00000000LL),
  191. BPF_MOV32_IMM(BPF_REG_2, 1),
  192. BPF_ALU32_REG(BPF_DIV, BPF_REG_2, BPF_REG_1),
  193. BPF_EXIT_INSN(),
  194. },
  195. .result = ACCEPT,
  196. .retval = 42,
  197. },
  198. {
  199. "DIV64 by 0, zero check",
  200. .insns = {
  201. BPF_MOV32_IMM(BPF_REG_0, 42),
  202. BPF_MOV32_IMM(BPF_REG_1, 0),
  203. BPF_MOV32_IMM(BPF_REG_2, 1),
  204. BPF_ALU64_REG(BPF_DIV, BPF_REG_2, BPF_REG_1),
  205. BPF_EXIT_INSN(),
  206. },
  207. .result = ACCEPT,
  208. .retval = 42,
  209. },
  210. {
  211. "MOD32 by 0, zero check 1",
  212. .insns = {
  213. BPF_MOV32_IMM(BPF_REG_0, 42),
  214. BPF_MOV32_IMM(BPF_REG_1, 0),
  215. BPF_MOV32_IMM(BPF_REG_2, 1),
  216. BPF_ALU32_REG(BPF_MOD, BPF_REG_2, BPF_REG_1),
  217. BPF_EXIT_INSN(),
  218. },
  219. .result = ACCEPT,
  220. .retval = 42,
  221. },
  222. {
  223. "MOD32 by 0, zero check 2",
  224. .insns = {
  225. BPF_MOV32_IMM(BPF_REG_0, 42),
  226. BPF_LD_IMM64(BPF_REG_1, 0xffffffff00000000LL),
  227. BPF_MOV32_IMM(BPF_REG_2, 1),
  228. BPF_ALU32_REG(BPF_MOD, BPF_REG_2, BPF_REG_1),
  229. BPF_EXIT_INSN(),
  230. },
  231. .result = ACCEPT,
  232. .retval = 42,
  233. },
  234. {
  235. "MOD64 by 0, zero check",
  236. .insns = {
  237. BPF_MOV32_IMM(BPF_REG_0, 42),
  238. BPF_MOV32_IMM(BPF_REG_1, 0),
  239. BPF_MOV32_IMM(BPF_REG_2, 1),
  240. BPF_ALU64_REG(BPF_MOD, BPF_REG_2, BPF_REG_1),
  241. BPF_EXIT_INSN(),
  242. },
  243. .result = ACCEPT,
  244. .retval = 42,
  245. },
  246. {
  247. "DIV32 by 0, zero check ok, cls",
  248. .insns = {
  249. BPF_MOV32_IMM(BPF_REG_0, 42),
  250. BPF_MOV32_IMM(BPF_REG_1, 2),
  251. BPF_MOV32_IMM(BPF_REG_2, 16),
  252. BPF_ALU32_REG(BPF_DIV, BPF_REG_2, BPF_REG_1),
  253. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  254. BPF_EXIT_INSN(),
  255. },
  256. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  257. .result = ACCEPT,
  258. .retval = 8,
  259. },
  260. {
  261. "DIV32 by 0, zero check 1, cls",
  262. .insns = {
  263. BPF_MOV32_IMM(BPF_REG_1, 0),
  264. BPF_MOV32_IMM(BPF_REG_0, 1),
  265. BPF_ALU32_REG(BPF_DIV, BPF_REG_0, BPF_REG_1),
  266. BPF_EXIT_INSN(),
  267. },
  268. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  269. .result = ACCEPT,
  270. .retval = 0,
  271. },
  272. {
  273. "DIV32 by 0, zero check 2, cls",
  274. .insns = {
  275. BPF_LD_IMM64(BPF_REG_1, 0xffffffff00000000LL),
  276. BPF_MOV32_IMM(BPF_REG_0, 1),
  277. BPF_ALU32_REG(BPF_DIV, BPF_REG_0, BPF_REG_1),
  278. BPF_EXIT_INSN(),
  279. },
  280. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  281. .result = ACCEPT,
  282. .retval = 0,
  283. },
  284. {
  285. "DIV64 by 0, zero check, cls",
  286. .insns = {
  287. BPF_MOV32_IMM(BPF_REG_1, 0),
  288. BPF_MOV32_IMM(BPF_REG_0, 1),
  289. BPF_ALU64_REG(BPF_DIV, BPF_REG_0, BPF_REG_1),
  290. BPF_EXIT_INSN(),
  291. },
  292. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  293. .result = ACCEPT,
  294. .retval = 0,
  295. },
  296. {
  297. "MOD32 by 0, zero check ok, cls",
  298. .insns = {
  299. BPF_MOV32_IMM(BPF_REG_0, 42),
  300. BPF_MOV32_IMM(BPF_REG_1, 3),
  301. BPF_MOV32_IMM(BPF_REG_2, 5),
  302. BPF_ALU32_REG(BPF_MOD, BPF_REG_2, BPF_REG_1),
  303. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  304. BPF_EXIT_INSN(),
  305. },
  306. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  307. .result = ACCEPT,
  308. .retval = 2,
  309. },
  310. {
  311. "MOD32 by 0, zero check 1, cls",
  312. .insns = {
  313. BPF_MOV32_IMM(BPF_REG_1, 0),
  314. BPF_MOV32_IMM(BPF_REG_0, 1),
  315. BPF_ALU32_REG(BPF_MOD, BPF_REG_0, BPF_REG_1),
  316. BPF_EXIT_INSN(),
  317. },
  318. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  319. .result = ACCEPT,
  320. .retval = 1,
  321. },
  322. {
  323. "MOD32 by 0, zero check 2, cls",
  324. .insns = {
  325. BPF_LD_IMM64(BPF_REG_1, 0xffffffff00000000LL),
  326. BPF_MOV32_IMM(BPF_REG_0, 1),
  327. BPF_ALU32_REG(BPF_MOD, BPF_REG_0, BPF_REG_1),
  328. BPF_EXIT_INSN(),
  329. },
  330. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  331. .result = ACCEPT,
  332. .retval = 1,
  333. },
  334. {
  335. "MOD64 by 0, zero check 1, cls",
  336. .insns = {
  337. BPF_MOV32_IMM(BPF_REG_1, 0),
  338. BPF_MOV32_IMM(BPF_REG_0, 2),
  339. BPF_ALU64_REG(BPF_MOD, BPF_REG_0, BPF_REG_1),
  340. BPF_EXIT_INSN(),
  341. },
  342. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  343. .result = ACCEPT,
  344. .retval = 2,
  345. },
  346. {
  347. "MOD64 by 0, zero check 2, cls",
  348. .insns = {
  349. BPF_MOV32_IMM(BPF_REG_1, 0),
  350. BPF_MOV32_IMM(BPF_REG_0, -1),
  351. BPF_ALU64_REG(BPF_MOD, BPF_REG_0, BPF_REG_1),
  352. BPF_EXIT_INSN(),
  353. },
  354. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  355. .result = ACCEPT,
  356. .retval = -1,
  357. },
  358. /* Just make sure that JITs used udiv/umod as otherwise we get
  359. * an exception from INT_MIN/-1 overflow similarly as with div
  360. * by zero.
  361. */
  362. {
  363. "DIV32 overflow, check 1",
  364. .insns = {
  365. BPF_MOV32_IMM(BPF_REG_1, -1),
  366. BPF_MOV32_IMM(BPF_REG_0, INT_MIN),
  367. BPF_ALU32_REG(BPF_DIV, BPF_REG_0, BPF_REG_1),
  368. BPF_EXIT_INSN(),
  369. },
  370. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  371. .result = ACCEPT,
  372. .retval = 0,
  373. },
  374. {
  375. "DIV32 overflow, check 2",
  376. .insns = {
  377. BPF_MOV32_IMM(BPF_REG_0, INT_MIN),
  378. BPF_ALU32_IMM(BPF_DIV, BPF_REG_0, -1),
  379. BPF_EXIT_INSN(),
  380. },
  381. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  382. .result = ACCEPT,
  383. .retval = 0,
  384. },
  385. {
  386. "DIV64 overflow, check 1",
  387. .insns = {
  388. BPF_MOV64_IMM(BPF_REG_1, -1),
  389. BPF_LD_IMM64(BPF_REG_0, LLONG_MIN),
  390. BPF_ALU64_REG(BPF_DIV, BPF_REG_0, BPF_REG_1),
  391. BPF_EXIT_INSN(),
  392. },
  393. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  394. .result = ACCEPT,
  395. .retval = 0,
  396. },
  397. {
  398. "DIV64 overflow, check 2",
  399. .insns = {
  400. BPF_LD_IMM64(BPF_REG_0, LLONG_MIN),
  401. BPF_ALU64_IMM(BPF_DIV, BPF_REG_0, -1),
  402. BPF_EXIT_INSN(),
  403. },
  404. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  405. .result = ACCEPT,
  406. .retval = 0,
  407. },
  408. {
  409. "MOD32 overflow, check 1",
  410. .insns = {
  411. BPF_MOV32_IMM(BPF_REG_1, -1),
  412. BPF_MOV32_IMM(BPF_REG_0, INT_MIN),
  413. BPF_ALU32_REG(BPF_MOD, BPF_REG_0, BPF_REG_1),
  414. BPF_EXIT_INSN(),
  415. },
  416. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  417. .result = ACCEPT,
  418. .retval = INT_MIN,
  419. },
  420. {
  421. "MOD32 overflow, check 2",
  422. .insns = {
  423. BPF_MOV32_IMM(BPF_REG_0, INT_MIN),
  424. BPF_ALU32_IMM(BPF_MOD, BPF_REG_0, -1),
  425. BPF_EXIT_INSN(),
  426. },
  427. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  428. .result = ACCEPT,
  429. .retval = INT_MIN,
  430. },
  431. {
  432. "MOD64 overflow, check 1",
  433. .insns = {
  434. BPF_MOV64_IMM(BPF_REG_1, -1),
  435. BPF_LD_IMM64(BPF_REG_2, LLONG_MIN),
  436. BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
  437. BPF_ALU64_REG(BPF_MOD, BPF_REG_2, BPF_REG_1),
  438. BPF_MOV32_IMM(BPF_REG_0, 0),
  439. BPF_JMP_REG(BPF_JNE, BPF_REG_3, BPF_REG_2, 1),
  440. BPF_MOV32_IMM(BPF_REG_0, 1),
  441. BPF_EXIT_INSN(),
  442. },
  443. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  444. .result = ACCEPT,
  445. .retval = 1,
  446. },
  447. {
  448. "MOD64 overflow, check 2",
  449. .insns = {
  450. BPF_LD_IMM64(BPF_REG_2, LLONG_MIN),
  451. BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
  452. BPF_ALU64_IMM(BPF_MOD, BPF_REG_2, -1),
  453. BPF_MOV32_IMM(BPF_REG_0, 0),
  454. BPF_JMP_REG(BPF_JNE, BPF_REG_3, BPF_REG_2, 1),
  455. BPF_MOV32_IMM(BPF_REG_0, 1),
  456. BPF_EXIT_INSN(),
  457. },
  458. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  459. .result = ACCEPT,
  460. .retval = 1,
  461. },
  462. {
  463. "xor32 zero extend check",
  464. .insns = {
  465. BPF_MOV32_IMM(BPF_REG_2, -1),
  466. BPF_ALU64_IMM(BPF_LSH, BPF_REG_2, 32),
  467. BPF_ALU64_IMM(BPF_OR, BPF_REG_2, 0xffff),
  468. BPF_ALU32_REG(BPF_XOR, BPF_REG_2, BPF_REG_2),
  469. BPF_MOV32_IMM(BPF_REG_0, 2),
  470. BPF_JMP_IMM(BPF_JNE, BPF_REG_2, 0, 1),
  471. BPF_MOV32_IMM(BPF_REG_0, 1),
  472. BPF_EXIT_INSN(),
  473. },
  474. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  475. .result = ACCEPT,
  476. .retval = 1,
  477. },
  478. {
  479. "empty prog",
  480. .insns = {
  481. },
  482. .errstr = "unknown opcode 00",
  483. .result = REJECT,
  484. },
  485. {
  486. "only exit insn",
  487. .insns = {
  488. BPF_EXIT_INSN(),
  489. },
  490. .errstr = "R0 !read_ok",
  491. .result = REJECT,
  492. },
  493. {
  494. "unreachable",
  495. .insns = {
  496. BPF_EXIT_INSN(),
  497. BPF_EXIT_INSN(),
  498. },
  499. .errstr = "unreachable",
  500. .result = REJECT,
  501. },
  502. {
  503. "unreachable2",
  504. .insns = {
  505. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  506. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  507. BPF_EXIT_INSN(),
  508. },
  509. .errstr = "unreachable",
  510. .result = REJECT,
  511. },
  512. {
  513. "out of range jump",
  514. .insns = {
  515. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  516. BPF_EXIT_INSN(),
  517. },
  518. .errstr = "jump out of range",
  519. .result = REJECT,
  520. },
  521. {
  522. "out of range jump2",
  523. .insns = {
  524. BPF_JMP_IMM(BPF_JA, 0, 0, -2),
  525. BPF_EXIT_INSN(),
  526. },
  527. .errstr = "jump out of range",
  528. .result = REJECT,
  529. },
  530. {
  531. "test1 ld_imm64",
  532. .insns = {
  533. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
  534. BPF_LD_IMM64(BPF_REG_0, 0),
  535. BPF_LD_IMM64(BPF_REG_0, 0),
  536. BPF_LD_IMM64(BPF_REG_0, 1),
  537. BPF_LD_IMM64(BPF_REG_0, 1),
  538. BPF_MOV64_IMM(BPF_REG_0, 2),
  539. BPF_EXIT_INSN(),
  540. },
  541. .errstr = "invalid BPF_LD_IMM insn",
  542. .errstr_unpriv = "R1 pointer comparison",
  543. .result = REJECT,
  544. },
  545. {
  546. "test2 ld_imm64",
  547. .insns = {
  548. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
  549. BPF_LD_IMM64(BPF_REG_0, 0),
  550. BPF_LD_IMM64(BPF_REG_0, 0),
  551. BPF_LD_IMM64(BPF_REG_0, 1),
  552. BPF_LD_IMM64(BPF_REG_0, 1),
  553. BPF_EXIT_INSN(),
  554. },
  555. .errstr = "invalid BPF_LD_IMM insn",
  556. .errstr_unpriv = "R1 pointer comparison",
  557. .result = REJECT,
  558. },
  559. {
  560. "test3 ld_imm64",
  561. .insns = {
  562. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
  563. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
  564. BPF_LD_IMM64(BPF_REG_0, 0),
  565. BPF_LD_IMM64(BPF_REG_0, 0),
  566. BPF_LD_IMM64(BPF_REG_0, 1),
  567. BPF_LD_IMM64(BPF_REG_0, 1),
  568. BPF_EXIT_INSN(),
  569. },
  570. .errstr = "invalid bpf_ld_imm64 insn",
  571. .result = REJECT,
  572. },
  573. {
  574. "test4 ld_imm64",
  575. .insns = {
  576. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
  577. BPF_EXIT_INSN(),
  578. },
  579. .errstr = "invalid bpf_ld_imm64 insn",
  580. .result = REJECT,
  581. },
  582. {
  583. "test5 ld_imm64",
  584. .insns = {
  585. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
  586. },
  587. .errstr = "invalid bpf_ld_imm64 insn",
  588. .result = REJECT,
  589. },
  590. {
  591. "test6 ld_imm64",
  592. .insns = {
  593. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
  594. BPF_RAW_INSN(0, 0, 0, 0, 0),
  595. BPF_EXIT_INSN(),
  596. },
  597. .result = ACCEPT,
  598. },
  599. {
  600. "test7 ld_imm64",
  601. .insns = {
  602. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 1),
  603. BPF_RAW_INSN(0, 0, 0, 0, 1),
  604. BPF_EXIT_INSN(),
  605. },
  606. .result = ACCEPT,
  607. .retval = 1,
  608. },
  609. {
  610. "test8 ld_imm64",
  611. .insns = {
  612. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 1, 1),
  613. BPF_RAW_INSN(0, 0, 0, 0, 1),
  614. BPF_EXIT_INSN(),
  615. },
  616. .errstr = "uses reserved fields",
  617. .result = REJECT,
  618. },
  619. {
  620. "test9 ld_imm64",
  621. .insns = {
  622. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 1),
  623. BPF_RAW_INSN(0, 0, 0, 1, 1),
  624. BPF_EXIT_INSN(),
  625. },
  626. .errstr = "invalid bpf_ld_imm64 insn",
  627. .result = REJECT,
  628. },
  629. {
  630. "test10 ld_imm64",
  631. .insns = {
  632. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 1),
  633. BPF_RAW_INSN(0, BPF_REG_1, 0, 0, 1),
  634. BPF_EXIT_INSN(),
  635. },
  636. .errstr = "invalid bpf_ld_imm64 insn",
  637. .result = REJECT,
  638. },
  639. {
  640. "test11 ld_imm64",
  641. .insns = {
  642. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 1),
  643. BPF_RAW_INSN(0, 0, BPF_REG_1, 0, 1),
  644. BPF_EXIT_INSN(),
  645. },
  646. .errstr = "invalid bpf_ld_imm64 insn",
  647. .result = REJECT,
  648. },
  649. {
  650. "test12 ld_imm64",
  651. .insns = {
  652. BPF_MOV64_IMM(BPF_REG_1, 0),
  653. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, BPF_REG_1, 0, 1),
  654. BPF_RAW_INSN(0, 0, 0, 0, 1),
  655. BPF_EXIT_INSN(),
  656. },
  657. .errstr = "not pointing to valid bpf_map",
  658. .result = REJECT,
  659. },
  660. {
  661. "test13 ld_imm64",
  662. .insns = {
  663. BPF_MOV64_IMM(BPF_REG_1, 0),
  664. BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, BPF_REG_1, 0, 1),
  665. BPF_RAW_INSN(0, 0, BPF_REG_1, 0, 1),
  666. BPF_EXIT_INSN(),
  667. },
  668. .errstr = "invalid bpf_ld_imm64 insn",
  669. .result = REJECT,
  670. },
  671. {
  672. "arsh32 on imm",
  673. .insns = {
  674. BPF_MOV64_IMM(BPF_REG_0, 1),
  675. BPF_ALU32_IMM(BPF_ARSH, BPF_REG_0, 5),
  676. BPF_EXIT_INSN(),
  677. },
  678. .result = REJECT,
  679. .errstr = "unknown opcode c4",
  680. },
  681. {
  682. "arsh32 on reg",
  683. .insns = {
  684. BPF_MOV64_IMM(BPF_REG_0, 1),
  685. BPF_MOV64_IMM(BPF_REG_1, 5),
  686. BPF_ALU32_REG(BPF_ARSH, BPF_REG_0, BPF_REG_1),
  687. BPF_EXIT_INSN(),
  688. },
  689. .result = REJECT,
  690. .errstr = "unknown opcode cc",
  691. },
  692. {
  693. "arsh64 on imm",
  694. .insns = {
  695. BPF_MOV64_IMM(BPF_REG_0, 1),
  696. BPF_ALU64_IMM(BPF_ARSH, BPF_REG_0, 5),
  697. BPF_EXIT_INSN(),
  698. },
  699. .result = ACCEPT,
  700. },
  701. {
  702. "arsh64 on reg",
  703. .insns = {
  704. BPF_MOV64_IMM(BPF_REG_0, 1),
  705. BPF_MOV64_IMM(BPF_REG_1, 5),
  706. BPF_ALU64_REG(BPF_ARSH, BPF_REG_0, BPF_REG_1),
  707. BPF_EXIT_INSN(),
  708. },
  709. .result = ACCEPT,
  710. },
  711. {
  712. "no bpf_exit",
  713. .insns = {
  714. BPF_ALU64_REG(BPF_MOV, BPF_REG_0, BPF_REG_2),
  715. },
  716. .errstr = "not an exit",
  717. .result = REJECT,
  718. },
  719. {
  720. "loop (back-edge)",
  721. .insns = {
  722. BPF_JMP_IMM(BPF_JA, 0, 0, -1),
  723. BPF_EXIT_INSN(),
  724. },
  725. .errstr = "back-edge",
  726. .result = REJECT,
  727. },
  728. {
  729. "loop2 (back-edge)",
  730. .insns = {
  731. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  732. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  733. BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
  734. BPF_JMP_IMM(BPF_JA, 0, 0, -4),
  735. BPF_EXIT_INSN(),
  736. },
  737. .errstr = "back-edge",
  738. .result = REJECT,
  739. },
  740. {
  741. "conditional loop",
  742. .insns = {
  743. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  744. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  745. BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
  746. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, -3),
  747. BPF_EXIT_INSN(),
  748. },
  749. .errstr = "back-edge",
  750. .result = REJECT,
  751. },
  752. {
  753. "read uninitialized register",
  754. .insns = {
  755. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  756. BPF_EXIT_INSN(),
  757. },
  758. .errstr = "R2 !read_ok",
  759. .result = REJECT,
  760. },
  761. {
  762. "read invalid register",
  763. .insns = {
  764. BPF_MOV64_REG(BPF_REG_0, -1),
  765. BPF_EXIT_INSN(),
  766. },
  767. .errstr = "R15 is invalid",
  768. .result = REJECT,
  769. },
  770. {
  771. "program doesn't init R0 before exit",
  772. .insns = {
  773. BPF_ALU64_REG(BPF_MOV, BPF_REG_2, BPF_REG_1),
  774. BPF_EXIT_INSN(),
  775. },
  776. .errstr = "R0 !read_ok",
  777. .result = REJECT,
  778. },
  779. {
  780. "program doesn't init R0 before exit in all branches",
  781. .insns = {
  782. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
  783. BPF_MOV64_IMM(BPF_REG_0, 1),
  784. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 2),
  785. BPF_EXIT_INSN(),
  786. },
  787. .errstr = "R0 !read_ok",
  788. .errstr_unpriv = "R1 pointer comparison",
  789. .result = REJECT,
  790. },
  791. {
  792. "stack out of bounds",
  793. .insns = {
  794. BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0),
  795. BPF_EXIT_INSN(),
  796. },
  797. .errstr = "invalid stack",
  798. .result = REJECT,
  799. },
  800. {
  801. "invalid call insn1",
  802. .insns = {
  803. BPF_RAW_INSN(BPF_JMP | BPF_CALL | BPF_X, 0, 0, 0, 0),
  804. BPF_EXIT_INSN(),
  805. },
  806. .errstr = "unknown opcode 8d",
  807. .result = REJECT,
  808. },
  809. {
  810. "invalid call insn2",
  811. .insns = {
  812. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 1, 0),
  813. BPF_EXIT_INSN(),
  814. },
  815. .errstr = "BPF_CALL uses reserved",
  816. .result = REJECT,
  817. },
  818. {
  819. "invalid function call",
  820. .insns = {
  821. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 1234567),
  822. BPF_EXIT_INSN(),
  823. },
  824. .errstr = "invalid func unknown#1234567",
  825. .result = REJECT,
  826. },
  827. {
  828. "uninitialized stack1",
  829. .insns = {
  830. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  831. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  832. BPF_LD_MAP_FD(BPF_REG_1, 0),
  833. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  834. BPF_FUNC_map_lookup_elem),
  835. BPF_EXIT_INSN(),
  836. },
  837. .fixup_map1 = { 2 },
  838. .errstr = "invalid indirect read from stack",
  839. .result = REJECT,
  840. },
  841. {
  842. "uninitialized stack2",
  843. .insns = {
  844. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  845. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -8),
  846. BPF_EXIT_INSN(),
  847. },
  848. .errstr = "invalid read from stack",
  849. .result = REJECT,
  850. },
  851. {
  852. "invalid fp arithmetic",
  853. /* If this gets ever changed, make sure JITs can deal with it. */
  854. .insns = {
  855. BPF_MOV64_IMM(BPF_REG_0, 0),
  856. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  857. BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 8),
  858. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
  859. BPF_EXIT_INSN(),
  860. },
  861. .errstr = "R1 subtraction from stack pointer",
  862. .result = REJECT,
  863. },
  864. {
  865. "non-invalid fp arithmetic",
  866. .insns = {
  867. BPF_MOV64_IMM(BPF_REG_0, 0),
  868. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  869. BPF_EXIT_INSN(),
  870. },
  871. .result = ACCEPT,
  872. },
  873. {
  874. "invalid argument register",
  875. .insns = {
  876. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  877. BPF_FUNC_get_cgroup_classid),
  878. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  879. BPF_FUNC_get_cgroup_classid),
  880. BPF_EXIT_INSN(),
  881. },
  882. .errstr = "R1 !read_ok",
  883. .result = REJECT,
  884. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  885. },
  886. {
  887. "non-invalid argument register",
  888. .insns = {
  889. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
  890. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  891. BPF_FUNC_get_cgroup_classid),
  892. BPF_ALU64_REG(BPF_MOV, BPF_REG_1, BPF_REG_6),
  893. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  894. BPF_FUNC_get_cgroup_classid),
  895. BPF_EXIT_INSN(),
  896. },
  897. .result = ACCEPT,
  898. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  899. },
  900. {
  901. "check valid spill/fill",
  902. .insns = {
  903. /* spill R1(ctx) into stack */
  904. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
  905. /* fill it back into R2 */
  906. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -8),
  907. /* should be able to access R0 = *(R2 + 8) */
  908. /* BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, 8), */
  909. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  910. BPF_EXIT_INSN(),
  911. },
  912. .errstr_unpriv = "R0 leaks addr",
  913. .result = ACCEPT,
  914. .result_unpriv = REJECT,
  915. .retval = POINTER_VALUE,
  916. },
  917. {
  918. "check valid spill/fill, skb mark",
  919. .insns = {
  920. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
  921. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, -8),
  922. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  923. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
  924. offsetof(struct __sk_buff, mark)),
  925. BPF_EXIT_INSN(),
  926. },
  927. .result = ACCEPT,
  928. .result_unpriv = ACCEPT,
  929. },
  930. {
  931. "check corrupted spill/fill",
  932. .insns = {
  933. /* spill R1(ctx) into stack */
  934. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
  935. /* mess up with R1 pointer on stack */
  936. BPF_ST_MEM(BPF_B, BPF_REG_10, -7, 0x23),
  937. /* fill back into R0 should fail */
  938. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  939. BPF_EXIT_INSN(),
  940. },
  941. .errstr_unpriv = "attempt to corrupt spilled",
  942. .errstr = "corrupted spill",
  943. .result = REJECT,
  944. },
  945. {
  946. "invalid src register in STX",
  947. .insns = {
  948. BPF_STX_MEM(BPF_B, BPF_REG_10, -1, -1),
  949. BPF_EXIT_INSN(),
  950. },
  951. .errstr = "R15 is invalid",
  952. .result = REJECT,
  953. },
  954. {
  955. "invalid dst register in STX",
  956. .insns = {
  957. BPF_STX_MEM(BPF_B, 14, BPF_REG_10, -1),
  958. BPF_EXIT_INSN(),
  959. },
  960. .errstr = "R14 is invalid",
  961. .result = REJECT,
  962. },
  963. {
  964. "invalid dst register in ST",
  965. .insns = {
  966. BPF_ST_MEM(BPF_B, 14, -1, -1),
  967. BPF_EXIT_INSN(),
  968. },
  969. .errstr = "R14 is invalid",
  970. .result = REJECT,
  971. },
  972. {
  973. "invalid src register in LDX",
  974. .insns = {
  975. BPF_LDX_MEM(BPF_B, BPF_REG_0, 12, 0),
  976. BPF_EXIT_INSN(),
  977. },
  978. .errstr = "R12 is invalid",
  979. .result = REJECT,
  980. },
  981. {
  982. "invalid dst register in LDX",
  983. .insns = {
  984. BPF_LDX_MEM(BPF_B, 11, BPF_REG_1, 0),
  985. BPF_EXIT_INSN(),
  986. },
  987. .errstr = "R11 is invalid",
  988. .result = REJECT,
  989. },
  990. {
  991. "junk insn",
  992. .insns = {
  993. BPF_RAW_INSN(0, 0, 0, 0, 0),
  994. BPF_EXIT_INSN(),
  995. },
  996. .errstr = "unknown opcode 00",
  997. .result = REJECT,
  998. },
  999. {
  1000. "junk insn2",
  1001. .insns = {
  1002. BPF_RAW_INSN(1, 0, 0, 0, 0),
  1003. BPF_EXIT_INSN(),
  1004. },
  1005. .errstr = "BPF_LDX uses reserved fields",
  1006. .result = REJECT,
  1007. },
  1008. {
  1009. "junk insn3",
  1010. .insns = {
  1011. BPF_RAW_INSN(-1, 0, 0, 0, 0),
  1012. BPF_EXIT_INSN(),
  1013. },
  1014. .errstr = "unknown opcode ff",
  1015. .result = REJECT,
  1016. },
  1017. {
  1018. "junk insn4",
  1019. .insns = {
  1020. BPF_RAW_INSN(-1, -1, -1, -1, -1),
  1021. BPF_EXIT_INSN(),
  1022. },
  1023. .errstr = "unknown opcode ff",
  1024. .result = REJECT,
  1025. },
  1026. {
  1027. "junk insn5",
  1028. .insns = {
  1029. BPF_RAW_INSN(0x7f, -1, -1, -1, -1),
  1030. BPF_EXIT_INSN(),
  1031. },
  1032. .errstr = "BPF_ALU uses reserved fields",
  1033. .result = REJECT,
  1034. },
  1035. {
  1036. "misaligned read from stack",
  1037. .insns = {
  1038. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1039. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -4),
  1040. BPF_EXIT_INSN(),
  1041. },
  1042. .errstr = "misaligned stack access",
  1043. .result = REJECT,
  1044. },
  1045. {
  1046. "invalid map_fd for function call",
  1047. .insns = {
  1048. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  1049. BPF_ALU64_REG(BPF_MOV, BPF_REG_2, BPF_REG_10),
  1050. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  1051. BPF_LD_MAP_FD(BPF_REG_1, 0),
  1052. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  1053. BPF_FUNC_map_delete_elem),
  1054. BPF_EXIT_INSN(),
  1055. },
  1056. .errstr = "fd 0 is not pointing to valid bpf_map",
  1057. .result = REJECT,
  1058. },
  1059. {
  1060. "don't check return value before access",
  1061. .insns = {
  1062. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  1063. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1064. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  1065. BPF_LD_MAP_FD(BPF_REG_1, 0),
  1066. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  1067. BPF_FUNC_map_lookup_elem),
  1068. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  1069. BPF_EXIT_INSN(),
  1070. },
  1071. .fixup_map1 = { 3 },
  1072. .errstr = "R0 invalid mem access 'map_value_or_null'",
  1073. .result = REJECT,
  1074. },
  1075. {
  1076. "access memory with incorrect alignment",
  1077. .insns = {
  1078. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  1079. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1080. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  1081. BPF_LD_MAP_FD(BPF_REG_1, 0),
  1082. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  1083. BPF_FUNC_map_lookup_elem),
  1084. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  1085. BPF_ST_MEM(BPF_DW, BPF_REG_0, 4, 0),
  1086. BPF_EXIT_INSN(),
  1087. },
  1088. .fixup_map1 = { 3 },
  1089. .errstr = "misaligned value access",
  1090. .result = REJECT,
  1091. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  1092. },
  1093. {
  1094. "sometimes access memory with incorrect alignment",
  1095. .insns = {
  1096. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  1097. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1098. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  1099. BPF_LD_MAP_FD(BPF_REG_1, 0),
  1100. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  1101. BPF_FUNC_map_lookup_elem),
  1102. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  1103. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  1104. BPF_EXIT_INSN(),
  1105. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 1),
  1106. BPF_EXIT_INSN(),
  1107. },
  1108. .fixup_map1 = { 3 },
  1109. .errstr = "R0 invalid mem access",
  1110. .errstr_unpriv = "R0 leaks addr",
  1111. .result = REJECT,
  1112. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  1113. },
  1114. {
  1115. "jump test 1",
  1116. .insns = {
  1117. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1118. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -8),
  1119. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
  1120. BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 0),
  1121. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 1),
  1122. BPF_ST_MEM(BPF_DW, BPF_REG_2, -16, 1),
  1123. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 2, 1),
  1124. BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 2),
  1125. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 3, 1),
  1126. BPF_ST_MEM(BPF_DW, BPF_REG_2, -16, 3),
  1127. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 4, 1),
  1128. BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 4),
  1129. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 5, 1),
  1130. BPF_ST_MEM(BPF_DW, BPF_REG_2, -32, 5),
  1131. BPF_MOV64_IMM(BPF_REG_0, 0),
  1132. BPF_EXIT_INSN(),
  1133. },
  1134. .errstr_unpriv = "R1 pointer comparison",
  1135. .result_unpriv = REJECT,
  1136. .result = ACCEPT,
  1137. },
  1138. {
  1139. "jump test 2",
  1140. .insns = {
  1141. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1142. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 2),
  1143. BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 0),
  1144. BPF_JMP_IMM(BPF_JA, 0, 0, 14),
  1145. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 2),
  1146. BPF_ST_MEM(BPF_DW, BPF_REG_2, -16, 0),
  1147. BPF_JMP_IMM(BPF_JA, 0, 0, 11),
  1148. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 2, 2),
  1149. BPF_ST_MEM(BPF_DW, BPF_REG_2, -32, 0),
  1150. BPF_JMP_IMM(BPF_JA, 0, 0, 8),
  1151. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 3, 2),
  1152. BPF_ST_MEM(BPF_DW, BPF_REG_2, -40, 0),
  1153. BPF_JMP_IMM(BPF_JA, 0, 0, 5),
  1154. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 4, 2),
  1155. BPF_ST_MEM(BPF_DW, BPF_REG_2, -48, 0),
  1156. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  1157. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 5, 1),
  1158. BPF_ST_MEM(BPF_DW, BPF_REG_2, -56, 0),
  1159. BPF_MOV64_IMM(BPF_REG_0, 0),
  1160. BPF_EXIT_INSN(),
  1161. },
  1162. .errstr_unpriv = "R1 pointer comparison",
  1163. .result_unpriv = REJECT,
  1164. .result = ACCEPT,
  1165. },
  1166. {
  1167. "jump test 3",
  1168. .insns = {
  1169. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1170. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 3),
  1171. BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 0),
  1172. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  1173. BPF_JMP_IMM(BPF_JA, 0, 0, 19),
  1174. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 3),
  1175. BPF_ST_MEM(BPF_DW, BPF_REG_2, -16, 0),
  1176. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  1177. BPF_JMP_IMM(BPF_JA, 0, 0, 15),
  1178. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 2, 3),
  1179. BPF_ST_MEM(BPF_DW, BPF_REG_2, -32, 0),
  1180. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -32),
  1181. BPF_JMP_IMM(BPF_JA, 0, 0, 11),
  1182. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 3, 3),
  1183. BPF_ST_MEM(BPF_DW, BPF_REG_2, -40, 0),
  1184. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -40),
  1185. BPF_JMP_IMM(BPF_JA, 0, 0, 7),
  1186. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 4, 3),
  1187. BPF_ST_MEM(BPF_DW, BPF_REG_2, -48, 0),
  1188. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -48),
  1189. BPF_JMP_IMM(BPF_JA, 0, 0, 3),
  1190. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 5, 0),
  1191. BPF_ST_MEM(BPF_DW, BPF_REG_2, -56, 0),
  1192. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -56),
  1193. BPF_LD_MAP_FD(BPF_REG_1, 0),
  1194. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  1195. BPF_FUNC_map_delete_elem),
  1196. BPF_EXIT_INSN(),
  1197. },
  1198. .fixup_map1 = { 24 },
  1199. .errstr_unpriv = "R1 pointer comparison",
  1200. .result_unpriv = REJECT,
  1201. .result = ACCEPT,
  1202. .retval = -ENOENT,
  1203. },
  1204. {
  1205. "jump test 4",
  1206. .insns = {
  1207. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1208. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1209. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1210. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1211. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1212. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1213. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1214. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1215. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1216. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1217. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1218. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1219. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1220. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1221. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1222. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1223. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1224. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1225. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1226. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1227. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1228. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1229. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1230. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1231. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1232. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1233. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1234. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1235. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1236. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1237. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1238. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1239. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
  1240. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
  1241. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
  1242. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
  1243. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
  1244. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
  1245. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
  1246. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
  1247. BPF_MOV64_IMM(BPF_REG_0, 0),
  1248. BPF_EXIT_INSN(),
  1249. },
  1250. .errstr_unpriv = "R1 pointer comparison",
  1251. .result_unpriv = REJECT,
  1252. .result = ACCEPT,
  1253. },
  1254. {
  1255. "jump test 5",
  1256. .insns = {
  1257. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1258. BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
  1259. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
  1260. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
  1261. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  1262. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
  1263. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  1264. BPF_MOV64_IMM(BPF_REG_0, 0),
  1265. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
  1266. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
  1267. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  1268. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
  1269. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  1270. BPF_MOV64_IMM(BPF_REG_0, 0),
  1271. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
  1272. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
  1273. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  1274. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
  1275. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  1276. BPF_MOV64_IMM(BPF_REG_0, 0),
  1277. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
  1278. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
  1279. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  1280. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
  1281. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  1282. BPF_MOV64_IMM(BPF_REG_0, 0),
  1283. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
  1284. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
  1285. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  1286. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
  1287. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  1288. BPF_MOV64_IMM(BPF_REG_0, 0),
  1289. BPF_EXIT_INSN(),
  1290. },
  1291. .errstr_unpriv = "R1 pointer comparison",
  1292. .result_unpriv = REJECT,
  1293. .result = ACCEPT,
  1294. },
  1295. {
  1296. "access skb fields ok",
  1297. .insns = {
  1298. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1299. offsetof(struct __sk_buff, len)),
  1300. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
  1301. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1302. offsetof(struct __sk_buff, mark)),
  1303. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
  1304. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1305. offsetof(struct __sk_buff, pkt_type)),
  1306. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
  1307. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1308. offsetof(struct __sk_buff, queue_mapping)),
  1309. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
  1310. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1311. offsetof(struct __sk_buff, protocol)),
  1312. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
  1313. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1314. offsetof(struct __sk_buff, vlan_present)),
  1315. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
  1316. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1317. offsetof(struct __sk_buff, vlan_tci)),
  1318. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
  1319. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1320. offsetof(struct __sk_buff, napi_id)),
  1321. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
  1322. BPF_EXIT_INSN(),
  1323. },
  1324. .result = ACCEPT,
  1325. },
  1326. {
  1327. "access skb fields bad1",
  1328. .insns = {
  1329. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -4),
  1330. BPF_EXIT_INSN(),
  1331. },
  1332. .errstr = "invalid bpf_context access",
  1333. .result = REJECT,
  1334. },
  1335. {
  1336. "access skb fields bad2",
  1337. .insns = {
  1338. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 9),
  1339. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  1340. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1341. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  1342. BPF_LD_MAP_FD(BPF_REG_1, 0),
  1343. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  1344. BPF_FUNC_map_lookup_elem),
  1345. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  1346. BPF_EXIT_INSN(),
  1347. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  1348. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1349. offsetof(struct __sk_buff, pkt_type)),
  1350. BPF_EXIT_INSN(),
  1351. },
  1352. .fixup_map1 = { 4 },
  1353. .errstr = "different pointers",
  1354. .errstr_unpriv = "R1 pointer comparison",
  1355. .result = REJECT,
  1356. },
  1357. {
  1358. "access skb fields bad3",
  1359. .insns = {
  1360. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
  1361. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1362. offsetof(struct __sk_buff, pkt_type)),
  1363. BPF_EXIT_INSN(),
  1364. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  1365. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1366. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  1367. BPF_LD_MAP_FD(BPF_REG_1, 0),
  1368. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  1369. BPF_FUNC_map_lookup_elem),
  1370. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  1371. BPF_EXIT_INSN(),
  1372. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  1373. BPF_JMP_IMM(BPF_JA, 0, 0, -12),
  1374. },
  1375. .fixup_map1 = { 6 },
  1376. .errstr = "different pointers",
  1377. .errstr_unpriv = "R1 pointer comparison",
  1378. .result = REJECT,
  1379. },
  1380. {
  1381. "access skb fields bad4",
  1382. .insns = {
  1383. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 3),
  1384. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  1385. offsetof(struct __sk_buff, len)),
  1386. BPF_MOV64_IMM(BPF_REG_0, 0),
  1387. BPF_EXIT_INSN(),
  1388. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  1389. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  1390. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  1391. BPF_LD_MAP_FD(BPF_REG_1, 0),
  1392. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  1393. BPF_FUNC_map_lookup_elem),
  1394. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  1395. BPF_EXIT_INSN(),
  1396. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  1397. BPF_JMP_IMM(BPF_JA, 0, 0, -13),
  1398. },
  1399. .fixup_map1 = { 7 },
  1400. .errstr = "different pointers",
  1401. .errstr_unpriv = "R1 pointer comparison",
  1402. .result = REJECT,
  1403. },
  1404. {
  1405. "invalid access __sk_buff family",
  1406. .insns = {
  1407. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1408. offsetof(struct __sk_buff, family)),
  1409. BPF_EXIT_INSN(),
  1410. },
  1411. .errstr = "invalid bpf_context access",
  1412. .result = REJECT,
  1413. },
  1414. {
  1415. "invalid access __sk_buff remote_ip4",
  1416. .insns = {
  1417. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1418. offsetof(struct __sk_buff, remote_ip4)),
  1419. BPF_EXIT_INSN(),
  1420. },
  1421. .errstr = "invalid bpf_context access",
  1422. .result = REJECT,
  1423. },
  1424. {
  1425. "invalid access __sk_buff local_ip4",
  1426. .insns = {
  1427. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1428. offsetof(struct __sk_buff, local_ip4)),
  1429. BPF_EXIT_INSN(),
  1430. },
  1431. .errstr = "invalid bpf_context access",
  1432. .result = REJECT,
  1433. },
  1434. {
  1435. "invalid access __sk_buff remote_ip6",
  1436. .insns = {
  1437. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1438. offsetof(struct __sk_buff, remote_ip6)),
  1439. BPF_EXIT_INSN(),
  1440. },
  1441. .errstr = "invalid bpf_context access",
  1442. .result = REJECT,
  1443. },
  1444. {
  1445. "invalid access __sk_buff local_ip6",
  1446. .insns = {
  1447. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1448. offsetof(struct __sk_buff, local_ip6)),
  1449. BPF_EXIT_INSN(),
  1450. },
  1451. .errstr = "invalid bpf_context access",
  1452. .result = REJECT,
  1453. },
  1454. {
  1455. "invalid access __sk_buff remote_port",
  1456. .insns = {
  1457. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1458. offsetof(struct __sk_buff, remote_port)),
  1459. BPF_EXIT_INSN(),
  1460. },
  1461. .errstr = "invalid bpf_context access",
  1462. .result = REJECT,
  1463. },
  1464. {
  1465. "invalid access __sk_buff remote_port",
  1466. .insns = {
  1467. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1468. offsetof(struct __sk_buff, local_port)),
  1469. BPF_EXIT_INSN(),
  1470. },
  1471. .errstr = "invalid bpf_context access",
  1472. .result = REJECT,
  1473. },
  1474. {
  1475. "valid access __sk_buff family",
  1476. .insns = {
  1477. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1478. offsetof(struct __sk_buff, family)),
  1479. BPF_EXIT_INSN(),
  1480. },
  1481. .result = ACCEPT,
  1482. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1483. },
  1484. {
  1485. "valid access __sk_buff remote_ip4",
  1486. .insns = {
  1487. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1488. offsetof(struct __sk_buff, remote_ip4)),
  1489. BPF_EXIT_INSN(),
  1490. },
  1491. .result = ACCEPT,
  1492. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1493. },
  1494. {
  1495. "valid access __sk_buff local_ip4",
  1496. .insns = {
  1497. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1498. offsetof(struct __sk_buff, local_ip4)),
  1499. BPF_EXIT_INSN(),
  1500. },
  1501. .result = ACCEPT,
  1502. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1503. },
  1504. {
  1505. "valid access __sk_buff remote_ip6",
  1506. .insns = {
  1507. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1508. offsetof(struct __sk_buff, remote_ip6[0])),
  1509. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1510. offsetof(struct __sk_buff, remote_ip6[1])),
  1511. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1512. offsetof(struct __sk_buff, remote_ip6[2])),
  1513. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1514. offsetof(struct __sk_buff, remote_ip6[3])),
  1515. BPF_EXIT_INSN(),
  1516. },
  1517. .result = ACCEPT,
  1518. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1519. },
  1520. {
  1521. "valid access __sk_buff local_ip6",
  1522. .insns = {
  1523. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1524. offsetof(struct __sk_buff, local_ip6[0])),
  1525. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1526. offsetof(struct __sk_buff, local_ip6[1])),
  1527. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1528. offsetof(struct __sk_buff, local_ip6[2])),
  1529. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1530. offsetof(struct __sk_buff, local_ip6[3])),
  1531. BPF_EXIT_INSN(),
  1532. },
  1533. .result = ACCEPT,
  1534. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1535. },
  1536. {
  1537. "valid access __sk_buff remote_port",
  1538. .insns = {
  1539. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1540. offsetof(struct __sk_buff, remote_port)),
  1541. BPF_EXIT_INSN(),
  1542. },
  1543. .result = ACCEPT,
  1544. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1545. },
  1546. {
  1547. "valid access __sk_buff remote_port",
  1548. .insns = {
  1549. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1550. offsetof(struct __sk_buff, local_port)),
  1551. BPF_EXIT_INSN(),
  1552. },
  1553. .result = ACCEPT,
  1554. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1555. },
  1556. {
  1557. "invalid access of tc_classid for SK_SKB",
  1558. .insns = {
  1559. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1560. offsetof(struct __sk_buff, tc_classid)),
  1561. BPF_EXIT_INSN(),
  1562. },
  1563. .result = REJECT,
  1564. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1565. .errstr = "invalid bpf_context access",
  1566. },
  1567. {
  1568. "invalid access of skb->mark for SK_SKB",
  1569. .insns = {
  1570. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1571. offsetof(struct __sk_buff, mark)),
  1572. BPF_EXIT_INSN(),
  1573. },
  1574. .result = REJECT,
  1575. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1576. .errstr = "invalid bpf_context access",
  1577. },
  1578. {
  1579. "check skb->mark is not writeable by SK_SKB",
  1580. .insns = {
  1581. BPF_MOV64_IMM(BPF_REG_0, 0),
  1582. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  1583. offsetof(struct __sk_buff, mark)),
  1584. BPF_EXIT_INSN(),
  1585. },
  1586. .result = REJECT,
  1587. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1588. .errstr = "invalid bpf_context access",
  1589. },
  1590. {
  1591. "check skb->tc_index is writeable by SK_SKB",
  1592. .insns = {
  1593. BPF_MOV64_IMM(BPF_REG_0, 0),
  1594. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  1595. offsetof(struct __sk_buff, tc_index)),
  1596. BPF_EXIT_INSN(),
  1597. },
  1598. .result = ACCEPT,
  1599. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1600. },
  1601. {
  1602. "check skb->priority is writeable by SK_SKB",
  1603. .insns = {
  1604. BPF_MOV64_IMM(BPF_REG_0, 0),
  1605. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  1606. offsetof(struct __sk_buff, priority)),
  1607. BPF_EXIT_INSN(),
  1608. },
  1609. .result = ACCEPT,
  1610. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1611. },
  1612. {
  1613. "direct packet read for SK_SKB",
  1614. .insns = {
  1615. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  1616. offsetof(struct __sk_buff, data)),
  1617. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  1618. offsetof(struct __sk_buff, data_end)),
  1619. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  1620. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  1621. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  1622. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  1623. BPF_MOV64_IMM(BPF_REG_0, 0),
  1624. BPF_EXIT_INSN(),
  1625. },
  1626. .result = ACCEPT,
  1627. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1628. },
  1629. {
  1630. "direct packet write for SK_SKB",
  1631. .insns = {
  1632. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  1633. offsetof(struct __sk_buff, data)),
  1634. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  1635. offsetof(struct __sk_buff, data_end)),
  1636. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  1637. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  1638. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  1639. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  1640. BPF_MOV64_IMM(BPF_REG_0, 0),
  1641. BPF_EXIT_INSN(),
  1642. },
  1643. .result = ACCEPT,
  1644. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1645. },
  1646. {
  1647. "overlapping checks for direct packet access SK_SKB",
  1648. .insns = {
  1649. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  1650. offsetof(struct __sk_buff, data)),
  1651. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  1652. offsetof(struct __sk_buff, data_end)),
  1653. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  1654. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  1655. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 4),
  1656. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  1657. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 6),
  1658. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  1659. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_2, 6),
  1660. BPF_MOV64_IMM(BPF_REG_0, 0),
  1661. BPF_EXIT_INSN(),
  1662. },
  1663. .result = ACCEPT,
  1664. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1665. },
  1666. {
  1667. "valid access family in SK_MSG",
  1668. .insns = {
  1669. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1670. offsetof(struct sk_msg_md, family)),
  1671. BPF_EXIT_INSN(),
  1672. },
  1673. .result = ACCEPT,
  1674. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1675. },
  1676. {
  1677. "valid access remote_ip4 in SK_MSG",
  1678. .insns = {
  1679. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1680. offsetof(struct sk_msg_md, remote_ip4)),
  1681. BPF_EXIT_INSN(),
  1682. },
  1683. .result = ACCEPT,
  1684. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1685. },
  1686. {
  1687. "valid access local_ip4 in SK_MSG",
  1688. .insns = {
  1689. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1690. offsetof(struct sk_msg_md, local_ip4)),
  1691. BPF_EXIT_INSN(),
  1692. },
  1693. .result = ACCEPT,
  1694. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1695. },
  1696. {
  1697. "valid access remote_port in SK_MSG",
  1698. .insns = {
  1699. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1700. offsetof(struct sk_msg_md, remote_port)),
  1701. BPF_EXIT_INSN(),
  1702. },
  1703. .result = ACCEPT,
  1704. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1705. },
  1706. {
  1707. "valid access local_port in SK_MSG",
  1708. .insns = {
  1709. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1710. offsetof(struct sk_msg_md, local_port)),
  1711. BPF_EXIT_INSN(),
  1712. },
  1713. .result = ACCEPT,
  1714. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1715. },
  1716. {
  1717. "valid access remote_ip6 in SK_MSG",
  1718. .insns = {
  1719. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1720. offsetof(struct sk_msg_md, remote_ip6[0])),
  1721. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1722. offsetof(struct sk_msg_md, remote_ip6[1])),
  1723. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1724. offsetof(struct sk_msg_md, remote_ip6[2])),
  1725. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1726. offsetof(struct sk_msg_md, remote_ip6[3])),
  1727. BPF_EXIT_INSN(),
  1728. },
  1729. .result = ACCEPT,
  1730. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1731. },
  1732. {
  1733. "valid access local_ip6 in SK_MSG",
  1734. .insns = {
  1735. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1736. offsetof(struct sk_msg_md, local_ip6[0])),
  1737. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1738. offsetof(struct sk_msg_md, local_ip6[1])),
  1739. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1740. offsetof(struct sk_msg_md, local_ip6[2])),
  1741. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  1742. offsetof(struct sk_msg_md, local_ip6[3])),
  1743. BPF_EXIT_INSN(),
  1744. },
  1745. .result = ACCEPT,
  1746. .prog_type = BPF_PROG_TYPE_SK_SKB,
  1747. },
  1748. {
  1749. "invalid 64B read of family in SK_MSG",
  1750. .insns = {
  1751. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1,
  1752. offsetof(struct sk_msg_md, family)),
  1753. BPF_EXIT_INSN(),
  1754. },
  1755. .errstr = "invalid bpf_context access",
  1756. .result = REJECT,
  1757. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1758. },
  1759. {
  1760. "invalid read past end of SK_MSG",
  1761. .insns = {
  1762. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  1763. offsetof(struct sk_msg_md, local_port) + 4),
  1764. BPF_EXIT_INSN(),
  1765. },
  1766. .errstr = "R0 !read_ok",
  1767. .result = REJECT,
  1768. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1769. },
  1770. {
  1771. "invalid read offset in SK_MSG",
  1772. .insns = {
  1773. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  1774. offsetof(struct sk_msg_md, family) + 1),
  1775. BPF_EXIT_INSN(),
  1776. },
  1777. .errstr = "invalid bpf_context access",
  1778. .result = REJECT,
  1779. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1780. },
  1781. {
  1782. "direct packet read for SK_MSG",
  1783. .insns = {
  1784. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1,
  1785. offsetof(struct sk_msg_md, data)),
  1786. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1,
  1787. offsetof(struct sk_msg_md, data_end)),
  1788. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  1789. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  1790. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  1791. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  1792. BPF_MOV64_IMM(BPF_REG_0, 0),
  1793. BPF_EXIT_INSN(),
  1794. },
  1795. .result = ACCEPT,
  1796. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1797. },
  1798. {
  1799. "direct packet write for SK_MSG",
  1800. .insns = {
  1801. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1,
  1802. offsetof(struct sk_msg_md, data)),
  1803. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1,
  1804. offsetof(struct sk_msg_md, data_end)),
  1805. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  1806. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  1807. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  1808. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  1809. BPF_MOV64_IMM(BPF_REG_0, 0),
  1810. BPF_EXIT_INSN(),
  1811. },
  1812. .result = ACCEPT,
  1813. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1814. },
  1815. {
  1816. "overlapping checks for direct packet access SK_MSG",
  1817. .insns = {
  1818. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1,
  1819. offsetof(struct sk_msg_md, data)),
  1820. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1,
  1821. offsetof(struct sk_msg_md, data_end)),
  1822. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  1823. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  1824. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 4),
  1825. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  1826. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 6),
  1827. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  1828. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_2, 6),
  1829. BPF_MOV64_IMM(BPF_REG_0, 0),
  1830. BPF_EXIT_INSN(),
  1831. },
  1832. .result = ACCEPT,
  1833. .prog_type = BPF_PROG_TYPE_SK_MSG,
  1834. },
  1835. {
  1836. "check skb->mark is not writeable by sockets",
  1837. .insns = {
  1838. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  1839. offsetof(struct __sk_buff, mark)),
  1840. BPF_EXIT_INSN(),
  1841. },
  1842. .errstr = "invalid bpf_context access",
  1843. .errstr_unpriv = "R1 leaks addr",
  1844. .result = REJECT,
  1845. },
  1846. {
  1847. "check skb->tc_index is not writeable by sockets",
  1848. .insns = {
  1849. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  1850. offsetof(struct __sk_buff, tc_index)),
  1851. BPF_EXIT_INSN(),
  1852. },
  1853. .errstr = "invalid bpf_context access",
  1854. .errstr_unpriv = "R1 leaks addr",
  1855. .result = REJECT,
  1856. },
  1857. {
  1858. "check cb access: byte",
  1859. .insns = {
  1860. BPF_MOV64_IMM(BPF_REG_0, 0),
  1861. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1862. offsetof(struct __sk_buff, cb[0])),
  1863. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1864. offsetof(struct __sk_buff, cb[0]) + 1),
  1865. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1866. offsetof(struct __sk_buff, cb[0]) + 2),
  1867. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1868. offsetof(struct __sk_buff, cb[0]) + 3),
  1869. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1870. offsetof(struct __sk_buff, cb[1])),
  1871. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1872. offsetof(struct __sk_buff, cb[1]) + 1),
  1873. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1874. offsetof(struct __sk_buff, cb[1]) + 2),
  1875. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1876. offsetof(struct __sk_buff, cb[1]) + 3),
  1877. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1878. offsetof(struct __sk_buff, cb[2])),
  1879. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1880. offsetof(struct __sk_buff, cb[2]) + 1),
  1881. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1882. offsetof(struct __sk_buff, cb[2]) + 2),
  1883. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1884. offsetof(struct __sk_buff, cb[2]) + 3),
  1885. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1886. offsetof(struct __sk_buff, cb[3])),
  1887. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1888. offsetof(struct __sk_buff, cb[3]) + 1),
  1889. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1890. offsetof(struct __sk_buff, cb[3]) + 2),
  1891. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1892. offsetof(struct __sk_buff, cb[3]) + 3),
  1893. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1894. offsetof(struct __sk_buff, cb[4])),
  1895. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1896. offsetof(struct __sk_buff, cb[4]) + 1),
  1897. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1898. offsetof(struct __sk_buff, cb[4]) + 2),
  1899. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1900. offsetof(struct __sk_buff, cb[4]) + 3),
  1901. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1902. offsetof(struct __sk_buff, cb[0])),
  1903. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1904. offsetof(struct __sk_buff, cb[0]) + 1),
  1905. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1906. offsetof(struct __sk_buff, cb[0]) + 2),
  1907. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1908. offsetof(struct __sk_buff, cb[0]) + 3),
  1909. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1910. offsetof(struct __sk_buff, cb[1])),
  1911. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1912. offsetof(struct __sk_buff, cb[1]) + 1),
  1913. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1914. offsetof(struct __sk_buff, cb[1]) + 2),
  1915. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1916. offsetof(struct __sk_buff, cb[1]) + 3),
  1917. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1918. offsetof(struct __sk_buff, cb[2])),
  1919. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1920. offsetof(struct __sk_buff, cb[2]) + 1),
  1921. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1922. offsetof(struct __sk_buff, cb[2]) + 2),
  1923. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1924. offsetof(struct __sk_buff, cb[2]) + 3),
  1925. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1926. offsetof(struct __sk_buff, cb[3])),
  1927. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1928. offsetof(struct __sk_buff, cb[3]) + 1),
  1929. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1930. offsetof(struct __sk_buff, cb[3]) + 2),
  1931. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1932. offsetof(struct __sk_buff, cb[3]) + 3),
  1933. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1934. offsetof(struct __sk_buff, cb[4])),
  1935. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1936. offsetof(struct __sk_buff, cb[4]) + 1),
  1937. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1938. offsetof(struct __sk_buff, cb[4]) + 2),
  1939. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1940. offsetof(struct __sk_buff, cb[4]) + 3),
  1941. BPF_EXIT_INSN(),
  1942. },
  1943. .result = ACCEPT,
  1944. },
  1945. {
  1946. "__sk_buff->hash, offset 0, byte store not permitted",
  1947. .insns = {
  1948. BPF_MOV64_IMM(BPF_REG_0, 0),
  1949. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1950. offsetof(struct __sk_buff, hash)),
  1951. BPF_EXIT_INSN(),
  1952. },
  1953. .errstr = "invalid bpf_context access",
  1954. .result = REJECT,
  1955. },
  1956. {
  1957. "__sk_buff->tc_index, offset 3, byte store not permitted",
  1958. .insns = {
  1959. BPF_MOV64_IMM(BPF_REG_0, 0),
  1960. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  1961. offsetof(struct __sk_buff, tc_index) + 3),
  1962. BPF_EXIT_INSN(),
  1963. },
  1964. .errstr = "invalid bpf_context access",
  1965. .result = REJECT,
  1966. },
  1967. {
  1968. "check skb->hash byte load permitted",
  1969. .insns = {
  1970. BPF_MOV64_IMM(BPF_REG_0, 0),
  1971. #if __BYTE_ORDER == __LITTLE_ENDIAN
  1972. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1973. offsetof(struct __sk_buff, hash)),
  1974. #else
  1975. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1976. offsetof(struct __sk_buff, hash) + 3),
  1977. #endif
  1978. BPF_EXIT_INSN(),
  1979. },
  1980. .result = ACCEPT,
  1981. },
  1982. {
  1983. "check skb->hash byte load not permitted 1",
  1984. .insns = {
  1985. BPF_MOV64_IMM(BPF_REG_0, 0),
  1986. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1987. offsetof(struct __sk_buff, hash) + 1),
  1988. BPF_EXIT_INSN(),
  1989. },
  1990. .errstr = "invalid bpf_context access",
  1991. .result = REJECT,
  1992. },
  1993. {
  1994. "check skb->hash byte load not permitted 2",
  1995. .insns = {
  1996. BPF_MOV64_IMM(BPF_REG_0, 0),
  1997. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  1998. offsetof(struct __sk_buff, hash) + 2),
  1999. BPF_EXIT_INSN(),
  2000. },
  2001. .errstr = "invalid bpf_context access",
  2002. .result = REJECT,
  2003. },
  2004. {
  2005. "check skb->hash byte load not permitted 3",
  2006. .insns = {
  2007. BPF_MOV64_IMM(BPF_REG_0, 0),
  2008. #if __BYTE_ORDER == __LITTLE_ENDIAN
  2009. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  2010. offsetof(struct __sk_buff, hash) + 3),
  2011. #else
  2012. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  2013. offsetof(struct __sk_buff, hash)),
  2014. #endif
  2015. BPF_EXIT_INSN(),
  2016. },
  2017. .errstr = "invalid bpf_context access",
  2018. .result = REJECT,
  2019. },
  2020. {
  2021. "check cb access: byte, wrong type",
  2022. .insns = {
  2023. BPF_MOV64_IMM(BPF_REG_0, 0),
  2024. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
  2025. offsetof(struct __sk_buff, cb[0])),
  2026. BPF_EXIT_INSN(),
  2027. },
  2028. .errstr = "invalid bpf_context access",
  2029. .result = REJECT,
  2030. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  2031. },
  2032. {
  2033. "check cb access: half",
  2034. .insns = {
  2035. BPF_MOV64_IMM(BPF_REG_0, 0),
  2036. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2037. offsetof(struct __sk_buff, cb[0])),
  2038. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2039. offsetof(struct __sk_buff, cb[0]) + 2),
  2040. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2041. offsetof(struct __sk_buff, cb[1])),
  2042. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2043. offsetof(struct __sk_buff, cb[1]) + 2),
  2044. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2045. offsetof(struct __sk_buff, cb[2])),
  2046. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2047. offsetof(struct __sk_buff, cb[2]) + 2),
  2048. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2049. offsetof(struct __sk_buff, cb[3])),
  2050. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2051. offsetof(struct __sk_buff, cb[3]) + 2),
  2052. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2053. offsetof(struct __sk_buff, cb[4])),
  2054. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2055. offsetof(struct __sk_buff, cb[4]) + 2),
  2056. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2057. offsetof(struct __sk_buff, cb[0])),
  2058. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2059. offsetof(struct __sk_buff, cb[0]) + 2),
  2060. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2061. offsetof(struct __sk_buff, cb[1])),
  2062. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2063. offsetof(struct __sk_buff, cb[1]) + 2),
  2064. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2065. offsetof(struct __sk_buff, cb[2])),
  2066. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2067. offsetof(struct __sk_buff, cb[2]) + 2),
  2068. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2069. offsetof(struct __sk_buff, cb[3])),
  2070. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2071. offsetof(struct __sk_buff, cb[3]) + 2),
  2072. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2073. offsetof(struct __sk_buff, cb[4])),
  2074. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2075. offsetof(struct __sk_buff, cb[4]) + 2),
  2076. BPF_EXIT_INSN(),
  2077. },
  2078. .result = ACCEPT,
  2079. },
  2080. {
  2081. "check cb access: half, unaligned",
  2082. .insns = {
  2083. BPF_MOV64_IMM(BPF_REG_0, 0),
  2084. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2085. offsetof(struct __sk_buff, cb[0]) + 1),
  2086. BPF_EXIT_INSN(),
  2087. },
  2088. .errstr = "misaligned context access",
  2089. .result = REJECT,
  2090. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  2091. },
  2092. {
  2093. "check __sk_buff->hash, offset 0, half store not permitted",
  2094. .insns = {
  2095. BPF_MOV64_IMM(BPF_REG_0, 0),
  2096. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2097. offsetof(struct __sk_buff, hash)),
  2098. BPF_EXIT_INSN(),
  2099. },
  2100. .errstr = "invalid bpf_context access",
  2101. .result = REJECT,
  2102. },
  2103. {
  2104. "check __sk_buff->tc_index, offset 2, half store not permitted",
  2105. .insns = {
  2106. BPF_MOV64_IMM(BPF_REG_0, 0),
  2107. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2108. offsetof(struct __sk_buff, tc_index) + 2),
  2109. BPF_EXIT_INSN(),
  2110. },
  2111. .errstr = "invalid bpf_context access",
  2112. .result = REJECT,
  2113. },
  2114. {
  2115. "check skb->hash half load permitted",
  2116. .insns = {
  2117. BPF_MOV64_IMM(BPF_REG_0, 0),
  2118. #if __BYTE_ORDER == __LITTLE_ENDIAN
  2119. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2120. offsetof(struct __sk_buff, hash)),
  2121. #else
  2122. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2123. offsetof(struct __sk_buff, hash) + 2),
  2124. #endif
  2125. BPF_EXIT_INSN(),
  2126. },
  2127. .result = ACCEPT,
  2128. },
  2129. {
  2130. "check skb->hash half load not permitted",
  2131. .insns = {
  2132. BPF_MOV64_IMM(BPF_REG_0, 0),
  2133. #if __BYTE_ORDER == __LITTLE_ENDIAN
  2134. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2135. offsetof(struct __sk_buff, hash) + 2),
  2136. #else
  2137. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  2138. offsetof(struct __sk_buff, hash)),
  2139. #endif
  2140. BPF_EXIT_INSN(),
  2141. },
  2142. .errstr = "invalid bpf_context access",
  2143. .result = REJECT,
  2144. },
  2145. {
  2146. "check cb access: half, wrong type",
  2147. .insns = {
  2148. BPF_MOV64_IMM(BPF_REG_0, 0),
  2149. BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
  2150. offsetof(struct __sk_buff, cb[0])),
  2151. BPF_EXIT_INSN(),
  2152. },
  2153. .errstr = "invalid bpf_context access",
  2154. .result = REJECT,
  2155. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  2156. },
  2157. {
  2158. "check cb access: word",
  2159. .insns = {
  2160. BPF_MOV64_IMM(BPF_REG_0, 0),
  2161. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2162. offsetof(struct __sk_buff, cb[0])),
  2163. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2164. offsetof(struct __sk_buff, cb[1])),
  2165. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2166. offsetof(struct __sk_buff, cb[2])),
  2167. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2168. offsetof(struct __sk_buff, cb[3])),
  2169. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2170. offsetof(struct __sk_buff, cb[4])),
  2171. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2172. offsetof(struct __sk_buff, cb[0])),
  2173. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2174. offsetof(struct __sk_buff, cb[1])),
  2175. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2176. offsetof(struct __sk_buff, cb[2])),
  2177. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2178. offsetof(struct __sk_buff, cb[3])),
  2179. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2180. offsetof(struct __sk_buff, cb[4])),
  2181. BPF_EXIT_INSN(),
  2182. },
  2183. .result = ACCEPT,
  2184. },
  2185. {
  2186. "check cb access: word, unaligned 1",
  2187. .insns = {
  2188. BPF_MOV64_IMM(BPF_REG_0, 0),
  2189. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2190. offsetof(struct __sk_buff, cb[0]) + 2),
  2191. BPF_EXIT_INSN(),
  2192. },
  2193. .errstr = "misaligned context access",
  2194. .result = REJECT,
  2195. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  2196. },
  2197. {
  2198. "check cb access: word, unaligned 2",
  2199. .insns = {
  2200. BPF_MOV64_IMM(BPF_REG_0, 0),
  2201. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2202. offsetof(struct __sk_buff, cb[4]) + 1),
  2203. BPF_EXIT_INSN(),
  2204. },
  2205. .errstr = "misaligned context access",
  2206. .result = REJECT,
  2207. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  2208. },
  2209. {
  2210. "check cb access: word, unaligned 3",
  2211. .insns = {
  2212. BPF_MOV64_IMM(BPF_REG_0, 0),
  2213. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2214. offsetof(struct __sk_buff, cb[4]) + 2),
  2215. BPF_EXIT_INSN(),
  2216. },
  2217. .errstr = "misaligned context access",
  2218. .result = REJECT,
  2219. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  2220. },
  2221. {
  2222. "check cb access: word, unaligned 4",
  2223. .insns = {
  2224. BPF_MOV64_IMM(BPF_REG_0, 0),
  2225. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2226. offsetof(struct __sk_buff, cb[4]) + 3),
  2227. BPF_EXIT_INSN(),
  2228. },
  2229. .errstr = "misaligned context access",
  2230. .result = REJECT,
  2231. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  2232. },
  2233. {
  2234. "check cb access: double",
  2235. .insns = {
  2236. BPF_MOV64_IMM(BPF_REG_0, 0),
  2237. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  2238. offsetof(struct __sk_buff, cb[0])),
  2239. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  2240. offsetof(struct __sk_buff, cb[2])),
  2241. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
  2242. offsetof(struct __sk_buff, cb[0])),
  2243. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
  2244. offsetof(struct __sk_buff, cb[2])),
  2245. BPF_EXIT_INSN(),
  2246. },
  2247. .result = ACCEPT,
  2248. },
  2249. {
  2250. "check cb access: double, unaligned 1",
  2251. .insns = {
  2252. BPF_MOV64_IMM(BPF_REG_0, 0),
  2253. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  2254. offsetof(struct __sk_buff, cb[1])),
  2255. BPF_EXIT_INSN(),
  2256. },
  2257. .errstr = "misaligned context access",
  2258. .result = REJECT,
  2259. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  2260. },
  2261. {
  2262. "check cb access: double, unaligned 2",
  2263. .insns = {
  2264. BPF_MOV64_IMM(BPF_REG_0, 0),
  2265. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  2266. offsetof(struct __sk_buff, cb[3])),
  2267. BPF_EXIT_INSN(),
  2268. },
  2269. .errstr = "misaligned context access",
  2270. .result = REJECT,
  2271. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  2272. },
  2273. {
  2274. "check cb access: double, oob 1",
  2275. .insns = {
  2276. BPF_MOV64_IMM(BPF_REG_0, 0),
  2277. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  2278. offsetof(struct __sk_buff, cb[4])),
  2279. BPF_EXIT_INSN(),
  2280. },
  2281. .errstr = "invalid bpf_context access",
  2282. .result = REJECT,
  2283. },
  2284. {
  2285. "check cb access: double, oob 2",
  2286. .insns = {
  2287. BPF_MOV64_IMM(BPF_REG_0, 0),
  2288. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
  2289. offsetof(struct __sk_buff, cb[4])),
  2290. BPF_EXIT_INSN(),
  2291. },
  2292. .errstr = "invalid bpf_context access",
  2293. .result = REJECT,
  2294. },
  2295. {
  2296. "check __sk_buff->ifindex dw store not permitted",
  2297. .insns = {
  2298. BPF_MOV64_IMM(BPF_REG_0, 0),
  2299. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  2300. offsetof(struct __sk_buff, ifindex)),
  2301. BPF_EXIT_INSN(),
  2302. },
  2303. .errstr = "invalid bpf_context access",
  2304. .result = REJECT,
  2305. },
  2306. {
  2307. "check __sk_buff->ifindex dw load not permitted",
  2308. .insns = {
  2309. BPF_MOV64_IMM(BPF_REG_0, 0),
  2310. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
  2311. offsetof(struct __sk_buff, ifindex)),
  2312. BPF_EXIT_INSN(),
  2313. },
  2314. .errstr = "invalid bpf_context access",
  2315. .result = REJECT,
  2316. },
  2317. {
  2318. "check cb access: double, wrong type",
  2319. .insns = {
  2320. BPF_MOV64_IMM(BPF_REG_0, 0),
  2321. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  2322. offsetof(struct __sk_buff, cb[0])),
  2323. BPF_EXIT_INSN(),
  2324. },
  2325. .errstr = "invalid bpf_context access",
  2326. .result = REJECT,
  2327. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  2328. },
  2329. {
  2330. "check out of range skb->cb access",
  2331. .insns = {
  2332. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2333. offsetof(struct __sk_buff, cb[0]) + 256),
  2334. BPF_EXIT_INSN(),
  2335. },
  2336. .errstr = "invalid bpf_context access",
  2337. .errstr_unpriv = "",
  2338. .result = REJECT,
  2339. .prog_type = BPF_PROG_TYPE_SCHED_ACT,
  2340. },
  2341. {
  2342. "write skb fields from socket prog",
  2343. .insns = {
  2344. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2345. offsetof(struct __sk_buff, cb[4])),
  2346. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
  2347. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2348. offsetof(struct __sk_buff, mark)),
  2349. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2350. offsetof(struct __sk_buff, tc_index)),
  2351. BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
  2352. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  2353. offsetof(struct __sk_buff, cb[0])),
  2354. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  2355. offsetof(struct __sk_buff, cb[2])),
  2356. BPF_EXIT_INSN(),
  2357. },
  2358. .result = ACCEPT,
  2359. .errstr_unpriv = "R1 leaks addr",
  2360. .result_unpriv = REJECT,
  2361. },
  2362. {
  2363. "write skb fields from tc_cls_act prog",
  2364. .insns = {
  2365. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2366. offsetof(struct __sk_buff, cb[0])),
  2367. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2368. offsetof(struct __sk_buff, mark)),
  2369. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  2370. offsetof(struct __sk_buff, tc_index)),
  2371. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2372. offsetof(struct __sk_buff, tc_index)),
  2373. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
  2374. offsetof(struct __sk_buff, cb[3])),
  2375. BPF_EXIT_INSN(),
  2376. },
  2377. .errstr_unpriv = "",
  2378. .result_unpriv = REJECT,
  2379. .result = ACCEPT,
  2380. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2381. },
  2382. {
  2383. "PTR_TO_STACK store/load",
  2384. .insns = {
  2385. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  2386. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -10),
  2387. BPF_ST_MEM(BPF_DW, BPF_REG_1, 2, 0xfaceb00c),
  2388. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 2),
  2389. BPF_EXIT_INSN(),
  2390. },
  2391. .result = ACCEPT,
  2392. .retval = 0xfaceb00c,
  2393. },
  2394. {
  2395. "PTR_TO_STACK store/load - bad alignment on off",
  2396. .insns = {
  2397. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  2398. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  2399. BPF_ST_MEM(BPF_DW, BPF_REG_1, 2, 0xfaceb00c),
  2400. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 2),
  2401. BPF_EXIT_INSN(),
  2402. },
  2403. .result = REJECT,
  2404. .errstr = "misaligned stack access off (0x0; 0x0)+-8+2 size 8",
  2405. },
  2406. {
  2407. "PTR_TO_STACK store/load - bad alignment on reg",
  2408. .insns = {
  2409. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  2410. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -10),
  2411. BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
  2412. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
  2413. BPF_EXIT_INSN(),
  2414. },
  2415. .result = REJECT,
  2416. .errstr = "misaligned stack access off (0x0; 0x0)+-10+8 size 8",
  2417. },
  2418. {
  2419. "PTR_TO_STACK store/load - out of bounds low",
  2420. .insns = {
  2421. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  2422. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -80000),
  2423. BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
  2424. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
  2425. BPF_EXIT_INSN(),
  2426. },
  2427. .result = REJECT,
  2428. .errstr = "invalid stack off=-79992 size=8",
  2429. },
  2430. {
  2431. "PTR_TO_STACK store/load - out of bounds high",
  2432. .insns = {
  2433. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  2434. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  2435. BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
  2436. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
  2437. BPF_EXIT_INSN(),
  2438. },
  2439. .result = REJECT,
  2440. .errstr = "invalid stack off=0 size=8",
  2441. },
  2442. {
  2443. "unpriv: return pointer",
  2444. .insns = {
  2445. BPF_MOV64_REG(BPF_REG_0, BPF_REG_10),
  2446. BPF_EXIT_INSN(),
  2447. },
  2448. .result = ACCEPT,
  2449. .result_unpriv = REJECT,
  2450. .errstr_unpriv = "R0 leaks addr",
  2451. .retval = POINTER_VALUE,
  2452. },
  2453. {
  2454. "unpriv: add const to pointer",
  2455. .insns = {
  2456. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  2457. BPF_MOV64_IMM(BPF_REG_0, 0),
  2458. BPF_EXIT_INSN(),
  2459. },
  2460. .result = ACCEPT,
  2461. },
  2462. {
  2463. "unpriv: add pointer to pointer",
  2464. .insns = {
  2465. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_10),
  2466. BPF_MOV64_IMM(BPF_REG_0, 0),
  2467. BPF_EXIT_INSN(),
  2468. },
  2469. .result = REJECT,
  2470. .errstr = "R1 pointer += pointer",
  2471. },
  2472. {
  2473. "unpriv: neg pointer",
  2474. .insns = {
  2475. BPF_ALU64_IMM(BPF_NEG, BPF_REG_1, 0),
  2476. BPF_MOV64_IMM(BPF_REG_0, 0),
  2477. BPF_EXIT_INSN(),
  2478. },
  2479. .result = ACCEPT,
  2480. .result_unpriv = REJECT,
  2481. .errstr_unpriv = "R1 pointer arithmetic",
  2482. },
  2483. {
  2484. "unpriv: cmp pointer with const",
  2485. .insns = {
  2486. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 0),
  2487. BPF_MOV64_IMM(BPF_REG_0, 0),
  2488. BPF_EXIT_INSN(),
  2489. },
  2490. .result = ACCEPT,
  2491. .result_unpriv = REJECT,
  2492. .errstr_unpriv = "R1 pointer comparison",
  2493. },
  2494. {
  2495. "unpriv: cmp pointer with pointer",
  2496. .insns = {
  2497. BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
  2498. BPF_MOV64_IMM(BPF_REG_0, 0),
  2499. BPF_EXIT_INSN(),
  2500. },
  2501. .result = ACCEPT,
  2502. .result_unpriv = REJECT,
  2503. .errstr_unpriv = "R10 pointer comparison",
  2504. },
  2505. {
  2506. "unpriv: check that printk is disallowed",
  2507. .insns = {
  2508. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  2509. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  2510. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  2511. BPF_MOV64_IMM(BPF_REG_2, 8),
  2512. BPF_MOV64_REG(BPF_REG_3, BPF_REG_1),
  2513. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2514. BPF_FUNC_trace_printk),
  2515. BPF_MOV64_IMM(BPF_REG_0, 0),
  2516. BPF_EXIT_INSN(),
  2517. },
  2518. .errstr_unpriv = "unknown func bpf_trace_printk#6",
  2519. .result_unpriv = REJECT,
  2520. .result = ACCEPT,
  2521. },
  2522. {
  2523. "unpriv: pass pointer to helper function",
  2524. .insns = {
  2525. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  2526. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  2527. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  2528. BPF_LD_MAP_FD(BPF_REG_1, 0),
  2529. BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
  2530. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  2531. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2532. BPF_FUNC_map_update_elem),
  2533. BPF_MOV64_IMM(BPF_REG_0, 0),
  2534. BPF_EXIT_INSN(),
  2535. },
  2536. .fixup_map1 = { 3 },
  2537. .errstr_unpriv = "R4 leaks addr",
  2538. .result_unpriv = REJECT,
  2539. .result = ACCEPT,
  2540. },
  2541. {
  2542. "unpriv: indirectly pass pointer on stack to helper function",
  2543. .insns = {
  2544. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_10, -8),
  2545. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  2546. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  2547. BPF_LD_MAP_FD(BPF_REG_1, 0),
  2548. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2549. BPF_FUNC_map_lookup_elem),
  2550. BPF_MOV64_IMM(BPF_REG_0, 0),
  2551. BPF_EXIT_INSN(),
  2552. },
  2553. .fixup_map1 = { 3 },
  2554. .errstr = "invalid indirect read from stack off -8+0 size 8",
  2555. .result = REJECT,
  2556. },
  2557. {
  2558. "unpriv: mangle pointer on stack 1",
  2559. .insns = {
  2560. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_10, -8),
  2561. BPF_ST_MEM(BPF_W, BPF_REG_10, -8, 0),
  2562. BPF_MOV64_IMM(BPF_REG_0, 0),
  2563. BPF_EXIT_INSN(),
  2564. },
  2565. .errstr_unpriv = "attempt to corrupt spilled",
  2566. .result_unpriv = REJECT,
  2567. .result = ACCEPT,
  2568. },
  2569. {
  2570. "unpriv: mangle pointer on stack 2",
  2571. .insns = {
  2572. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_10, -8),
  2573. BPF_ST_MEM(BPF_B, BPF_REG_10, -1, 0),
  2574. BPF_MOV64_IMM(BPF_REG_0, 0),
  2575. BPF_EXIT_INSN(),
  2576. },
  2577. .errstr_unpriv = "attempt to corrupt spilled",
  2578. .result_unpriv = REJECT,
  2579. .result = ACCEPT,
  2580. },
  2581. {
  2582. "unpriv: read pointer from stack in small chunks",
  2583. .insns = {
  2584. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_10, -8),
  2585. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_10, -8),
  2586. BPF_MOV64_IMM(BPF_REG_0, 0),
  2587. BPF_EXIT_INSN(),
  2588. },
  2589. .errstr = "invalid size",
  2590. .result = REJECT,
  2591. },
  2592. {
  2593. "unpriv: write pointer into ctx",
  2594. .insns = {
  2595. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_1, 0),
  2596. BPF_MOV64_IMM(BPF_REG_0, 0),
  2597. BPF_EXIT_INSN(),
  2598. },
  2599. .errstr_unpriv = "R1 leaks addr",
  2600. .result_unpriv = REJECT,
  2601. .errstr = "invalid bpf_context access",
  2602. .result = REJECT,
  2603. },
  2604. {
  2605. "unpriv: spill/fill of ctx",
  2606. .insns = {
  2607. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2608. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2609. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  2610. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
  2611. BPF_MOV64_IMM(BPF_REG_0, 0),
  2612. BPF_EXIT_INSN(),
  2613. },
  2614. .result = ACCEPT,
  2615. },
  2616. {
  2617. "unpriv: spill/fill of ctx 2",
  2618. .insns = {
  2619. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2620. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2621. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  2622. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
  2623. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2624. BPF_FUNC_get_hash_recalc),
  2625. BPF_MOV64_IMM(BPF_REG_0, 0),
  2626. BPF_EXIT_INSN(),
  2627. },
  2628. .result = ACCEPT,
  2629. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2630. },
  2631. {
  2632. "unpriv: spill/fill of ctx 3",
  2633. .insns = {
  2634. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2635. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2636. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  2637. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_10, 0),
  2638. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
  2639. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2640. BPF_FUNC_get_hash_recalc),
  2641. BPF_EXIT_INSN(),
  2642. },
  2643. .result = REJECT,
  2644. .errstr = "R1 type=fp expected=ctx",
  2645. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2646. },
  2647. {
  2648. "unpriv: spill/fill of ctx 4",
  2649. .insns = {
  2650. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2651. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2652. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  2653. BPF_MOV64_IMM(BPF_REG_0, 1),
  2654. BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_DW, BPF_REG_10,
  2655. BPF_REG_0, -8, 0),
  2656. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
  2657. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2658. BPF_FUNC_get_hash_recalc),
  2659. BPF_EXIT_INSN(),
  2660. },
  2661. .result = REJECT,
  2662. .errstr = "R1 type=inv expected=ctx",
  2663. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2664. },
  2665. {
  2666. "unpriv: spill/fill of different pointers stx",
  2667. .insns = {
  2668. BPF_MOV64_IMM(BPF_REG_3, 42),
  2669. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2670. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2671. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 3),
  2672. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  2673. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  2674. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_2, 0),
  2675. BPF_JMP_IMM(BPF_JNE, BPF_REG_1, 0, 1),
  2676. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  2677. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
  2678. BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3,
  2679. offsetof(struct __sk_buff, mark)),
  2680. BPF_MOV64_IMM(BPF_REG_0, 0),
  2681. BPF_EXIT_INSN(),
  2682. },
  2683. .result = REJECT,
  2684. .errstr = "same insn cannot be used with different pointers",
  2685. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2686. },
  2687. {
  2688. "unpriv: spill/fill of different pointers ldx",
  2689. .insns = {
  2690. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2691. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2692. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 3),
  2693. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  2694. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2,
  2695. -(__s32)offsetof(struct bpf_perf_event_data,
  2696. sample_period) - 8),
  2697. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_2, 0),
  2698. BPF_JMP_IMM(BPF_JNE, BPF_REG_1, 0, 1),
  2699. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  2700. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
  2701. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_1,
  2702. offsetof(struct bpf_perf_event_data,
  2703. sample_period)),
  2704. BPF_MOV64_IMM(BPF_REG_0, 0),
  2705. BPF_EXIT_INSN(),
  2706. },
  2707. .result = REJECT,
  2708. .errstr = "same insn cannot be used with different pointers",
  2709. .prog_type = BPF_PROG_TYPE_PERF_EVENT,
  2710. },
  2711. {
  2712. "unpriv: write pointer into map elem value",
  2713. .insns = {
  2714. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  2715. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  2716. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  2717. BPF_LD_MAP_FD(BPF_REG_1, 0),
  2718. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2719. BPF_FUNC_map_lookup_elem),
  2720. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  2721. BPF_STX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0),
  2722. BPF_EXIT_INSN(),
  2723. },
  2724. .fixup_map1 = { 3 },
  2725. .errstr_unpriv = "R0 leaks addr",
  2726. .result_unpriv = REJECT,
  2727. .result = ACCEPT,
  2728. },
  2729. {
  2730. "unpriv: partial copy of pointer",
  2731. .insns = {
  2732. BPF_MOV32_REG(BPF_REG_1, BPF_REG_10),
  2733. BPF_MOV64_IMM(BPF_REG_0, 0),
  2734. BPF_EXIT_INSN(),
  2735. },
  2736. .errstr_unpriv = "R10 partial copy",
  2737. .result_unpriv = REJECT,
  2738. .result = ACCEPT,
  2739. },
  2740. {
  2741. "unpriv: pass pointer to tail_call",
  2742. .insns = {
  2743. BPF_MOV64_REG(BPF_REG_3, BPF_REG_1),
  2744. BPF_LD_MAP_FD(BPF_REG_2, 0),
  2745. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2746. BPF_FUNC_tail_call),
  2747. BPF_MOV64_IMM(BPF_REG_0, 0),
  2748. BPF_EXIT_INSN(),
  2749. },
  2750. .fixup_prog1 = { 1 },
  2751. .errstr_unpriv = "R3 leaks addr into helper",
  2752. .result_unpriv = REJECT,
  2753. .result = ACCEPT,
  2754. },
  2755. {
  2756. "unpriv: cmp map pointer with zero",
  2757. .insns = {
  2758. BPF_MOV64_IMM(BPF_REG_1, 0),
  2759. BPF_LD_MAP_FD(BPF_REG_1, 0),
  2760. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 0),
  2761. BPF_MOV64_IMM(BPF_REG_0, 0),
  2762. BPF_EXIT_INSN(),
  2763. },
  2764. .fixup_map1 = { 1 },
  2765. .errstr_unpriv = "R1 pointer comparison",
  2766. .result_unpriv = REJECT,
  2767. .result = ACCEPT,
  2768. },
  2769. {
  2770. "unpriv: write into frame pointer",
  2771. .insns = {
  2772. BPF_MOV64_REG(BPF_REG_10, BPF_REG_1),
  2773. BPF_MOV64_IMM(BPF_REG_0, 0),
  2774. BPF_EXIT_INSN(),
  2775. },
  2776. .errstr = "frame pointer is read only",
  2777. .result = REJECT,
  2778. },
  2779. {
  2780. "unpriv: spill/fill frame pointer",
  2781. .insns = {
  2782. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2783. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2784. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_10, 0),
  2785. BPF_LDX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, 0),
  2786. BPF_MOV64_IMM(BPF_REG_0, 0),
  2787. BPF_EXIT_INSN(),
  2788. },
  2789. .errstr = "frame pointer is read only",
  2790. .result = REJECT,
  2791. },
  2792. {
  2793. "unpriv: cmp of frame pointer",
  2794. .insns = {
  2795. BPF_JMP_IMM(BPF_JEQ, BPF_REG_10, 0, 0),
  2796. BPF_MOV64_IMM(BPF_REG_0, 0),
  2797. BPF_EXIT_INSN(),
  2798. },
  2799. .errstr_unpriv = "R10 pointer comparison",
  2800. .result_unpriv = REJECT,
  2801. .result = ACCEPT,
  2802. },
  2803. {
  2804. "unpriv: adding of fp",
  2805. .insns = {
  2806. BPF_MOV64_IMM(BPF_REG_0, 0),
  2807. BPF_MOV64_IMM(BPF_REG_1, 0),
  2808. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_10),
  2809. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, -8),
  2810. BPF_EXIT_INSN(),
  2811. },
  2812. .result = ACCEPT,
  2813. },
  2814. {
  2815. "unpriv: cmp of stack pointer",
  2816. .insns = {
  2817. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  2818. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  2819. BPF_JMP_IMM(BPF_JEQ, BPF_REG_2, 0, 0),
  2820. BPF_MOV64_IMM(BPF_REG_0, 0),
  2821. BPF_EXIT_INSN(),
  2822. },
  2823. .errstr_unpriv = "R2 pointer comparison",
  2824. .result_unpriv = REJECT,
  2825. .result = ACCEPT,
  2826. },
  2827. {
  2828. "runtime/jit: tail_call within bounds, prog once",
  2829. .insns = {
  2830. BPF_MOV64_IMM(BPF_REG_3, 0),
  2831. BPF_LD_MAP_FD(BPF_REG_2, 0),
  2832. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2833. BPF_FUNC_tail_call),
  2834. BPF_MOV64_IMM(BPF_REG_0, 1),
  2835. BPF_EXIT_INSN(),
  2836. },
  2837. .fixup_prog1 = { 1 },
  2838. .result = ACCEPT,
  2839. .retval = 42,
  2840. },
  2841. {
  2842. "runtime/jit: tail_call within bounds, prog loop",
  2843. .insns = {
  2844. BPF_MOV64_IMM(BPF_REG_3, 1),
  2845. BPF_LD_MAP_FD(BPF_REG_2, 0),
  2846. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2847. BPF_FUNC_tail_call),
  2848. BPF_MOV64_IMM(BPF_REG_0, 1),
  2849. BPF_EXIT_INSN(),
  2850. },
  2851. .fixup_prog1 = { 1 },
  2852. .result = ACCEPT,
  2853. .retval = 41,
  2854. },
  2855. {
  2856. "runtime/jit: tail_call within bounds, no prog",
  2857. .insns = {
  2858. BPF_MOV64_IMM(BPF_REG_3, 2),
  2859. BPF_LD_MAP_FD(BPF_REG_2, 0),
  2860. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2861. BPF_FUNC_tail_call),
  2862. BPF_MOV64_IMM(BPF_REG_0, 1),
  2863. BPF_EXIT_INSN(),
  2864. },
  2865. .fixup_prog1 = { 1 },
  2866. .result = ACCEPT,
  2867. .retval = 1,
  2868. },
  2869. {
  2870. "runtime/jit: tail_call out of bounds",
  2871. .insns = {
  2872. BPF_MOV64_IMM(BPF_REG_3, 256),
  2873. BPF_LD_MAP_FD(BPF_REG_2, 0),
  2874. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2875. BPF_FUNC_tail_call),
  2876. BPF_MOV64_IMM(BPF_REG_0, 2),
  2877. BPF_EXIT_INSN(),
  2878. },
  2879. .fixup_prog1 = { 1 },
  2880. .result = ACCEPT,
  2881. .retval = 2,
  2882. },
  2883. {
  2884. "runtime/jit: pass negative index to tail_call",
  2885. .insns = {
  2886. BPF_MOV64_IMM(BPF_REG_3, -1),
  2887. BPF_LD_MAP_FD(BPF_REG_2, 0),
  2888. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2889. BPF_FUNC_tail_call),
  2890. BPF_MOV64_IMM(BPF_REG_0, 2),
  2891. BPF_EXIT_INSN(),
  2892. },
  2893. .fixup_prog1 = { 1 },
  2894. .result = ACCEPT,
  2895. .retval = 2,
  2896. },
  2897. {
  2898. "runtime/jit: pass > 32bit index to tail_call",
  2899. .insns = {
  2900. BPF_LD_IMM64(BPF_REG_3, 0x100000000ULL),
  2901. BPF_LD_MAP_FD(BPF_REG_2, 0),
  2902. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2903. BPF_FUNC_tail_call),
  2904. BPF_MOV64_IMM(BPF_REG_0, 2),
  2905. BPF_EXIT_INSN(),
  2906. },
  2907. .fixup_prog1 = { 2 },
  2908. .result = ACCEPT,
  2909. .retval = 42,
  2910. },
  2911. {
  2912. "stack pointer arithmetic",
  2913. .insns = {
  2914. BPF_MOV64_IMM(BPF_REG_1, 4),
  2915. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  2916. BPF_MOV64_REG(BPF_REG_7, BPF_REG_10),
  2917. BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, -10),
  2918. BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, -10),
  2919. BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
  2920. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_1),
  2921. BPF_ST_MEM(0, BPF_REG_2, 4, 0),
  2922. BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
  2923. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 8),
  2924. BPF_ST_MEM(0, BPF_REG_2, 4, 0),
  2925. BPF_MOV64_IMM(BPF_REG_0, 0),
  2926. BPF_EXIT_INSN(),
  2927. },
  2928. .result = ACCEPT,
  2929. },
  2930. {
  2931. "raw_stack: no skb_load_bytes",
  2932. .insns = {
  2933. BPF_MOV64_IMM(BPF_REG_2, 4),
  2934. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2935. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2936. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  2937. BPF_MOV64_IMM(BPF_REG_4, 8),
  2938. /* Call to skb_load_bytes() omitted. */
  2939. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  2940. BPF_EXIT_INSN(),
  2941. },
  2942. .result = REJECT,
  2943. .errstr = "invalid read from stack off -8+0 size 8",
  2944. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2945. },
  2946. {
  2947. "raw_stack: skb_load_bytes, negative len",
  2948. .insns = {
  2949. BPF_MOV64_IMM(BPF_REG_2, 4),
  2950. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2951. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2952. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  2953. BPF_MOV64_IMM(BPF_REG_4, -8),
  2954. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2955. BPF_FUNC_skb_load_bytes),
  2956. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  2957. BPF_EXIT_INSN(),
  2958. },
  2959. .result = REJECT,
  2960. .errstr = "R4 min value is negative",
  2961. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2962. },
  2963. {
  2964. "raw_stack: skb_load_bytes, negative len 2",
  2965. .insns = {
  2966. BPF_MOV64_IMM(BPF_REG_2, 4),
  2967. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2968. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2969. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  2970. BPF_MOV64_IMM(BPF_REG_4, ~0),
  2971. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2972. BPF_FUNC_skb_load_bytes),
  2973. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  2974. BPF_EXIT_INSN(),
  2975. },
  2976. .result = REJECT,
  2977. .errstr = "R4 min value is negative",
  2978. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2979. },
  2980. {
  2981. "raw_stack: skb_load_bytes, zero len",
  2982. .insns = {
  2983. BPF_MOV64_IMM(BPF_REG_2, 4),
  2984. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  2985. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  2986. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  2987. BPF_MOV64_IMM(BPF_REG_4, 0),
  2988. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  2989. BPF_FUNC_skb_load_bytes),
  2990. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  2991. BPF_EXIT_INSN(),
  2992. },
  2993. .result = REJECT,
  2994. .errstr = "invalid stack type R3",
  2995. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  2996. },
  2997. {
  2998. "raw_stack: skb_load_bytes, no init",
  2999. .insns = {
  3000. BPF_MOV64_IMM(BPF_REG_2, 4),
  3001. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3002. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  3003. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3004. BPF_MOV64_IMM(BPF_REG_4, 8),
  3005. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3006. BPF_FUNC_skb_load_bytes),
  3007. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3008. BPF_EXIT_INSN(),
  3009. },
  3010. .result = ACCEPT,
  3011. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3012. },
  3013. {
  3014. "raw_stack: skb_load_bytes, init",
  3015. .insns = {
  3016. BPF_MOV64_IMM(BPF_REG_2, 4),
  3017. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3018. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  3019. BPF_ST_MEM(BPF_DW, BPF_REG_6, 0, 0xcafe),
  3020. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3021. BPF_MOV64_IMM(BPF_REG_4, 8),
  3022. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3023. BPF_FUNC_skb_load_bytes),
  3024. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3025. BPF_EXIT_INSN(),
  3026. },
  3027. .result = ACCEPT,
  3028. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3029. },
  3030. {
  3031. "raw_stack: skb_load_bytes, spilled regs around bounds",
  3032. .insns = {
  3033. BPF_MOV64_IMM(BPF_REG_2, 4),
  3034. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3035. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -16),
  3036. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, -8),
  3037. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 8),
  3038. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3039. BPF_MOV64_IMM(BPF_REG_4, 8),
  3040. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3041. BPF_FUNC_skb_load_bytes),
  3042. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, -8),
  3043. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_6, 8),
  3044. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
  3045. offsetof(struct __sk_buff, mark)),
  3046. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_2,
  3047. offsetof(struct __sk_buff, priority)),
  3048. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  3049. BPF_EXIT_INSN(),
  3050. },
  3051. .result = ACCEPT,
  3052. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3053. },
  3054. {
  3055. "raw_stack: skb_load_bytes, spilled regs corruption",
  3056. .insns = {
  3057. BPF_MOV64_IMM(BPF_REG_2, 4),
  3058. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3059. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
  3060. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  3061. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3062. BPF_MOV64_IMM(BPF_REG_4, 8),
  3063. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3064. BPF_FUNC_skb_load_bytes),
  3065. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3066. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
  3067. offsetof(struct __sk_buff, mark)),
  3068. BPF_EXIT_INSN(),
  3069. },
  3070. .result = REJECT,
  3071. .errstr = "R0 invalid mem access 'inv'",
  3072. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3073. },
  3074. {
  3075. "raw_stack: skb_load_bytes, spilled regs corruption 2",
  3076. .insns = {
  3077. BPF_MOV64_IMM(BPF_REG_2, 4),
  3078. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3079. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -16),
  3080. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, -8),
  3081. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  3082. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 8),
  3083. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3084. BPF_MOV64_IMM(BPF_REG_4, 8),
  3085. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3086. BPF_FUNC_skb_load_bytes),
  3087. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, -8),
  3088. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_6, 8),
  3089. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_6, 0),
  3090. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
  3091. offsetof(struct __sk_buff, mark)),
  3092. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_2,
  3093. offsetof(struct __sk_buff, priority)),
  3094. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  3095. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_3,
  3096. offsetof(struct __sk_buff, pkt_type)),
  3097. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_3),
  3098. BPF_EXIT_INSN(),
  3099. },
  3100. .result = REJECT,
  3101. .errstr = "R3 invalid mem access 'inv'",
  3102. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3103. },
  3104. {
  3105. "raw_stack: skb_load_bytes, spilled regs + data",
  3106. .insns = {
  3107. BPF_MOV64_IMM(BPF_REG_2, 4),
  3108. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3109. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -16),
  3110. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, -8),
  3111. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
  3112. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 8),
  3113. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3114. BPF_MOV64_IMM(BPF_REG_4, 8),
  3115. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3116. BPF_FUNC_skb_load_bytes),
  3117. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, -8),
  3118. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_6, 8),
  3119. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_6, 0),
  3120. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
  3121. offsetof(struct __sk_buff, mark)),
  3122. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_2,
  3123. offsetof(struct __sk_buff, priority)),
  3124. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  3125. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_3),
  3126. BPF_EXIT_INSN(),
  3127. },
  3128. .result = ACCEPT,
  3129. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3130. },
  3131. {
  3132. "raw_stack: skb_load_bytes, invalid access 1",
  3133. .insns = {
  3134. BPF_MOV64_IMM(BPF_REG_2, 4),
  3135. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3136. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -513),
  3137. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3138. BPF_MOV64_IMM(BPF_REG_4, 8),
  3139. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3140. BPF_FUNC_skb_load_bytes),
  3141. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3142. BPF_EXIT_INSN(),
  3143. },
  3144. .result = REJECT,
  3145. .errstr = "invalid stack type R3 off=-513 access_size=8",
  3146. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3147. },
  3148. {
  3149. "raw_stack: skb_load_bytes, invalid access 2",
  3150. .insns = {
  3151. BPF_MOV64_IMM(BPF_REG_2, 4),
  3152. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3153. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -1),
  3154. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3155. BPF_MOV64_IMM(BPF_REG_4, 8),
  3156. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3157. BPF_FUNC_skb_load_bytes),
  3158. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3159. BPF_EXIT_INSN(),
  3160. },
  3161. .result = REJECT,
  3162. .errstr = "invalid stack type R3 off=-1 access_size=8",
  3163. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3164. },
  3165. {
  3166. "raw_stack: skb_load_bytes, invalid access 3",
  3167. .insns = {
  3168. BPF_MOV64_IMM(BPF_REG_2, 4),
  3169. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3170. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 0xffffffff),
  3171. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3172. BPF_MOV64_IMM(BPF_REG_4, 0xffffffff),
  3173. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3174. BPF_FUNC_skb_load_bytes),
  3175. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3176. BPF_EXIT_INSN(),
  3177. },
  3178. .result = REJECT,
  3179. .errstr = "R4 min value is negative",
  3180. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3181. },
  3182. {
  3183. "raw_stack: skb_load_bytes, invalid access 4",
  3184. .insns = {
  3185. BPF_MOV64_IMM(BPF_REG_2, 4),
  3186. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3187. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -1),
  3188. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3189. BPF_MOV64_IMM(BPF_REG_4, 0x7fffffff),
  3190. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3191. BPF_FUNC_skb_load_bytes),
  3192. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3193. BPF_EXIT_INSN(),
  3194. },
  3195. .result = REJECT,
  3196. .errstr = "R4 unbounded memory access, use 'var &= const' or 'if (var < const)'",
  3197. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3198. },
  3199. {
  3200. "raw_stack: skb_load_bytes, invalid access 5",
  3201. .insns = {
  3202. BPF_MOV64_IMM(BPF_REG_2, 4),
  3203. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3204. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -512),
  3205. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3206. BPF_MOV64_IMM(BPF_REG_4, 0x7fffffff),
  3207. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3208. BPF_FUNC_skb_load_bytes),
  3209. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3210. BPF_EXIT_INSN(),
  3211. },
  3212. .result = REJECT,
  3213. .errstr = "R4 unbounded memory access, use 'var &= const' or 'if (var < const)'",
  3214. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3215. },
  3216. {
  3217. "raw_stack: skb_load_bytes, invalid access 6",
  3218. .insns = {
  3219. BPF_MOV64_IMM(BPF_REG_2, 4),
  3220. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3221. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -512),
  3222. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3223. BPF_MOV64_IMM(BPF_REG_4, 0),
  3224. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3225. BPF_FUNC_skb_load_bytes),
  3226. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3227. BPF_EXIT_INSN(),
  3228. },
  3229. .result = REJECT,
  3230. .errstr = "invalid stack type R3 off=-512 access_size=0",
  3231. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3232. },
  3233. {
  3234. "raw_stack: skb_load_bytes, large access",
  3235. .insns = {
  3236. BPF_MOV64_IMM(BPF_REG_2, 4),
  3237. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
  3238. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -512),
  3239. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  3240. BPF_MOV64_IMM(BPF_REG_4, 512),
  3241. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3242. BPF_FUNC_skb_load_bytes),
  3243. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  3244. BPF_EXIT_INSN(),
  3245. },
  3246. .result = ACCEPT,
  3247. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3248. },
  3249. {
  3250. "context stores via ST",
  3251. .insns = {
  3252. BPF_MOV64_IMM(BPF_REG_0, 0),
  3253. BPF_ST_MEM(BPF_DW, BPF_REG_1, offsetof(struct __sk_buff, mark), 0),
  3254. BPF_EXIT_INSN(),
  3255. },
  3256. .errstr = "BPF_ST stores into R1 context is not allowed",
  3257. .result = REJECT,
  3258. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3259. },
  3260. {
  3261. "context stores via XADD",
  3262. .insns = {
  3263. BPF_MOV64_IMM(BPF_REG_0, 0),
  3264. BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_W, BPF_REG_1,
  3265. BPF_REG_0, offsetof(struct __sk_buff, mark), 0),
  3266. BPF_EXIT_INSN(),
  3267. },
  3268. .errstr = "BPF_XADD stores into R1 context is not allowed",
  3269. .result = REJECT,
  3270. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3271. },
  3272. {
  3273. "direct packet access: test1",
  3274. .insns = {
  3275. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3276. offsetof(struct __sk_buff, data)),
  3277. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3278. offsetof(struct __sk_buff, data_end)),
  3279. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3280. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3281. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3282. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3283. BPF_MOV64_IMM(BPF_REG_0, 0),
  3284. BPF_EXIT_INSN(),
  3285. },
  3286. .result = ACCEPT,
  3287. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3288. },
  3289. {
  3290. "direct packet access: test2",
  3291. .insns = {
  3292. BPF_MOV64_IMM(BPF_REG_0, 1),
  3293. BPF_LDX_MEM(BPF_W, BPF_REG_4, BPF_REG_1,
  3294. offsetof(struct __sk_buff, data_end)),
  3295. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3296. offsetof(struct __sk_buff, data)),
  3297. BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
  3298. BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 14),
  3299. BPF_JMP_REG(BPF_JGT, BPF_REG_5, BPF_REG_4, 15),
  3300. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_3, 7),
  3301. BPF_LDX_MEM(BPF_B, BPF_REG_4, BPF_REG_3, 12),
  3302. BPF_ALU64_IMM(BPF_MUL, BPF_REG_4, 14),
  3303. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3304. offsetof(struct __sk_buff, data)),
  3305. BPF_ALU64_REG(BPF_ADD, BPF_REG_3, BPF_REG_4),
  3306. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3307. offsetof(struct __sk_buff, len)),
  3308. BPF_ALU64_IMM(BPF_LSH, BPF_REG_2, 49),
  3309. BPF_ALU64_IMM(BPF_RSH, BPF_REG_2, 49),
  3310. BPF_ALU64_REG(BPF_ADD, BPF_REG_3, BPF_REG_2),
  3311. BPF_MOV64_REG(BPF_REG_2, BPF_REG_3),
  3312. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 8),
  3313. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  3314. offsetof(struct __sk_buff, data_end)),
  3315. BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 1),
  3316. BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_3, 4),
  3317. BPF_MOV64_IMM(BPF_REG_0, 0),
  3318. BPF_EXIT_INSN(),
  3319. },
  3320. .result = ACCEPT,
  3321. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3322. },
  3323. {
  3324. "direct packet access: test3",
  3325. .insns = {
  3326. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3327. offsetof(struct __sk_buff, data)),
  3328. BPF_MOV64_IMM(BPF_REG_0, 0),
  3329. BPF_EXIT_INSN(),
  3330. },
  3331. .errstr = "invalid bpf_context access off=76",
  3332. .result = REJECT,
  3333. .prog_type = BPF_PROG_TYPE_SOCKET_FILTER,
  3334. },
  3335. {
  3336. "direct packet access: test4 (write)",
  3337. .insns = {
  3338. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3339. offsetof(struct __sk_buff, data)),
  3340. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3341. offsetof(struct __sk_buff, data_end)),
  3342. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3343. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3344. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3345. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  3346. BPF_MOV64_IMM(BPF_REG_0, 0),
  3347. BPF_EXIT_INSN(),
  3348. },
  3349. .result = ACCEPT,
  3350. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3351. },
  3352. {
  3353. "direct packet access: test5 (pkt_end >= reg, good access)",
  3354. .insns = {
  3355. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3356. offsetof(struct __sk_buff, data)),
  3357. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3358. offsetof(struct __sk_buff, data_end)),
  3359. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3360. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3361. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 2),
  3362. BPF_MOV64_IMM(BPF_REG_0, 1),
  3363. BPF_EXIT_INSN(),
  3364. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3365. BPF_MOV64_IMM(BPF_REG_0, 0),
  3366. BPF_EXIT_INSN(),
  3367. },
  3368. .result = ACCEPT,
  3369. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3370. },
  3371. {
  3372. "direct packet access: test6 (pkt_end >= reg, bad access)",
  3373. .insns = {
  3374. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3375. offsetof(struct __sk_buff, data)),
  3376. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3377. offsetof(struct __sk_buff, data_end)),
  3378. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3379. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3380. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 3),
  3381. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3382. BPF_MOV64_IMM(BPF_REG_0, 1),
  3383. BPF_EXIT_INSN(),
  3384. BPF_MOV64_IMM(BPF_REG_0, 0),
  3385. BPF_EXIT_INSN(),
  3386. },
  3387. .errstr = "invalid access to packet",
  3388. .result = REJECT,
  3389. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3390. },
  3391. {
  3392. "direct packet access: test7 (pkt_end >= reg, both accesses)",
  3393. .insns = {
  3394. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3395. offsetof(struct __sk_buff, data)),
  3396. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3397. offsetof(struct __sk_buff, data_end)),
  3398. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3399. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3400. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 3),
  3401. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3402. BPF_MOV64_IMM(BPF_REG_0, 1),
  3403. BPF_EXIT_INSN(),
  3404. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3405. BPF_MOV64_IMM(BPF_REG_0, 0),
  3406. BPF_EXIT_INSN(),
  3407. },
  3408. .errstr = "invalid access to packet",
  3409. .result = REJECT,
  3410. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3411. },
  3412. {
  3413. "direct packet access: test8 (double test, variant 1)",
  3414. .insns = {
  3415. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3416. offsetof(struct __sk_buff, data)),
  3417. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3418. offsetof(struct __sk_buff, data_end)),
  3419. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3420. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3421. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 4),
  3422. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3423. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3424. BPF_MOV64_IMM(BPF_REG_0, 1),
  3425. BPF_EXIT_INSN(),
  3426. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3427. BPF_MOV64_IMM(BPF_REG_0, 0),
  3428. BPF_EXIT_INSN(),
  3429. },
  3430. .result = ACCEPT,
  3431. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3432. },
  3433. {
  3434. "direct packet access: test9 (double test, variant 2)",
  3435. .insns = {
  3436. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3437. offsetof(struct __sk_buff, data)),
  3438. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3439. offsetof(struct __sk_buff, data_end)),
  3440. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3441. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3442. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 2),
  3443. BPF_MOV64_IMM(BPF_REG_0, 1),
  3444. BPF_EXIT_INSN(),
  3445. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3446. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3447. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3448. BPF_MOV64_IMM(BPF_REG_0, 0),
  3449. BPF_EXIT_INSN(),
  3450. },
  3451. .result = ACCEPT,
  3452. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3453. },
  3454. {
  3455. "direct packet access: test10 (write invalid)",
  3456. .insns = {
  3457. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3458. offsetof(struct __sk_buff, data)),
  3459. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3460. offsetof(struct __sk_buff, data_end)),
  3461. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3462. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3463. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 2),
  3464. BPF_MOV64_IMM(BPF_REG_0, 0),
  3465. BPF_EXIT_INSN(),
  3466. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  3467. BPF_MOV64_IMM(BPF_REG_0, 0),
  3468. BPF_EXIT_INSN(),
  3469. },
  3470. .errstr = "invalid access to packet",
  3471. .result = REJECT,
  3472. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3473. },
  3474. {
  3475. "direct packet access: test11 (shift, good access)",
  3476. .insns = {
  3477. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3478. offsetof(struct __sk_buff, data)),
  3479. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3480. offsetof(struct __sk_buff, data_end)),
  3481. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3482. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 22),
  3483. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 8),
  3484. BPF_MOV64_IMM(BPF_REG_3, 144),
  3485. BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
  3486. BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 23),
  3487. BPF_ALU64_IMM(BPF_RSH, BPF_REG_5, 3),
  3488. BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
  3489. BPF_ALU64_REG(BPF_ADD, BPF_REG_6, BPF_REG_5),
  3490. BPF_MOV64_IMM(BPF_REG_0, 1),
  3491. BPF_EXIT_INSN(),
  3492. BPF_MOV64_IMM(BPF_REG_0, 0),
  3493. BPF_EXIT_INSN(),
  3494. },
  3495. .result = ACCEPT,
  3496. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3497. .retval = 1,
  3498. },
  3499. {
  3500. "direct packet access: test12 (and, good access)",
  3501. .insns = {
  3502. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3503. offsetof(struct __sk_buff, data)),
  3504. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3505. offsetof(struct __sk_buff, data_end)),
  3506. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3507. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 22),
  3508. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 8),
  3509. BPF_MOV64_IMM(BPF_REG_3, 144),
  3510. BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
  3511. BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 23),
  3512. BPF_ALU64_IMM(BPF_AND, BPF_REG_5, 15),
  3513. BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
  3514. BPF_ALU64_REG(BPF_ADD, BPF_REG_6, BPF_REG_5),
  3515. BPF_MOV64_IMM(BPF_REG_0, 1),
  3516. BPF_EXIT_INSN(),
  3517. BPF_MOV64_IMM(BPF_REG_0, 0),
  3518. BPF_EXIT_INSN(),
  3519. },
  3520. .result = ACCEPT,
  3521. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3522. .retval = 1,
  3523. },
  3524. {
  3525. "direct packet access: test13 (branches, good access)",
  3526. .insns = {
  3527. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3528. offsetof(struct __sk_buff, data)),
  3529. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3530. offsetof(struct __sk_buff, data_end)),
  3531. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3532. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 22),
  3533. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 13),
  3534. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3535. offsetof(struct __sk_buff, mark)),
  3536. BPF_MOV64_IMM(BPF_REG_4, 1),
  3537. BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_4, 2),
  3538. BPF_MOV64_IMM(BPF_REG_3, 14),
  3539. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  3540. BPF_MOV64_IMM(BPF_REG_3, 24),
  3541. BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
  3542. BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 23),
  3543. BPF_ALU64_IMM(BPF_AND, BPF_REG_5, 15),
  3544. BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
  3545. BPF_ALU64_REG(BPF_ADD, BPF_REG_6, BPF_REG_5),
  3546. BPF_MOV64_IMM(BPF_REG_0, 1),
  3547. BPF_EXIT_INSN(),
  3548. BPF_MOV64_IMM(BPF_REG_0, 0),
  3549. BPF_EXIT_INSN(),
  3550. },
  3551. .result = ACCEPT,
  3552. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3553. .retval = 1,
  3554. },
  3555. {
  3556. "direct packet access: test14 (pkt_ptr += 0, CONST_IMM, good access)",
  3557. .insns = {
  3558. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3559. offsetof(struct __sk_buff, data)),
  3560. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3561. offsetof(struct __sk_buff, data_end)),
  3562. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3563. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 22),
  3564. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 7),
  3565. BPF_MOV64_IMM(BPF_REG_5, 12),
  3566. BPF_ALU64_IMM(BPF_RSH, BPF_REG_5, 4),
  3567. BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
  3568. BPF_ALU64_REG(BPF_ADD, BPF_REG_6, BPF_REG_5),
  3569. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_6, 0),
  3570. BPF_MOV64_IMM(BPF_REG_0, 1),
  3571. BPF_EXIT_INSN(),
  3572. BPF_MOV64_IMM(BPF_REG_0, 0),
  3573. BPF_EXIT_INSN(),
  3574. },
  3575. .result = ACCEPT,
  3576. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3577. .retval = 1,
  3578. },
  3579. {
  3580. "direct packet access: test15 (spill with xadd)",
  3581. .insns = {
  3582. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3583. offsetof(struct __sk_buff, data)),
  3584. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3585. offsetof(struct __sk_buff, data_end)),
  3586. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3587. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3588. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 8),
  3589. BPF_MOV64_IMM(BPF_REG_5, 4096),
  3590. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  3591. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  3592. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  3593. BPF_STX_XADD(BPF_DW, BPF_REG_4, BPF_REG_5, 0),
  3594. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_4, 0),
  3595. BPF_STX_MEM(BPF_W, BPF_REG_2, BPF_REG_5, 0),
  3596. BPF_MOV64_IMM(BPF_REG_0, 0),
  3597. BPF_EXIT_INSN(),
  3598. },
  3599. .errstr = "R2 invalid mem access 'inv'",
  3600. .result = REJECT,
  3601. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3602. },
  3603. {
  3604. "direct packet access: test16 (arith on data_end)",
  3605. .insns = {
  3606. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3607. offsetof(struct __sk_buff, data)),
  3608. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3609. offsetof(struct __sk_buff, data_end)),
  3610. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3611. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3612. BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, 16),
  3613. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3614. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  3615. BPF_MOV64_IMM(BPF_REG_0, 0),
  3616. BPF_EXIT_INSN(),
  3617. },
  3618. .errstr = "R3 pointer arithmetic on PTR_TO_PACKET_END",
  3619. .result = REJECT,
  3620. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3621. },
  3622. {
  3623. "direct packet access: test17 (pruning, alignment)",
  3624. .insns = {
  3625. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3626. offsetof(struct __sk_buff, data)),
  3627. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3628. offsetof(struct __sk_buff, data_end)),
  3629. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  3630. offsetof(struct __sk_buff, mark)),
  3631. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3632. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 14),
  3633. BPF_JMP_IMM(BPF_JGT, BPF_REG_7, 1, 4),
  3634. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3635. BPF_STX_MEM(BPF_W, BPF_REG_0, BPF_REG_0, -4),
  3636. BPF_MOV64_IMM(BPF_REG_0, 0),
  3637. BPF_EXIT_INSN(),
  3638. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 1),
  3639. BPF_JMP_A(-6),
  3640. },
  3641. .errstr = "misaligned packet access off 2+(0x0; 0x0)+15+-4 size 4",
  3642. .result = REJECT,
  3643. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3644. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  3645. },
  3646. {
  3647. "direct packet access: test18 (imm += pkt_ptr, 1)",
  3648. .insns = {
  3649. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3650. offsetof(struct __sk_buff, data)),
  3651. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3652. offsetof(struct __sk_buff, data_end)),
  3653. BPF_MOV64_IMM(BPF_REG_0, 8),
  3654. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  3655. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3656. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  3657. BPF_MOV64_IMM(BPF_REG_0, 0),
  3658. BPF_EXIT_INSN(),
  3659. },
  3660. .result = ACCEPT,
  3661. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3662. },
  3663. {
  3664. "direct packet access: test19 (imm += pkt_ptr, 2)",
  3665. .insns = {
  3666. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3667. offsetof(struct __sk_buff, data)),
  3668. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3669. offsetof(struct __sk_buff, data_end)),
  3670. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3671. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3672. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 3),
  3673. BPF_MOV64_IMM(BPF_REG_4, 4),
  3674. BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_2),
  3675. BPF_STX_MEM(BPF_B, BPF_REG_4, BPF_REG_4, 0),
  3676. BPF_MOV64_IMM(BPF_REG_0, 0),
  3677. BPF_EXIT_INSN(),
  3678. },
  3679. .result = ACCEPT,
  3680. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3681. },
  3682. {
  3683. "direct packet access: test20 (x += pkt_ptr, 1)",
  3684. .insns = {
  3685. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3686. offsetof(struct __sk_buff, data)),
  3687. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3688. offsetof(struct __sk_buff, data_end)),
  3689. BPF_MOV64_IMM(BPF_REG_0, 0xffffffff),
  3690. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  3691. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  3692. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0x7fff),
  3693. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  3694. BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_2),
  3695. BPF_MOV64_REG(BPF_REG_5, BPF_REG_4),
  3696. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 0x7fff - 1),
  3697. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 1),
  3698. BPF_STX_MEM(BPF_DW, BPF_REG_5, BPF_REG_4, 0),
  3699. BPF_MOV64_IMM(BPF_REG_0, 0),
  3700. BPF_EXIT_INSN(),
  3701. },
  3702. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3703. .result = ACCEPT,
  3704. },
  3705. {
  3706. "direct packet access: test21 (x += pkt_ptr, 2)",
  3707. .insns = {
  3708. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3709. offsetof(struct __sk_buff, data)),
  3710. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3711. offsetof(struct __sk_buff, data_end)),
  3712. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3713. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3714. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 9),
  3715. BPF_MOV64_IMM(BPF_REG_4, 0xffffffff),
  3716. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -8),
  3717. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  3718. BPF_ALU64_IMM(BPF_AND, BPF_REG_4, 0x7fff),
  3719. BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_2),
  3720. BPF_MOV64_REG(BPF_REG_5, BPF_REG_4),
  3721. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 0x7fff - 1),
  3722. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 1),
  3723. BPF_STX_MEM(BPF_DW, BPF_REG_5, BPF_REG_4, 0),
  3724. BPF_MOV64_IMM(BPF_REG_0, 0),
  3725. BPF_EXIT_INSN(),
  3726. },
  3727. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3728. .result = ACCEPT,
  3729. },
  3730. {
  3731. "direct packet access: test22 (x += pkt_ptr, 3)",
  3732. .insns = {
  3733. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3734. offsetof(struct __sk_buff, data)),
  3735. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3736. offsetof(struct __sk_buff, data_end)),
  3737. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3738. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3739. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -8),
  3740. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_3, -16),
  3741. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_10, -16),
  3742. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 11),
  3743. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -8),
  3744. BPF_MOV64_IMM(BPF_REG_4, 0xffffffff),
  3745. BPF_STX_XADD(BPF_DW, BPF_REG_10, BPF_REG_4, -8),
  3746. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  3747. BPF_ALU64_IMM(BPF_RSH, BPF_REG_4, 49),
  3748. BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_2),
  3749. BPF_MOV64_REG(BPF_REG_0, BPF_REG_4),
  3750. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 2),
  3751. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 2),
  3752. BPF_MOV64_IMM(BPF_REG_2, 1),
  3753. BPF_STX_MEM(BPF_H, BPF_REG_4, BPF_REG_2, 0),
  3754. BPF_MOV64_IMM(BPF_REG_0, 0),
  3755. BPF_EXIT_INSN(),
  3756. },
  3757. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3758. .result = ACCEPT,
  3759. },
  3760. {
  3761. "direct packet access: test23 (x += pkt_ptr, 4)",
  3762. .insns = {
  3763. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3764. offsetof(struct __sk_buff, data)),
  3765. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3766. offsetof(struct __sk_buff, data_end)),
  3767. BPF_MOV64_IMM(BPF_REG_0, 0xffffffff),
  3768. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  3769. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  3770. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xffff),
  3771. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  3772. BPF_MOV64_IMM(BPF_REG_0, 31),
  3773. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_4),
  3774. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  3775. BPF_MOV64_REG(BPF_REG_5, BPF_REG_0),
  3776. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 0xffff - 1),
  3777. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3778. BPF_STX_MEM(BPF_DW, BPF_REG_5, BPF_REG_0, 0),
  3779. BPF_MOV64_IMM(BPF_REG_0, 0),
  3780. BPF_EXIT_INSN(),
  3781. },
  3782. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3783. .result = REJECT,
  3784. .errstr = "invalid access to packet, off=0 size=8, R5(id=1,off=0,r=0)",
  3785. },
  3786. {
  3787. "direct packet access: test24 (x += pkt_ptr, 5)",
  3788. .insns = {
  3789. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3790. offsetof(struct __sk_buff, data)),
  3791. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3792. offsetof(struct __sk_buff, data_end)),
  3793. BPF_MOV64_IMM(BPF_REG_0, 0xffffffff),
  3794. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  3795. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  3796. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 0xff),
  3797. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  3798. BPF_MOV64_IMM(BPF_REG_0, 64),
  3799. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_4),
  3800. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  3801. BPF_MOV64_REG(BPF_REG_5, BPF_REG_0),
  3802. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 0x7fff - 1),
  3803. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  3804. BPF_STX_MEM(BPF_DW, BPF_REG_5, BPF_REG_0, 0),
  3805. BPF_MOV64_IMM(BPF_REG_0, 0),
  3806. BPF_EXIT_INSN(),
  3807. },
  3808. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3809. .result = ACCEPT,
  3810. },
  3811. {
  3812. "direct packet access: test25 (marking on <, good access)",
  3813. .insns = {
  3814. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3815. offsetof(struct __sk_buff, data)),
  3816. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3817. offsetof(struct __sk_buff, data_end)),
  3818. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3819. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3820. BPF_JMP_REG(BPF_JLT, BPF_REG_0, BPF_REG_3, 2),
  3821. BPF_MOV64_IMM(BPF_REG_0, 0),
  3822. BPF_EXIT_INSN(),
  3823. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3824. BPF_JMP_IMM(BPF_JA, 0, 0, -4),
  3825. },
  3826. .result = ACCEPT,
  3827. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3828. },
  3829. {
  3830. "direct packet access: test26 (marking on <, bad access)",
  3831. .insns = {
  3832. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3833. offsetof(struct __sk_buff, data)),
  3834. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3835. offsetof(struct __sk_buff, data_end)),
  3836. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3837. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3838. BPF_JMP_REG(BPF_JLT, BPF_REG_0, BPF_REG_3, 3),
  3839. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3840. BPF_MOV64_IMM(BPF_REG_0, 0),
  3841. BPF_EXIT_INSN(),
  3842. BPF_JMP_IMM(BPF_JA, 0, 0, -3),
  3843. },
  3844. .result = REJECT,
  3845. .errstr = "invalid access to packet",
  3846. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3847. },
  3848. {
  3849. "direct packet access: test27 (marking on <=, good access)",
  3850. .insns = {
  3851. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3852. offsetof(struct __sk_buff, data)),
  3853. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3854. offsetof(struct __sk_buff, data_end)),
  3855. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3856. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3857. BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_0, 1),
  3858. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3859. BPF_MOV64_IMM(BPF_REG_0, 1),
  3860. BPF_EXIT_INSN(),
  3861. },
  3862. .result = ACCEPT,
  3863. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3864. .retval = 1,
  3865. },
  3866. {
  3867. "direct packet access: test28 (marking on <=, bad access)",
  3868. .insns = {
  3869. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3870. offsetof(struct __sk_buff, data)),
  3871. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3872. offsetof(struct __sk_buff, data_end)),
  3873. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  3874. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  3875. BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_0, 2),
  3876. BPF_MOV64_IMM(BPF_REG_0, 1),
  3877. BPF_EXIT_INSN(),
  3878. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  3879. BPF_JMP_IMM(BPF_JA, 0, 0, -4),
  3880. },
  3881. .result = REJECT,
  3882. .errstr = "invalid access to packet",
  3883. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  3884. },
  3885. {
  3886. "helper access to packet: test1, valid packet_ptr range",
  3887. .insns = {
  3888. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3889. offsetof(struct xdp_md, data)),
  3890. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3891. offsetof(struct xdp_md, data_end)),
  3892. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  3893. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  3894. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 5),
  3895. BPF_LD_MAP_FD(BPF_REG_1, 0),
  3896. BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
  3897. BPF_MOV64_IMM(BPF_REG_4, 0),
  3898. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3899. BPF_FUNC_map_update_elem),
  3900. BPF_MOV64_IMM(BPF_REG_0, 0),
  3901. BPF_EXIT_INSN(),
  3902. },
  3903. .fixup_map1 = { 5 },
  3904. .result_unpriv = ACCEPT,
  3905. .result = ACCEPT,
  3906. .prog_type = BPF_PROG_TYPE_XDP,
  3907. },
  3908. {
  3909. "helper access to packet: test2, unchecked packet_ptr",
  3910. .insns = {
  3911. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3912. offsetof(struct xdp_md, data)),
  3913. BPF_LD_MAP_FD(BPF_REG_1, 0),
  3914. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3915. BPF_FUNC_map_lookup_elem),
  3916. BPF_MOV64_IMM(BPF_REG_0, 0),
  3917. BPF_EXIT_INSN(),
  3918. },
  3919. .fixup_map1 = { 1 },
  3920. .result = REJECT,
  3921. .errstr = "invalid access to packet",
  3922. .prog_type = BPF_PROG_TYPE_XDP,
  3923. },
  3924. {
  3925. "helper access to packet: test3, variable add",
  3926. .insns = {
  3927. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3928. offsetof(struct xdp_md, data)),
  3929. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3930. offsetof(struct xdp_md, data_end)),
  3931. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  3932. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 8),
  3933. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 10),
  3934. BPF_LDX_MEM(BPF_B, BPF_REG_5, BPF_REG_2, 0),
  3935. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  3936. BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_5),
  3937. BPF_MOV64_REG(BPF_REG_5, BPF_REG_4),
  3938. BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 8),
  3939. BPF_JMP_REG(BPF_JGT, BPF_REG_5, BPF_REG_3, 4),
  3940. BPF_LD_MAP_FD(BPF_REG_1, 0),
  3941. BPF_MOV64_REG(BPF_REG_2, BPF_REG_4),
  3942. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3943. BPF_FUNC_map_lookup_elem),
  3944. BPF_MOV64_IMM(BPF_REG_0, 0),
  3945. BPF_EXIT_INSN(),
  3946. },
  3947. .fixup_map1 = { 11 },
  3948. .result = ACCEPT,
  3949. .prog_type = BPF_PROG_TYPE_XDP,
  3950. },
  3951. {
  3952. "helper access to packet: test4, packet_ptr with bad range",
  3953. .insns = {
  3954. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3955. offsetof(struct xdp_md, data)),
  3956. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3957. offsetof(struct xdp_md, data_end)),
  3958. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  3959. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 4),
  3960. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 2),
  3961. BPF_MOV64_IMM(BPF_REG_0, 0),
  3962. BPF_EXIT_INSN(),
  3963. BPF_LD_MAP_FD(BPF_REG_1, 0),
  3964. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3965. BPF_FUNC_map_lookup_elem),
  3966. BPF_MOV64_IMM(BPF_REG_0, 0),
  3967. BPF_EXIT_INSN(),
  3968. },
  3969. .fixup_map1 = { 7 },
  3970. .result = REJECT,
  3971. .errstr = "invalid access to packet",
  3972. .prog_type = BPF_PROG_TYPE_XDP,
  3973. },
  3974. {
  3975. "helper access to packet: test5, packet_ptr with too short range",
  3976. .insns = {
  3977. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  3978. offsetof(struct xdp_md, data)),
  3979. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  3980. offsetof(struct xdp_md, data_end)),
  3981. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
  3982. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  3983. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 7),
  3984. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 3),
  3985. BPF_LD_MAP_FD(BPF_REG_1, 0),
  3986. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  3987. BPF_FUNC_map_lookup_elem),
  3988. BPF_MOV64_IMM(BPF_REG_0, 0),
  3989. BPF_EXIT_INSN(),
  3990. },
  3991. .fixup_map1 = { 6 },
  3992. .result = REJECT,
  3993. .errstr = "invalid access to packet",
  3994. .prog_type = BPF_PROG_TYPE_XDP,
  3995. },
  3996. {
  3997. "helper access to packet: test6, cls valid packet_ptr range",
  3998. .insns = {
  3999. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  4000. offsetof(struct __sk_buff, data)),
  4001. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  4002. offsetof(struct __sk_buff, data_end)),
  4003. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  4004. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  4005. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 5),
  4006. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4007. BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
  4008. BPF_MOV64_IMM(BPF_REG_4, 0),
  4009. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4010. BPF_FUNC_map_update_elem),
  4011. BPF_MOV64_IMM(BPF_REG_0, 0),
  4012. BPF_EXIT_INSN(),
  4013. },
  4014. .fixup_map1 = { 5 },
  4015. .result = ACCEPT,
  4016. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4017. },
  4018. {
  4019. "helper access to packet: test7, cls unchecked packet_ptr",
  4020. .insns = {
  4021. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  4022. offsetof(struct __sk_buff, data)),
  4023. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4024. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4025. BPF_FUNC_map_lookup_elem),
  4026. BPF_MOV64_IMM(BPF_REG_0, 0),
  4027. BPF_EXIT_INSN(),
  4028. },
  4029. .fixup_map1 = { 1 },
  4030. .result = REJECT,
  4031. .errstr = "invalid access to packet",
  4032. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4033. },
  4034. {
  4035. "helper access to packet: test8, cls variable add",
  4036. .insns = {
  4037. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  4038. offsetof(struct __sk_buff, data)),
  4039. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  4040. offsetof(struct __sk_buff, data_end)),
  4041. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  4042. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 8),
  4043. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 10),
  4044. BPF_LDX_MEM(BPF_B, BPF_REG_5, BPF_REG_2, 0),
  4045. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  4046. BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_5),
  4047. BPF_MOV64_REG(BPF_REG_5, BPF_REG_4),
  4048. BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 8),
  4049. BPF_JMP_REG(BPF_JGT, BPF_REG_5, BPF_REG_3, 4),
  4050. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4051. BPF_MOV64_REG(BPF_REG_2, BPF_REG_4),
  4052. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4053. BPF_FUNC_map_lookup_elem),
  4054. BPF_MOV64_IMM(BPF_REG_0, 0),
  4055. BPF_EXIT_INSN(),
  4056. },
  4057. .fixup_map1 = { 11 },
  4058. .result = ACCEPT,
  4059. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4060. },
  4061. {
  4062. "helper access to packet: test9, cls packet_ptr with bad range",
  4063. .insns = {
  4064. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  4065. offsetof(struct __sk_buff, data)),
  4066. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  4067. offsetof(struct __sk_buff, data_end)),
  4068. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  4069. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 4),
  4070. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 2),
  4071. BPF_MOV64_IMM(BPF_REG_0, 0),
  4072. BPF_EXIT_INSN(),
  4073. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4074. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4075. BPF_FUNC_map_lookup_elem),
  4076. BPF_MOV64_IMM(BPF_REG_0, 0),
  4077. BPF_EXIT_INSN(),
  4078. },
  4079. .fixup_map1 = { 7 },
  4080. .result = REJECT,
  4081. .errstr = "invalid access to packet",
  4082. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4083. },
  4084. {
  4085. "helper access to packet: test10, cls packet_ptr with too short range",
  4086. .insns = {
  4087. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  4088. offsetof(struct __sk_buff, data)),
  4089. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  4090. offsetof(struct __sk_buff, data_end)),
  4091. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
  4092. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  4093. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 7),
  4094. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 3),
  4095. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4096. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4097. BPF_FUNC_map_lookup_elem),
  4098. BPF_MOV64_IMM(BPF_REG_0, 0),
  4099. BPF_EXIT_INSN(),
  4100. },
  4101. .fixup_map1 = { 6 },
  4102. .result = REJECT,
  4103. .errstr = "invalid access to packet",
  4104. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4105. },
  4106. {
  4107. "helper access to packet: test11, cls unsuitable helper 1",
  4108. .insns = {
  4109. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4110. offsetof(struct __sk_buff, data)),
  4111. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4112. offsetof(struct __sk_buff, data_end)),
  4113. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4114. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  4115. BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, 7),
  4116. BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_7, 4),
  4117. BPF_MOV64_IMM(BPF_REG_2, 0),
  4118. BPF_MOV64_IMM(BPF_REG_4, 42),
  4119. BPF_MOV64_IMM(BPF_REG_5, 0),
  4120. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4121. BPF_FUNC_skb_store_bytes),
  4122. BPF_MOV64_IMM(BPF_REG_0, 0),
  4123. BPF_EXIT_INSN(),
  4124. },
  4125. .result = REJECT,
  4126. .errstr = "helper access to the packet",
  4127. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4128. },
  4129. {
  4130. "helper access to packet: test12, cls unsuitable helper 2",
  4131. .insns = {
  4132. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4133. offsetof(struct __sk_buff, data)),
  4134. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4135. offsetof(struct __sk_buff, data_end)),
  4136. BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
  4137. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 8),
  4138. BPF_JMP_REG(BPF_JGT, BPF_REG_6, BPF_REG_7, 3),
  4139. BPF_MOV64_IMM(BPF_REG_2, 0),
  4140. BPF_MOV64_IMM(BPF_REG_4, 4),
  4141. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4142. BPF_FUNC_skb_load_bytes),
  4143. BPF_MOV64_IMM(BPF_REG_0, 0),
  4144. BPF_EXIT_INSN(),
  4145. },
  4146. .result = REJECT,
  4147. .errstr = "helper access to the packet",
  4148. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4149. },
  4150. {
  4151. "helper access to packet: test13, cls helper ok",
  4152. .insns = {
  4153. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4154. offsetof(struct __sk_buff, data)),
  4155. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4156. offsetof(struct __sk_buff, data_end)),
  4157. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4158. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4159. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4160. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4161. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4162. BPF_MOV64_IMM(BPF_REG_2, 4),
  4163. BPF_MOV64_IMM(BPF_REG_3, 0),
  4164. BPF_MOV64_IMM(BPF_REG_4, 0),
  4165. BPF_MOV64_IMM(BPF_REG_5, 0),
  4166. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4167. BPF_FUNC_csum_diff),
  4168. BPF_MOV64_IMM(BPF_REG_0, 0),
  4169. BPF_EXIT_INSN(),
  4170. },
  4171. .result = ACCEPT,
  4172. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4173. },
  4174. {
  4175. "helper access to packet: test14, cls helper ok sub",
  4176. .insns = {
  4177. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4178. offsetof(struct __sk_buff, data)),
  4179. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4180. offsetof(struct __sk_buff, data_end)),
  4181. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4182. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4183. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4184. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4185. BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 4),
  4186. BPF_MOV64_IMM(BPF_REG_2, 4),
  4187. BPF_MOV64_IMM(BPF_REG_3, 0),
  4188. BPF_MOV64_IMM(BPF_REG_4, 0),
  4189. BPF_MOV64_IMM(BPF_REG_5, 0),
  4190. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4191. BPF_FUNC_csum_diff),
  4192. BPF_MOV64_IMM(BPF_REG_0, 0),
  4193. BPF_EXIT_INSN(),
  4194. },
  4195. .result = ACCEPT,
  4196. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4197. },
  4198. {
  4199. "helper access to packet: test15, cls helper fail sub",
  4200. .insns = {
  4201. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4202. offsetof(struct __sk_buff, data)),
  4203. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4204. offsetof(struct __sk_buff, data_end)),
  4205. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4206. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4207. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4208. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4209. BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 12),
  4210. BPF_MOV64_IMM(BPF_REG_2, 4),
  4211. BPF_MOV64_IMM(BPF_REG_3, 0),
  4212. BPF_MOV64_IMM(BPF_REG_4, 0),
  4213. BPF_MOV64_IMM(BPF_REG_5, 0),
  4214. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4215. BPF_FUNC_csum_diff),
  4216. BPF_MOV64_IMM(BPF_REG_0, 0),
  4217. BPF_EXIT_INSN(),
  4218. },
  4219. .result = REJECT,
  4220. .errstr = "invalid access to packet",
  4221. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4222. },
  4223. {
  4224. "helper access to packet: test16, cls helper fail range 1",
  4225. .insns = {
  4226. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4227. offsetof(struct __sk_buff, data)),
  4228. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4229. offsetof(struct __sk_buff, data_end)),
  4230. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4231. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4232. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4233. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4234. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4235. BPF_MOV64_IMM(BPF_REG_2, 8),
  4236. BPF_MOV64_IMM(BPF_REG_3, 0),
  4237. BPF_MOV64_IMM(BPF_REG_4, 0),
  4238. BPF_MOV64_IMM(BPF_REG_5, 0),
  4239. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4240. BPF_FUNC_csum_diff),
  4241. BPF_MOV64_IMM(BPF_REG_0, 0),
  4242. BPF_EXIT_INSN(),
  4243. },
  4244. .result = REJECT,
  4245. .errstr = "invalid access to packet",
  4246. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4247. },
  4248. {
  4249. "helper access to packet: test17, cls helper fail range 2",
  4250. .insns = {
  4251. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4252. offsetof(struct __sk_buff, data)),
  4253. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4254. offsetof(struct __sk_buff, data_end)),
  4255. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4256. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4257. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4258. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4259. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4260. BPF_MOV64_IMM(BPF_REG_2, -9),
  4261. BPF_MOV64_IMM(BPF_REG_3, 0),
  4262. BPF_MOV64_IMM(BPF_REG_4, 0),
  4263. BPF_MOV64_IMM(BPF_REG_5, 0),
  4264. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4265. BPF_FUNC_csum_diff),
  4266. BPF_MOV64_IMM(BPF_REG_0, 0),
  4267. BPF_EXIT_INSN(),
  4268. },
  4269. .result = REJECT,
  4270. .errstr = "R2 min value is negative",
  4271. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4272. },
  4273. {
  4274. "helper access to packet: test18, cls helper fail range 3",
  4275. .insns = {
  4276. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4277. offsetof(struct __sk_buff, data)),
  4278. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4279. offsetof(struct __sk_buff, data_end)),
  4280. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4281. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4282. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4283. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4284. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4285. BPF_MOV64_IMM(BPF_REG_2, ~0),
  4286. BPF_MOV64_IMM(BPF_REG_3, 0),
  4287. BPF_MOV64_IMM(BPF_REG_4, 0),
  4288. BPF_MOV64_IMM(BPF_REG_5, 0),
  4289. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4290. BPF_FUNC_csum_diff),
  4291. BPF_MOV64_IMM(BPF_REG_0, 0),
  4292. BPF_EXIT_INSN(),
  4293. },
  4294. .result = REJECT,
  4295. .errstr = "R2 min value is negative",
  4296. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4297. },
  4298. {
  4299. "helper access to packet: test19, cls helper range zero",
  4300. .insns = {
  4301. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4302. offsetof(struct __sk_buff, data)),
  4303. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4304. offsetof(struct __sk_buff, data_end)),
  4305. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4306. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4307. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4308. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4309. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4310. BPF_MOV64_IMM(BPF_REG_2, 0),
  4311. BPF_MOV64_IMM(BPF_REG_3, 0),
  4312. BPF_MOV64_IMM(BPF_REG_4, 0),
  4313. BPF_MOV64_IMM(BPF_REG_5, 0),
  4314. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4315. BPF_FUNC_csum_diff),
  4316. BPF_MOV64_IMM(BPF_REG_0, 0),
  4317. BPF_EXIT_INSN(),
  4318. },
  4319. .result = ACCEPT,
  4320. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4321. },
  4322. {
  4323. "helper access to packet: test20, pkt end as input",
  4324. .insns = {
  4325. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4326. offsetof(struct __sk_buff, data)),
  4327. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4328. offsetof(struct __sk_buff, data_end)),
  4329. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4330. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4331. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4332. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4333. BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
  4334. BPF_MOV64_IMM(BPF_REG_2, 4),
  4335. BPF_MOV64_IMM(BPF_REG_3, 0),
  4336. BPF_MOV64_IMM(BPF_REG_4, 0),
  4337. BPF_MOV64_IMM(BPF_REG_5, 0),
  4338. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4339. BPF_FUNC_csum_diff),
  4340. BPF_MOV64_IMM(BPF_REG_0, 0),
  4341. BPF_EXIT_INSN(),
  4342. },
  4343. .result = REJECT,
  4344. .errstr = "R1 type=pkt_end expected=fp",
  4345. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4346. },
  4347. {
  4348. "helper access to packet: test21, wrong reg",
  4349. .insns = {
  4350. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  4351. offsetof(struct __sk_buff, data)),
  4352. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  4353. offsetof(struct __sk_buff, data_end)),
  4354. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
  4355. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  4356. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
  4357. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
  4358. BPF_MOV64_IMM(BPF_REG_2, 4),
  4359. BPF_MOV64_IMM(BPF_REG_3, 0),
  4360. BPF_MOV64_IMM(BPF_REG_4, 0),
  4361. BPF_MOV64_IMM(BPF_REG_5, 0),
  4362. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4363. BPF_FUNC_csum_diff),
  4364. BPF_MOV64_IMM(BPF_REG_0, 0),
  4365. BPF_EXIT_INSN(),
  4366. },
  4367. .result = REJECT,
  4368. .errstr = "invalid access to packet",
  4369. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  4370. },
  4371. {
  4372. "valid map access into an array with a constant",
  4373. .insns = {
  4374. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4375. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4376. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4377. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4378. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4379. BPF_FUNC_map_lookup_elem),
  4380. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  4381. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  4382. offsetof(struct test_val, foo)),
  4383. BPF_EXIT_INSN(),
  4384. },
  4385. .fixup_map2 = { 3 },
  4386. .errstr_unpriv = "R0 leaks addr",
  4387. .result_unpriv = REJECT,
  4388. .result = ACCEPT,
  4389. },
  4390. {
  4391. "valid map access into an array with a register",
  4392. .insns = {
  4393. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4394. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4395. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4396. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4397. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4398. BPF_FUNC_map_lookup_elem),
  4399. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  4400. BPF_MOV64_IMM(BPF_REG_1, 4),
  4401. BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
  4402. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  4403. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  4404. offsetof(struct test_val, foo)),
  4405. BPF_EXIT_INSN(),
  4406. },
  4407. .fixup_map2 = { 3 },
  4408. .errstr_unpriv = "R0 leaks addr",
  4409. .result_unpriv = REJECT,
  4410. .result = ACCEPT,
  4411. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4412. },
  4413. {
  4414. "valid map access into an array with a variable",
  4415. .insns = {
  4416. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4417. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4418. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4419. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4420. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4421. BPF_FUNC_map_lookup_elem),
  4422. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  4423. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4424. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, MAX_ENTRIES, 3),
  4425. BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
  4426. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  4427. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  4428. offsetof(struct test_val, foo)),
  4429. BPF_EXIT_INSN(),
  4430. },
  4431. .fixup_map2 = { 3 },
  4432. .errstr_unpriv = "R0 leaks addr",
  4433. .result_unpriv = REJECT,
  4434. .result = ACCEPT,
  4435. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4436. },
  4437. {
  4438. "valid map access into an array with a signed variable",
  4439. .insns = {
  4440. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4441. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4442. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4443. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4444. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4445. BPF_FUNC_map_lookup_elem),
  4446. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  4447. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4448. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 0xffffffff, 1),
  4449. BPF_MOV32_IMM(BPF_REG_1, 0),
  4450. BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES),
  4451. BPF_JMP_REG(BPF_JSGT, BPF_REG_2, BPF_REG_1, 1),
  4452. BPF_MOV32_IMM(BPF_REG_1, 0),
  4453. BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2),
  4454. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  4455. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  4456. offsetof(struct test_val, foo)),
  4457. BPF_EXIT_INSN(),
  4458. },
  4459. .fixup_map2 = { 3 },
  4460. .errstr_unpriv = "R0 leaks addr",
  4461. .result_unpriv = REJECT,
  4462. .result = ACCEPT,
  4463. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4464. },
  4465. {
  4466. "invalid map access into an array with a constant",
  4467. .insns = {
  4468. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4469. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4470. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4471. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4472. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4473. BPF_FUNC_map_lookup_elem),
  4474. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  4475. BPF_ST_MEM(BPF_DW, BPF_REG_0, (MAX_ENTRIES + 1) << 2,
  4476. offsetof(struct test_val, foo)),
  4477. BPF_EXIT_INSN(),
  4478. },
  4479. .fixup_map2 = { 3 },
  4480. .errstr = "invalid access to map value, value_size=48 off=48 size=8",
  4481. .result = REJECT,
  4482. },
  4483. {
  4484. "invalid map access into an array with a register",
  4485. .insns = {
  4486. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4487. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4488. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4489. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4490. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4491. BPF_FUNC_map_lookup_elem),
  4492. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  4493. BPF_MOV64_IMM(BPF_REG_1, MAX_ENTRIES + 1),
  4494. BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
  4495. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  4496. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  4497. offsetof(struct test_val, foo)),
  4498. BPF_EXIT_INSN(),
  4499. },
  4500. .fixup_map2 = { 3 },
  4501. .errstr = "R0 min value is outside of the array range",
  4502. .result = REJECT,
  4503. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4504. },
  4505. {
  4506. "invalid map access into an array with a variable",
  4507. .insns = {
  4508. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4509. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4510. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4511. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4512. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4513. BPF_FUNC_map_lookup_elem),
  4514. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  4515. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4516. BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
  4517. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  4518. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  4519. offsetof(struct test_val, foo)),
  4520. BPF_EXIT_INSN(),
  4521. },
  4522. .fixup_map2 = { 3 },
  4523. .errstr = "R0 unbounded memory access, make sure to bounds check any array access into a map",
  4524. .result = REJECT,
  4525. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4526. },
  4527. {
  4528. "invalid map access into an array with no floor check",
  4529. .insns = {
  4530. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4531. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4532. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4533. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4534. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4535. BPF_FUNC_map_lookup_elem),
  4536. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  4537. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
  4538. BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES),
  4539. BPF_JMP_REG(BPF_JSGT, BPF_REG_2, BPF_REG_1, 1),
  4540. BPF_MOV32_IMM(BPF_REG_1, 0),
  4541. BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2),
  4542. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  4543. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  4544. offsetof(struct test_val, foo)),
  4545. BPF_EXIT_INSN(),
  4546. },
  4547. .fixup_map2 = { 3 },
  4548. .errstr_unpriv = "R0 leaks addr",
  4549. .errstr = "R0 unbounded memory access",
  4550. .result_unpriv = REJECT,
  4551. .result = REJECT,
  4552. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4553. },
  4554. {
  4555. "invalid map access into an array with a invalid max check",
  4556. .insns = {
  4557. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4558. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4559. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4560. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4561. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4562. BPF_FUNC_map_lookup_elem),
  4563. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  4564. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4565. BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES + 1),
  4566. BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 1),
  4567. BPF_MOV32_IMM(BPF_REG_1, 0),
  4568. BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2),
  4569. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  4570. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  4571. offsetof(struct test_val, foo)),
  4572. BPF_EXIT_INSN(),
  4573. },
  4574. .fixup_map2 = { 3 },
  4575. .errstr_unpriv = "R0 leaks addr",
  4576. .errstr = "invalid access to map value, value_size=48 off=44 size=8",
  4577. .result_unpriv = REJECT,
  4578. .result = REJECT,
  4579. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4580. },
  4581. {
  4582. "invalid map access into an array with a invalid max check",
  4583. .insns = {
  4584. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4585. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4586. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4587. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4588. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4589. BPF_FUNC_map_lookup_elem),
  4590. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 10),
  4591. BPF_MOV64_REG(BPF_REG_8, BPF_REG_0),
  4592. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4593. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4594. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4595. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4596. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4597. BPF_FUNC_map_lookup_elem),
  4598. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  4599. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_8),
  4600. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
  4601. offsetof(struct test_val, foo)),
  4602. BPF_EXIT_INSN(),
  4603. },
  4604. .fixup_map2 = { 3, 11 },
  4605. .errstr = "R0 pointer += pointer",
  4606. .result = REJECT,
  4607. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4608. },
  4609. {
  4610. "valid cgroup storage access",
  4611. .insns = {
  4612. BPF_MOV64_IMM(BPF_REG_2, 0),
  4613. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4614. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4615. BPF_FUNC_get_local_storage),
  4616. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4617. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  4618. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 1),
  4619. BPF_EXIT_INSN(),
  4620. },
  4621. .fixup_cgroup_storage = { 1 },
  4622. .result = ACCEPT,
  4623. .prog_type = BPF_PROG_TYPE_CGROUP_SKB,
  4624. },
  4625. {
  4626. "invalid cgroup storage access 1",
  4627. .insns = {
  4628. BPF_MOV64_IMM(BPF_REG_2, 0),
  4629. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4630. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4631. BPF_FUNC_get_local_storage),
  4632. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4633. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  4634. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 1),
  4635. BPF_EXIT_INSN(),
  4636. },
  4637. .fixup_map1 = { 1 },
  4638. .result = REJECT,
  4639. .errstr = "cannot pass map_type 1 into func bpf_get_local_storage",
  4640. .prog_type = BPF_PROG_TYPE_CGROUP_SKB,
  4641. },
  4642. {
  4643. "invalid cgroup storage access 2",
  4644. .insns = {
  4645. BPF_MOV64_IMM(BPF_REG_2, 0),
  4646. BPF_LD_MAP_FD(BPF_REG_1, 1),
  4647. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4648. BPF_FUNC_get_local_storage),
  4649. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 1),
  4650. BPF_EXIT_INSN(),
  4651. },
  4652. .result = REJECT,
  4653. .errstr = "fd 1 is not pointing to valid bpf_map",
  4654. .prog_type = BPF_PROG_TYPE_CGROUP_SKB,
  4655. },
  4656. {
  4657. "invalid per-cgroup storage access 3",
  4658. .insns = {
  4659. BPF_MOV64_IMM(BPF_REG_2, 0),
  4660. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4661. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4662. BPF_FUNC_get_local_storage),
  4663. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 256),
  4664. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 1),
  4665. BPF_MOV64_IMM(BPF_REG_0, 0),
  4666. BPF_EXIT_INSN(),
  4667. },
  4668. .fixup_cgroup_storage = { 1 },
  4669. .result = REJECT,
  4670. .errstr = "invalid access to map value, value_size=64 off=256 size=4",
  4671. .prog_type = BPF_PROG_TYPE_CGROUP_SKB,
  4672. },
  4673. {
  4674. "invalid cgroup storage access 4",
  4675. .insns = {
  4676. BPF_MOV64_IMM(BPF_REG_2, 0),
  4677. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4678. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4679. BPF_FUNC_get_local_storage),
  4680. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, -2),
  4681. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  4682. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 1),
  4683. BPF_EXIT_INSN(),
  4684. },
  4685. .fixup_cgroup_storage = { 1 },
  4686. .result = REJECT,
  4687. .errstr = "invalid access to map value, value_size=64 off=-2 size=4",
  4688. .prog_type = BPF_PROG_TYPE_CGROUP_SKB,
  4689. },
  4690. {
  4691. "invalid cgroup storage access 5",
  4692. .insns = {
  4693. BPF_MOV64_IMM(BPF_REG_2, 7),
  4694. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4695. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4696. BPF_FUNC_get_local_storage),
  4697. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4698. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  4699. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 1),
  4700. BPF_EXIT_INSN(),
  4701. },
  4702. .fixup_cgroup_storage = { 1 },
  4703. .result = REJECT,
  4704. .errstr = "get_local_storage() doesn't support non-zero flags",
  4705. .prog_type = BPF_PROG_TYPE_CGROUP_SKB,
  4706. },
  4707. {
  4708. "invalid cgroup storage access 6",
  4709. .insns = {
  4710. BPF_MOV64_REG(BPF_REG_2, BPF_REG_1),
  4711. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4712. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4713. BPF_FUNC_get_local_storage),
  4714. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4715. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  4716. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 1),
  4717. BPF_EXIT_INSN(),
  4718. },
  4719. .fixup_cgroup_storage = { 1 },
  4720. .result = REJECT,
  4721. .errstr = "get_local_storage() doesn't support non-zero flags",
  4722. .prog_type = BPF_PROG_TYPE_CGROUP_SKB,
  4723. },
  4724. {
  4725. "multiple registers share map_lookup_elem result",
  4726. .insns = {
  4727. BPF_MOV64_IMM(BPF_REG_1, 10),
  4728. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
  4729. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4730. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4731. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4732. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4733. BPF_FUNC_map_lookup_elem),
  4734. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  4735. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  4736. BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
  4737. BPF_EXIT_INSN(),
  4738. },
  4739. .fixup_map1 = { 4 },
  4740. .result = ACCEPT,
  4741. .prog_type = BPF_PROG_TYPE_SCHED_CLS
  4742. },
  4743. {
  4744. "alu ops on ptr_to_map_value_or_null, 1",
  4745. .insns = {
  4746. BPF_MOV64_IMM(BPF_REG_1, 10),
  4747. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
  4748. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4749. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4750. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4751. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4752. BPF_FUNC_map_lookup_elem),
  4753. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  4754. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -2),
  4755. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 2),
  4756. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  4757. BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
  4758. BPF_EXIT_INSN(),
  4759. },
  4760. .fixup_map1 = { 4 },
  4761. .errstr = "R4 pointer arithmetic on PTR_TO_MAP_VALUE_OR_NULL",
  4762. .result = REJECT,
  4763. .prog_type = BPF_PROG_TYPE_SCHED_CLS
  4764. },
  4765. {
  4766. "alu ops on ptr_to_map_value_or_null, 2",
  4767. .insns = {
  4768. BPF_MOV64_IMM(BPF_REG_1, 10),
  4769. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
  4770. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4771. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4772. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4773. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4774. BPF_FUNC_map_lookup_elem),
  4775. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  4776. BPF_ALU64_IMM(BPF_AND, BPF_REG_4, -1),
  4777. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  4778. BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
  4779. BPF_EXIT_INSN(),
  4780. },
  4781. .fixup_map1 = { 4 },
  4782. .errstr = "R4 pointer arithmetic on PTR_TO_MAP_VALUE_OR_NULL",
  4783. .result = REJECT,
  4784. .prog_type = BPF_PROG_TYPE_SCHED_CLS
  4785. },
  4786. {
  4787. "alu ops on ptr_to_map_value_or_null, 3",
  4788. .insns = {
  4789. BPF_MOV64_IMM(BPF_REG_1, 10),
  4790. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
  4791. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4792. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4793. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4794. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4795. BPF_FUNC_map_lookup_elem),
  4796. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  4797. BPF_ALU64_IMM(BPF_LSH, BPF_REG_4, 1),
  4798. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  4799. BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
  4800. BPF_EXIT_INSN(),
  4801. },
  4802. .fixup_map1 = { 4 },
  4803. .errstr = "R4 pointer arithmetic on PTR_TO_MAP_VALUE_OR_NULL",
  4804. .result = REJECT,
  4805. .prog_type = BPF_PROG_TYPE_SCHED_CLS
  4806. },
  4807. {
  4808. "invalid memory access with multiple map_lookup_elem calls",
  4809. .insns = {
  4810. BPF_MOV64_IMM(BPF_REG_1, 10),
  4811. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
  4812. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4813. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4814. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4815. BPF_MOV64_REG(BPF_REG_8, BPF_REG_1),
  4816. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  4817. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4818. BPF_FUNC_map_lookup_elem),
  4819. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  4820. BPF_MOV64_REG(BPF_REG_1, BPF_REG_8),
  4821. BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
  4822. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4823. BPF_FUNC_map_lookup_elem),
  4824. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  4825. BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
  4826. BPF_EXIT_INSN(),
  4827. },
  4828. .fixup_map1 = { 4 },
  4829. .result = REJECT,
  4830. .errstr = "R4 !read_ok",
  4831. .prog_type = BPF_PROG_TYPE_SCHED_CLS
  4832. },
  4833. {
  4834. "valid indirect map_lookup_elem access with 2nd lookup in branch",
  4835. .insns = {
  4836. BPF_MOV64_IMM(BPF_REG_1, 10),
  4837. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
  4838. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4839. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4840. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4841. BPF_MOV64_REG(BPF_REG_8, BPF_REG_1),
  4842. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  4843. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4844. BPF_FUNC_map_lookup_elem),
  4845. BPF_MOV64_IMM(BPF_REG_2, 10),
  4846. BPF_JMP_IMM(BPF_JNE, BPF_REG_2, 0, 3),
  4847. BPF_MOV64_REG(BPF_REG_1, BPF_REG_8),
  4848. BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
  4849. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  4850. BPF_FUNC_map_lookup_elem),
  4851. BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
  4852. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  4853. BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
  4854. BPF_EXIT_INSN(),
  4855. },
  4856. .fixup_map1 = { 4 },
  4857. .result = ACCEPT,
  4858. .prog_type = BPF_PROG_TYPE_SCHED_CLS
  4859. },
  4860. {
  4861. "invalid map access from else condition",
  4862. .insns = {
  4863. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  4864. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  4865. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  4866. BPF_LD_MAP_FD(BPF_REG_1, 0),
  4867. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
  4868. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  4869. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  4870. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, MAX_ENTRIES-1, 1),
  4871. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 1),
  4872. BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
  4873. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  4874. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, offsetof(struct test_val, foo)),
  4875. BPF_EXIT_INSN(),
  4876. },
  4877. .fixup_map2 = { 3 },
  4878. .errstr = "R0 unbounded memory access",
  4879. .result = REJECT,
  4880. .errstr_unpriv = "R0 leaks addr",
  4881. .result_unpriv = REJECT,
  4882. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  4883. },
  4884. {
  4885. "constant register |= constant should keep constant type",
  4886. .insns = {
  4887. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  4888. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -48),
  4889. BPF_MOV64_IMM(BPF_REG_2, 34),
  4890. BPF_ALU64_IMM(BPF_OR, BPF_REG_2, 13),
  4891. BPF_MOV64_IMM(BPF_REG_3, 0),
  4892. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  4893. BPF_EXIT_INSN(),
  4894. },
  4895. .result = ACCEPT,
  4896. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  4897. },
  4898. {
  4899. "constant register |= constant should not bypass stack boundary checks",
  4900. .insns = {
  4901. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  4902. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -48),
  4903. BPF_MOV64_IMM(BPF_REG_2, 34),
  4904. BPF_ALU64_IMM(BPF_OR, BPF_REG_2, 24),
  4905. BPF_MOV64_IMM(BPF_REG_3, 0),
  4906. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  4907. BPF_EXIT_INSN(),
  4908. },
  4909. .errstr = "invalid stack type R1 off=-48 access_size=58",
  4910. .result = REJECT,
  4911. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  4912. },
  4913. {
  4914. "constant register |= constant register should keep constant type",
  4915. .insns = {
  4916. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  4917. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -48),
  4918. BPF_MOV64_IMM(BPF_REG_2, 34),
  4919. BPF_MOV64_IMM(BPF_REG_4, 13),
  4920. BPF_ALU64_REG(BPF_OR, BPF_REG_2, BPF_REG_4),
  4921. BPF_MOV64_IMM(BPF_REG_3, 0),
  4922. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  4923. BPF_EXIT_INSN(),
  4924. },
  4925. .result = ACCEPT,
  4926. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  4927. },
  4928. {
  4929. "constant register |= constant register should not bypass stack boundary checks",
  4930. .insns = {
  4931. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  4932. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -48),
  4933. BPF_MOV64_IMM(BPF_REG_2, 34),
  4934. BPF_MOV64_IMM(BPF_REG_4, 24),
  4935. BPF_ALU64_REG(BPF_OR, BPF_REG_2, BPF_REG_4),
  4936. BPF_MOV64_IMM(BPF_REG_3, 0),
  4937. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  4938. BPF_EXIT_INSN(),
  4939. },
  4940. .errstr = "invalid stack type R1 off=-48 access_size=58",
  4941. .result = REJECT,
  4942. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  4943. },
  4944. {
  4945. "invalid direct packet write for LWT_IN",
  4946. .insns = {
  4947. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  4948. offsetof(struct __sk_buff, data)),
  4949. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  4950. offsetof(struct __sk_buff, data_end)),
  4951. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  4952. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  4953. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  4954. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  4955. BPF_MOV64_IMM(BPF_REG_0, 0),
  4956. BPF_EXIT_INSN(),
  4957. },
  4958. .errstr = "cannot write into packet",
  4959. .result = REJECT,
  4960. .prog_type = BPF_PROG_TYPE_LWT_IN,
  4961. },
  4962. {
  4963. "invalid direct packet write for LWT_OUT",
  4964. .insns = {
  4965. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  4966. offsetof(struct __sk_buff, data)),
  4967. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  4968. offsetof(struct __sk_buff, data_end)),
  4969. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  4970. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  4971. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  4972. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  4973. BPF_MOV64_IMM(BPF_REG_0, 0),
  4974. BPF_EXIT_INSN(),
  4975. },
  4976. .errstr = "cannot write into packet",
  4977. .result = REJECT,
  4978. .prog_type = BPF_PROG_TYPE_LWT_OUT,
  4979. },
  4980. {
  4981. "direct packet write for LWT_XMIT",
  4982. .insns = {
  4983. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  4984. offsetof(struct __sk_buff, data)),
  4985. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  4986. offsetof(struct __sk_buff, data_end)),
  4987. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  4988. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  4989. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  4990. BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  4991. BPF_MOV64_IMM(BPF_REG_0, 0),
  4992. BPF_EXIT_INSN(),
  4993. },
  4994. .result = ACCEPT,
  4995. .prog_type = BPF_PROG_TYPE_LWT_XMIT,
  4996. },
  4997. {
  4998. "direct packet read for LWT_IN",
  4999. .insns = {
  5000. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  5001. offsetof(struct __sk_buff, data)),
  5002. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  5003. offsetof(struct __sk_buff, data_end)),
  5004. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  5005. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  5006. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  5007. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  5008. BPF_MOV64_IMM(BPF_REG_0, 0),
  5009. BPF_EXIT_INSN(),
  5010. },
  5011. .result = ACCEPT,
  5012. .prog_type = BPF_PROG_TYPE_LWT_IN,
  5013. },
  5014. {
  5015. "direct packet read for LWT_OUT",
  5016. .insns = {
  5017. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  5018. offsetof(struct __sk_buff, data)),
  5019. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  5020. offsetof(struct __sk_buff, data_end)),
  5021. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  5022. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  5023. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  5024. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  5025. BPF_MOV64_IMM(BPF_REG_0, 0),
  5026. BPF_EXIT_INSN(),
  5027. },
  5028. .result = ACCEPT,
  5029. .prog_type = BPF_PROG_TYPE_LWT_OUT,
  5030. },
  5031. {
  5032. "direct packet read for LWT_XMIT",
  5033. .insns = {
  5034. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  5035. offsetof(struct __sk_buff, data)),
  5036. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  5037. offsetof(struct __sk_buff, data_end)),
  5038. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  5039. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  5040. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  5041. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  5042. BPF_MOV64_IMM(BPF_REG_0, 0),
  5043. BPF_EXIT_INSN(),
  5044. },
  5045. .result = ACCEPT,
  5046. .prog_type = BPF_PROG_TYPE_LWT_XMIT,
  5047. },
  5048. {
  5049. "overlapping checks for direct packet access",
  5050. .insns = {
  5051. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  5052. offsetof(struct __sk_buff, data)),
  5053. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  5054. offsetof(struct __sk_buff, data_end)),
  5055. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  5056. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  5057. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 4),
  5058. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  5059. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 6),
  5060. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  5061. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_2, 6),
  5062. BPF_MOV64_IMM(BPF_REG_0, 0),
  5063. BPF_EXIT_INSN(),
  5064. },
  5065. .result = ACCEPT,
  5066. .prog_type = BPF_PROG_TYPE_LWT_XMIT,
  5067. },
  5068. {
  5069. "make headroom for LWT_XMIT",
  5070. .insns = {
  5071. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  5072. BPF_MOV64_IMM(BPF_REG_2, 34),
  5073. BPF_MOV64_IMM(BPF_REG_3, 0),
  5074. BPF_EMIT_CALL(BPF_FUNC_skb_change_head),
  5075. /* split for s390 to succeed */
  5076. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  5077. BPF_MOV64_IMM(BPF_REG_2, 42),
  5078. BPF_MOV64_IMM(BPF_REG_3, 0),
  5079. BPF_EMIT_CALL(BPF_FUNC_skb_change_head),
  5080. BPF_MOV64_IMM(BPF_REG_0, 0),
  5081. BPF_EXIT_INSN(),
  5082. },
  5083. .result = ACCEPT,
  5084. .prog_type = BPF_PROG_TYPE_LWT_XMIT,
  5085. },
  5086. {
  5087. "invalid access of tc_classid for LWT_IN",
  5088. .insns = {
  5089. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  5090. offsetof(struct __sk_buff, tc_classid)),
  5091. BPF_EXIT_INSN(),
  5092. },
  5093. .result = REJECT,
  5094. .errstr = "invalid bpf_context access",
  5095. },
  5096. {
  5097. "invalid access of tc_classid for LWT_OUT",
  5098. .insns = {
  5099. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  5100. offsetof(struct __sk_buff, tc_classid)),
  5101. BPF_EXIT_INSN(),
  5102. },
  5103. .result = REJECT,
  5104. .errstr = "invalid bpf_context access",
  5105. },
  5106. {
  5107. "invalid access of tc_classid for LWT_XMIT",
  5108. .insns = {
  5109. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  5110. offsetof(struct __sk_buff, tc_classid)),
  5111. BPF_EXIT_INSN(),
  5112. },
  5113. .result = REJECT,
  5114. .errstr = "invalid bpf_context access",
  5115. },
  5116. {
  5117. "leak pointer into ctx 1",
  5118. .insns = {
  5119. BPF_MOV64_IMM(BPF_REG_0, 0),
  5120. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  5121. offsetof(struct __sk_buff, cb[0])),
  5122. BPF_LD_MAP_FD(BPF_REG_2, 0),
  5123. BPF_STX_XADD(BPF_DW, BPF_REG_1, BPF_REG_2,
  5124. offsetof(struct __sk_buff, cb[0])),
  5125. BPF_EXIT_INSN(),
  5126. },
  5127. .fixup_map1 = { 2 },
  5128. .errstr_unpriv = "R2 leaks addr into mem",
  5129. .result_unpriv = REJECT,
  5130. .result = REJECT,
  5131. .errstr = "BPF_XADD stores into R1 context is not allowed",
  5132. },
  5133. {
  5134. "leak pointer into ctx 2",
  5135. .insns = {
  5136. BPF_MOV64_IMM(BPF_REG_0, 0),
  5137. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
  5138. offsetof(struct __sk_buff, cb[0])),
  5139. BPF_STX_XADD(BPF_DW, BPF_REG_1, BPF_REG_10,
  5140. offsetof(struct __sk_buff, cb[0])),
  5141. BPF_EXIT_INSN(),
  5142. },
  5143. .errstr_unpriv = "R10 leaks addr into mem",
  5144. .result_unpriv = REJECT,
  5145. .result = REJECT,
  5146. .errstr = "BPF_XADD stores into R1 context is not allowed",
  5147. },
  5148. {
  5149. "leak pointer into ctx 3",
  5150. .insns = {
  5151. BPF_MOV64_IMM(BPF_REG_0, 0),
  5152. BPF_LD_MAP_FD(BPF_REG_2, 0),
  5153. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2,
  5154. offsetof(struct __sk_buff, cb[0])),
  5155. BPF_EXIT_INSN(),
  5156. },
  5157. .fixup_map1 = { 1 },
  5158. .errstr_unpriv = "R2 leaks addr into ctx",
  5159. .result_unpriv = REJECT,
  5160. .result = ACCEPT,
  5161. },
  5162. {
  5163. "leak pointer into map val",
  5164. .insns = {
  5165. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  5166. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  5167. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5168. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5169. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5170. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  5171. BPF_FUNC_map_lookup_elem),
  5172. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 3),
  5173. BPF_MOV64_IMM(BPF_REG_3, 0),
  5174. BPF_STX_MEM(BPF_DW, BPF_REG_0, BPF_REG_3, 0),
  5175. BPF_STX_XADD(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  5176. BPF_MOV64_IMM(BPF_REG_0, 0),
  5177. BPF_EXIT_INSN(),
  5178. },
  5179. .fixup_map1 = { 4 },
  5180. .errstr_unpriv = "R6 leaks addr into mem",
  5181. .result_unpriv = REJECT,
  5182. .result = ACCEPT,
  5183. },
  5184. {
  5185. "helper access to map: full range",
  5186. .insns = {
  5187. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5188. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5189. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5190. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5191. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5192. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5193. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5194. BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
  5195. BPF_MOV64_IMM(BPF_REG_3, 0),
  5196. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5197. BPF_EXIT_INSN(),
  5198. },
  5199. .fixup_map2 = { 3 },
  5200. .result = ACCEPT,
  5201. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5202. },
  5203. {
  5204. "helper access to map: partial range",
  5205. .insns = {
  5206. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5207. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5208. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5209. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5210. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5211. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5212. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5213. BPF_MOV64_IMM(BPF_REG_2, 8),
  5214. BPF_MOV64_IMM(BPF_REG_3, 0),
  5215. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5216. BPF_EXIT_INSN(),
  5217. },
  5218. .fixup_map2 = { 3 },
  5219. .result = ACCEPT,
  5220. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5221. },
  5222. {
  5223. "helper access to map: empty range",
  5224. .insns = {
  5225. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5226. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5227. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5228. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5229. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5230. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 3),
  5231. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5232. BPF_MOV64_IMM(BPF_REG_2, 0),
  5233. BPF_EMIT_CALL(BPF_FUNC_trace_printk),
  5234. BPF_EXIT_INSN(),
  5235. },
  5236. .fixup_map2 = { 3 },
  5237. .errstr = "invalid access to map value, value_size=48 off=0 size=0",
  5238. .result = REJECT,
  5239. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5240. },
  5241. {
  5242. "helper access to map: out-of-bound range",
  5243. .insns = {
  5244. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5245. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5246. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5247. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5248. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5249. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5250. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5251. BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val) + 8),
  5252. BPF_MOV64_IMM(BPF_REG_3, 0),
  5253. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5254. BPF_EXIT_INSN(),
  5255. },
  5256. .fixup_map2 = { 3 },
  5257. .errstr = "invalid access to map value, value_size=48 off=0 size=56",
  5258. .result = REJECT,
  5259. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5260. },
  5261. {
  5262. "helper access to map: negative range",
  5263. .insns = {
  5264. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5265. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5266. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5267. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5268. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5269. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5270. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5271. BPF_MOV64_IMM(BPF_REG_2, -8),
  5272. BPF_MOV64_IMM(BPF_REG_3, 0),
  5273. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5274. BPF_EXIT_INSN(),
  5275. },
  5276. .fixup_map2 = { 3 },
  5277. .errstr = "R2 min value is negative",
  5278. .result = REJECT,
  5279. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5280. },
  5281. {
  5282. "helper access to adjusted map (via const imm): full range",
  5283. .insns = {
  5284. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5285. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5286. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5287. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5288. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5289. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  5290. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5291. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
  5292. offsetof(struct test_val, foo)),
  5293. BPF_MOV64_IMM(BPF_REG_2,
  5294. sizeof(struct test_val) -
  5295. offsetof(struct test_val, foo)),
  5296. BPF_MOV64_IMM(BPF_REG_3, 0),
  5297. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5298. BPF_EXIT_INSN(),
  5299. },
  5300. .fixup_map2 = { 3 },
  5301. .result = ACCEPT,
  5302. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5303. },
  5304. {
  5305. "helper access to adjusted map (via const imm): partial range",
  5306. .insns = {
  5307. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5308. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5309. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5310. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5311. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5312. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  5313. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5314. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
  5315. offsetof(struct test_val, foo)),
  5316. BPF_MOV64_IMM(BPF_REG_2, 8),
  5317. BPF_MOV64_IMM(BPF_REG_3, 0),
  5318. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5319. BPF_EXIT_INSN(),
  5320. },
  5321. .fixup_map2 = { 3 },
  5322. .result = ACCEPT,
  5323. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5324. },
  5325. {
  5326. "helper access to adjusted map (via const imm): empty range",
  5327. .insns = {
  5328. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5329. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5330. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5331. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5332. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5333. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5334. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5335. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
  5336. offsetof(struct test_val, foo)),
  5337. BPF_MOV64_IMM(BPF_REG_2, 0),
  5338. BPF_EMIT_CALL(BPF_FUNC_trace_printk),
  5339. BPF_EXIT_INSN(),
  5340. },
  5341. .fixup_map2 = { 3 },
  5342. .errstr = "invalid access to map value, value_size=48 off=4 size=0",
  5343. .result = REJECT,
  5344. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5345. },
  5346. {
  5347. "helper access to adjusted map (via const imm): out-of-bound range",
  5348. .insns = {
  5349. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5350. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5351. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5352. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5353. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5354. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  5355. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5356. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
  5357. offsetof(struct test_val, foo)),
  5358. BPF_MOV64_IMM(BPF_REG_2,
  5359. sizeof(struct test_val) -
  5360. offsetof(struct test_val, foo) + 8),
  5361. BPF_MOV64_IMM(BPF_REG_3, 0),
  5362. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5363. BPF_EXIT_INSN(),
  5364. },
  5365. .fixup_map2 = { 3 },
  5366. .errstr = "invalid access to map value, value_size=48 off=4 size=52",
  5367. .result = REJECT,
  5368. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5369. },
  5370. {
  5371. "helper access to adjusted map (via const imm): negative range (> adjustment)",
  5372. .insns = {
  5373. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5374. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5375. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5376. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5377. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5378. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  5379. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5380. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
  5381. offsetof(struct test_val, foo)),
  5382. BPF_MOV64_IMM(BPF_REG_2, -8),
  5383. BPF_MOV64_IMM(BPF_REG_3, 0),
  5384. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5385. BPF_EXIT_INSN(),
  5386. },
  5387. .fixup_map2 = { 3 },
  5388. .errstr = "R2 min value is negative",
  5389. .result = REJECT,
  5390. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5391. },
  5392. {
  5393. "helper access to adjusted map (via const imm): negative range (< adjustment)",
  5394. .insns = {
  5395. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5396. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5397. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5398. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5399. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5400. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  5401. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5402. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
  5403. offsetof(struct test_val, foo)),
  5404. BPF_MOV64_IMM(BPF_REG_2, -1),
  5405. BPF_MOV64_IMM(BPF_REG_3, 0),
  5406. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5407. BPF_EXIT_INSN(),
  5408. },
  5409. .fixup_map2 = { 3 },
  5410. .errstr = "R2 min value is negative",
  5411. .result = REJECT,
  5412. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5413. },
  5414. {
  5415. "helper access to adjusted map (via const reg): full range",
  5416. .insns = {
  5417. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5418. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5419. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5420. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5421. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5422. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5423. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5424. BPF_MOV64_IMM(BPF_REG_3,
  5425. offsetof(struct test_val, foo)),
  5426. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5427. BPF_MOV64_IMM(BPF_REG_2,
  5428. sizeof(struct test_val) -
  5429. offsetof(struct test_val, foo)),
  5430. BPF_MOV64_IMM(BPF_REG_3, 0),
  5431. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5432. BPF_EXIT_INSN(),
  5433. },
  5434. .fixup_map2 = { 3 },
  5435. .result = ACCEPT,
  5436. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5437. },
  5438. {
  5439. "helper access to adjusted map (via const reg): partial range",
  5440. .insns = {
  5441. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5442. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5443. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5444. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5445. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5446. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5447. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5448. BPF_MOV64_IMM(BPF_REG_3,
  5449. offsetof(struct test_val, foo)),
  5450. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5451. BPF_MOV64_IMM(BPF_REG_2, 8),
  5452. BPF_MOV64_IMM(BPF_REG_3, 0),
  5453. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5454. BPF_EXIT_INSN(),
  5455. },
  5456. .fixup_map2 = { 3 },
  5457. .result = ACCEPT,
  5458. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5459. },
  5460. {
  5461. "helper access to adjusted map (via const reg): empty range",
  5462. .insns = {
  5463. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5464. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5465. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5466. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5467. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5468. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  5469. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5470. BPF_MOV64_IMM(BPF_REG_3, 0),
  5471. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5472. BPF_MOV64_IMM(BPF_REG_2, 0),
  5473. BPF_EMIT_CALL(BPF_FUNC_trace_printk),
  5474. BPF_EXIT_INSN(),
  5475. },
  5476. .fixup_map2 = { 3 },
  5477. .errstr = "R1 min value is outside of the array range",
  5478. .result = REJECT,
  5479. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5480. },
  5481. {
  5482. "helper access to adjusted map (via const reg): out-of-bound range",
  5483. .insns = {
  5484. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5485. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5486. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5487. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5488. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5489. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5490. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5491. BPF_MOV64_IMM(BPF_REG_3,
  5492. offsetof(struct test_val, foo)),
  5493. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5494. BPF_MOV64_IMM(BPF_REG_2,
  5495. sizeof(struct test_val) -
  5496. offsetof(struct test_val, foo) + 8),
  5497. BPF_MOV64_IMM(BPF_REG_3, 0),
  5498. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5499. BPF_EXIT_INSN(),
  5500. },
  5501. .fixup_map2 = { 3 },
  5502. .errstr = "invalid access to map value, value_size=48 off=4 size=52",
  5503. .result = REJECT,
  5504. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5505. },
  5506. {
  5507. "helper access to adjusted map (via const reg): negative range (> adjustment)",
  5508. .insns = {
  5509. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5510. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5511. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5512. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5513. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5514. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5515. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5516. BPF_MOV64_IMM(BPF_REG_3,
  5517. offsetof(struct test_val, foo)),
  5518. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5519. BPF_MOV64_IMM(BPF_REG_2, -8),
  5520. BPF_MOV64_IMM(BPF_REG_3, 0),
  5521. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5522. BPF_EXIT_INSN(),
  5523. },
  5524. .fixup_map2 = { 3 },
  5525. .errstr = "R2 min value is negative",
  5526. .result = REJECT,
  5527. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5528. },
  5529. {
  5530. "helper access to adjusted map (via const reg): negative range (< adjustment)",
  5531. .insns = {
  5532. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5533. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5534. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5535. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5536. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5537. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5538. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5539. BPF_MOV64_IMM(BPF_REG_3,
  5540. offsetof(struct test_val, foo)),
  5541. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5542. BPF_MOV64_IMM(BPF_REG_2, -1),
  5543. BPF_MOV64_IMM(BPF_REG_3, 0),
  5544. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5545. BPF_EXIT_INSN(),
  5546. },
  5547. .fixup_map2 = { 3 },
  5548. .errstr = "R2 min value is negative",
  5549. .result = REJECT,
  5550. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5551. },
  5552. {
  5553. "helper access to adjusted map (via variable): full range",
  5554. .insns = {
  5555. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5556. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5557. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5558. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5559. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5560. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  5561. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5562. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5563. BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
  5564. offsetof(struct test_val, foo), 4),
  5565. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5566. BPF_MOV64_IMM(BPF_REG_2,
  5567. sizeof(struct test_val) -
  5568. offsetof(struct test_val, foo)),
  5569. BPF_MOV64_IMM(BPF_REG_3, 0),
  5570. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5571. BPF_EXIT_INSN(),
  5572. },
  5573. .fixup_map2 = { 3 },
  5574. .result = ACCEPT,
  5575. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5576. },
  5577. {
  5578. "helper access to adjusted map (via variable): partial range",
  5579. .insns = {
  5580. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5581. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5582. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5583. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5584. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5585. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  5586. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5587. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5588. BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
  5589. offsetof(struct test_val, foo), 4),
  5590. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5591. BPF_MOV64_IMM(BPF_REG_2, 8),
  5592. BPF_MOV64_IMM(BPF_REG_3, 0),
  5593. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5594. BPF_EXIT_INSN(),
  5595. },
  5596. .fixup_map2 = { 3 },
  5597. .result = ACCEPT,
  5598. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5599. },
  5600. {
  5601. "helper access to adjusted map (via variable): empty range",
  5602. .insns = {
  5603. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5604. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5605. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5606. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5607. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5608. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5609. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5610. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5611. BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
  5612. offsetof(struct test_val, foo), 3),
  5613. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5614. BPF_MOV64_IMM(BPF_REG_2, 0),
  5615. BPF_EMIT_CALL(BPF_FUNC_trace_printk),
  5616. BPF_EXIT_INSN(),
  5617. },
  5618. .fixup_map2 = { 3 },
  5619. .errstr = "R1 min value is outside of the array range",
  5620. .result = REJECT,
  5621. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5622. },
  5623. {
  5624. "helper access to adjusted map (via variable): no max check",
  5625. .insns = {
  5626. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5627. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5628. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5629. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5630. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5631. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5632. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5633. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5634. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5635. BPF_MOV64_IMM(BPF_REG_2, 1),
  5636. BPF_MOV64_IMM(BPF_REG_3, 0),
  5637. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5638. BPF_EXIT_INSN(),
  5639. },
  5640. .fixup_map2 = { 3 },
  5641. .errstr = "R1 unbounded memory access",
  5642. .result = REJECT,
  5643. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5644. },
  5645. {
  5646. "helper access to adjusted map (via variable): wrong max check",
  5647. .insns = {
  5648. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5649. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5650. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5651. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5652. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5653. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  5654. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5655. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5656. BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
  5657. offsetof(struct test_val, foo), 4),
  5658. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5659. BPF_MOV64_IMM(BPF_REG_2,
  5660. sizeof(struct test_val) -
  5661. offsetof(struct test_val, foo) + 1),
  5662. BPF_MOV64_IMM(BPF_REG_3, 0),
  5663. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  5664. BPF_EXIT_INSN(),
  5665. },
  5666. .fixup_map2 = { 3 },
  5667. .errstr = "invalid access to map value, value_size=48 off=4 size=45",
  5668. .result = REJECT,
  5669. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5670. },
  5671. {
  5672. "helper access to map: bounds check using <, good access",
  5673. .insns = {
  5674. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5675. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5676. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5677. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5678. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5679. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5680. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5681. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5682. BPF_JMP_IMM(BPF_JLT, BPF_REG_3, 32, 2),
  5683. BPF_MOV64_IMM(BPF_REG_0, 0),
  5684. BPF_EXIT_INSN(),
  5685. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5686. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5687. BPF_MOV64_IMM(BPF_REG_0, 0),
  5688. BPF_EXIT_INSN(),
  5689. },
  5690. .fixup_map2 = { 3 },
  5691. .result = ACCEPT,
  5692. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5693. },
  5694. {
  5695. "helper access to map: bounds check using <, bad access",
  5696. .insns = {
  5697. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5698. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5699. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5700. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5701. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5702. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5703. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5704. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5705. BPF_JMP_IMM(BPF_JLT, BPF_REG_3, 32, 4),
  5706. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5707. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5708. BPF_MOV64_IMM(BPF_REG_0, 0),
  5709. BPF_EXIT_INSN(),
  5710. BPF_MOV64_IMM(BPF_REG_0, 0),
  5711. BPF_EXIT_INSN(),
  5712. },
  5713. .fixup_map2 = { 3 },
  5714. .result = REJECT,
  5715. .errstr = "R1 unbounded memory access",
  5716. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5717. },
  5718. {
  5719. "helper access to map: bounds check using <=, good access",
  5720. .insns = {
  5721. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5722. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5723. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5724. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5725. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5726. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5727. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5728. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5729. BPF_JMP_IMM(BPF_JLE, BPF_REG_3, 32, 2),
  5730. BPF_MOV64_IMM(BPF_REG_0, 0),
  5731. BPF_EXIT_INSN(),
  5732. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5733. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5734. BPF_MOV64_IMM(BPF_REG_0, 0),
  5735. BPF_EXIT_INSN(),
  5736. },
  5737. .fixup_map2 = { 3 },
  5738. .result = ACCEPT,
  5739. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5740. },
  5741. {
  5742. "helper access to map: bounds check using <=, bad access",
  5743. .insns = {
  5744. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5745. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5746. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5747. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5748. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5749. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5750. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5751. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5752. BPF_JMP_IMM(BPF_JLE, BPF_REG_3, 32, 4),
  5753. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5754. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5755. BPF_MOV64_IMM(BPF_REG_0, 0),
  5756. BPF_EXIT_INSN(),
  5757. BPF_MOV64_IMM(BPF_REG_0, 0),
  5758. BPF_EXIT_INSN(),
  5759. },
  5760. .fixup_map2 = { 3 },
  5761. .result = REJECT,
  5762. .errstr = "R1 unbounded memory access",
  5763. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5764. },
  5765. {
  5766. "helper access to map: bounds check using s<, good access",
  5767. .insns = {
  5768. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5769. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5770. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5771. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5772. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5773. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5774. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5775. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5776. BPF_JMP_IMM(BPF_JSLT, BPF_REG_3, 32, 2),
  5777. BPF_MOV64_IMM(BPF_REG_0, 0),
  5778. BPF_EXIT_INSN(),
  5779. BPF_JMP_IMM(BPF_JSLT, BPF_REG_3, 0, -3),
  5780. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5781. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5782. BPF_MOV64_IMM(BPF_REG_0, 0),
  5783. BPF_EXIT_INSN(),
  5784. },
  5785. .fixup_map2 = { 3 },
  5786. .result = ACCEPT,
  5787. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5788. },
  5789. {
  5790. "helper access to map: bounds check using s<, good access 2",
  5791. .insns = {
  5792. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5793. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5794. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5795. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5796. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5797. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5798. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5799. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5800. BPF_JMP_IMM(BPF_JSLT, BPF_REG_3, 32, 2),
  5801. BPF_MOV64_IMM(BPF_REG_0, 0),
  5802. BPF_EXIT_INSN(),
  5803. BPF_JMP_IMM(BPF_JSLT, BPF_REG_3, -3, -3),
  5804. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5805. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5806. BPF_MOV64_IMM(BPF_REG_0, 0),
  5807. BPF_EXIT_INSN(),
  5808. },
  5809. .fixup_map2 = { 3 },
  5810. .result = ACCEPT,
  5811. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5812. },
  5813. {
  5814. "helper access to map: bounds check using s<, bad access",
  5815. .insns = {
  5816. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5817. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5818. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5819. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5820. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5821. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5822. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5823. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
  5824. BPF_JMP_IMM(BPF_JSLT, BPF_REG_3, 32, 2),
  5825. BPF_MOV64_IMM(BPF_REG_0, 0),
  5826. BPF_EXIT_INSN(),
  5827. BPF_JMP_IMM(BPF_JSLT, BPF_REG_3, -3, -3),
  5828. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5829. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5830. BPF_MOV64_IMM(BPF_REG_0, 0),
  5831. BPF_EXIT_INSN(),
  5832. },
  5833. .fixup_map2 = { 3 },
  5834. .result = REJECT,
  5835. .errstr = "R1 min value is negative",
  5836. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5837. },
  5838. {
  5839. "helper access to map: bounds check using s<=, good access",
  5840. .insns = {
  5841. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5842. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5843. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5844. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5845. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5846. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5847. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5848. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5849. BPF_JMP_IMM(BPF_JSLE, BPF_REG_3, 32, 2),
  5850. BPF_MOV64_IMM(BPF_REG_0, 0),
  5851. BPF_EXIT_INSN(),
  5852. BPF_JMP_IMM(BPF_JSLE, BPF_REG_3, 0, -3),
  5853. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5854. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5855. BPF_MOV64_IMM(BPF_REG_0, 0),
  5856. BPF_EXIT_INSN(),
  5857. },
  5858. .fixup_map2 = { 3 },
  5859. .result = ACCEPT,
  5860. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5861. },
  5862. {
  5863. "helper access to map: bounds check using s<=, good access 2",
  5864. .insns = {
  5865. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5866. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5867. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5868. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5869. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5870. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5871. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5872. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  5873. BPF_JMP_IMM(BPF_JSLE, BPF_REG_3, 32, 2),
  5874. BPF_MOV64_IMM(BPF_REG_0, 0),
  5875. BPF_EXIT_INSN(),
  5876. BPF_JMP_IMM(BPF_JSLE, BPF_REG_3, -3, -3),
  5877. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5878. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5879. BPF_MOV64_IMM(BPF_REG_0, 0),
  5880. BPF_EXIT_INSN(),
  5881. },
  5882. .fixup_map2 = { 3 },
  5883. .result = ACCEPT,
  5884. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5885. },
  5886. {
  5887. "helper access to map: bounds check using s<=, bad access",
  5888. .insns = {
  5889. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5890. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5891. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5892. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5893. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5894. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5895. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  5896. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
  5897. BPF_JMP_IMM(BPF_JSLE, BPF_REG_3, 32, 2),
  5898. BPF_MOV64_IMM(BPF_REG_0, 0),
  5899. BPF_EXIT_INSN(),
  5900. BPF_JMP_IMM(BPF_JSLE, BPF_REG_3, -3, -3),
  5901. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  5902. BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 0),
  5903. BPF_MOV64_IMM(BPF_REG_0, 0),
  5904. BPF_EXIT_INSN(),
  5905. },
  5906. .fixup_map2 = { 3 },
  5907. .result = REJECT,
  5908. .errstr = "R1 min value is negative",
  5909. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5910. },
  5911. {
  5912. "map lookup helper access to map",
  5913. .insns = {
  5914. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5915. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5916. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5917. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5918. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5919. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  5920. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  5921. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5922. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5923. BPF_EXIT_INSN(),
  5924. },
  5925. .fixup_map3 = { 3, 8 },
  5926. .result = ACCEPT,
  5927. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5928. },
  5929. {
  5930. "map update helper access to map",
  5931. .insns = {
  5932. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5933. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5934. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5935. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5936. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5937. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5938. BPF_MOV64_IMM(BPF_REG_4, 0),
  5939. BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
  5940. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  5941. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5942. BPF_EMIT_CALL(BPF_FUNC_map_update_elem),
  5943. BPF_EXIT_INSN(),
  5944. },
  5945. .fixup_map3 = { 3, 10 },
  5946. .result = ACCEPT,
  5947. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5948. },
  5949. {
  5950. "map update helper access to map: wrong size",
  5951. .insns = {
  5952. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5953. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5954. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5955. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5956. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5957. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  5958. BPF_MOV64_IMM(BPF_REG_4, 0),
  5959. BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
  5960. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  5961. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5962. BPF_EMIT_CALL(BPF_FUNC_map_update_elem),
  5963. BPF_EXIT_INSN(),
  5964. },
  5965. .fixup_map1 = { 3 },
  5966. .fixup_map3 = { 10 },
  5967. .result = REJECT,
  5968. .errstr = "invalid access to map value, value_size=8 off=0 size=16",
  5969. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5970. },
  5971. {
  5972. "map helper access to adjusted map (via const imm)",
  5973. .insns = {
  5974. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5975. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5976. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5977. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5978. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5979. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  5980. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  5981. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2,
  5982. offsetof(struct other_val, bar)),
  5983. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5984. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5985. BPF_EXIT_INSN(),
  5986. },
  5987. .fixup_map3 = { 3, 9 },
  5988. .result = ACCEPT,
  5989. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  5990. },
  5991. {
  5992. "map helper access to adjusted map (via const imm): out-of-bound 1",
  5993. .insns = {
  5994. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  5995. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  5996. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  5997. BPF_LD_MAP_FD(BPF_REG_1, 0),
  5998. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  5999. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  6000. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  6001. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2,
  6002. sizeof(struct other_val) - 4),
  6003. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6004. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6005. BPF_EXIT_INSN(),
  6006. },
  6007. .fixup_map3 = { 3, 9 },
  6008. .result = REJECT,
  6009. .errstr = "invalid access to map value, value_size=16 off=12 size=8",
  6010. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6011. },
  6012. {
  6013. "map helper access to adjusted map (via const imm): out-of-bound 2",
  6014. .insns = {
  6015. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6016. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6017. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6018. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6019. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6020. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  6021. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  6022. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
  6023. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6024. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6025. BPF_EXIT_INSN(),
  6026. },
  6027. .fixup_map3 = { 3, 9 },
  6028. .result = REJECT,
  6029. .errstr = "invalid access to map value, value_size=16 off=-4 size=8",
  6030. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6031. },
  6032. {
  6033. "map helper access to adjusted map (via const reg)",
  6034. .insns = {
  6035. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6036. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6037. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6038. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6039. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6040. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  6041. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  6042. BPF_MOV64_IMM(BPF_REG_3,
  6043. offsetof(struct other_val, bar)),
  6044. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_3),
  6045. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6046. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6047. BPF_EXIT_INSN(),
  6048. },
  6049. .fixup_map3 = { 3, 10 },
  6050. .result = ACCEPT,
  6051. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6052. },
  6053. {
  6054. "map helper access to adjusted map (via const reg): out-of-bound 1",
  6055. .insns = {
  6056. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6057. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6058. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6059. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6060. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6061. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  6062. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  6063. BPF_MOV64_IMM(BPF_REG_3,
  6064. sizeof(struct other_val) - 4),
  6065. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_3),
  6066. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6067. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6068. BPF_EXIT_INSN(),
  6069. },
  6070. .fixup_map3 = { 3, 10 },
  6071. .result = REJECT,
  6072. .errstr = "invalid access to map value, value_size=16 off=12 size=8",
  6073. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6074. },
  6075. {
  6076. "map helper access to adjusted map (via const reg): out-of-bound 2",
  6077. .insns = {
  6078. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6079. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6080. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6081. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6082. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6083. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  6084. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  6085. BPF_MOV64_IMM(BPF_REG_3, -4),
  6086. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_3),
  6087. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6088. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6089. BPF_EXIT_INSN(),
  6090. },
  6091. .fixup_map3 = { 3, 10 },
  6092. .result = REJECT,
  6093. .errstr = "invalid access to map value, value_size=16 off=-4 size=8",
  6094. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6095. },
  6096. {
  6097. "map helper access to adjusted map (via variable)",
  6098. .insns = {
  6099. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6100. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6101. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6102. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6103. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6104. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  6105. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  6106. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  6107. BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
  6108. offsetof(struct other_val, bar), 4),
  6109. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_3),
  6110. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6111. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6112. BPF_EXIT_INSN(),
  6113. },
  6114. .fixup_map3 = { 3, 11 },
  6115. .result = ACCEPT,
  6116. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6117. },
  6118. {
  6119. "map helper access to adjusted map (via variable): no max check",
  6120. .insns = {
  6121. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6122. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6123. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6124. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6125. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6126. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  6127. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  6128. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  6129. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_3),
  6130. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6131. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6132. BPF_EXIT_INSN(),
  6133. },
  6134. .fixup_map3 = { 3, 10 },
  6135. .result = REJECT,
  6136. .errstr = "R2 unbounded memory access, make sure to bounds check any array access into a map",
  6137. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6138. },
  6139. {
  6140. "map helper access to adjusted map (via variable): wrong max check",
  6141. .insns = {
  6142. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6143. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6144. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6145. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6146. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6147. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  6148. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  6149. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
  6150. BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
  6151. offsetof(struct other_val, bar) + 1, 4),
  6152. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_3),
  6153. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6154. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6155. BPF_EXIT_INSN(),
  6156. },
  6157. .fixup_map3 = { 3, 11 },
  6158. .result = REJECT,
  6159. .errstr = "invalid access to map value, value_size=16 off=9 size=8",
  6160. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6161. },
  6162. {
  6163. "map element value is preserved across register spilling",
  6164. .insns = {
  6165. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6166. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6167. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6168. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6169. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6170. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  6171. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 42),
  6172. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6173. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -184),
  6174. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
  6175. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1, 0),
  6176. BPF_ST_MEM(BPF_DW, BPF_REG_3, 0, 42),
  6177. BPF_EXIT_INSN(),
  6178. },
  6179. .fixup_map2 = { 3 },
  6180. .errstr_unpriv = "R0 leaks addr",
  6181. .result = ACCEPT,
  6182. .result_unpriv = REJECT,
  6183. },
  6184. {
  6185. "map element value or null is marked on register spilling",
  6186. .insns = {
  6187. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6188. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6189. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6190. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6191. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6192. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6193. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -152),
  6194. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
  6195. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  6196. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1, 0),
  6197. BPF_ST_MEM(BPF_DW, BPF_REG_3, 0, 42),
  6198. BPF_EXIT_INSN(),
  6199. },
  6200. .fixup_map2 = { 3 },
  6201. .errstr_unpriv = "R0 leaks addr",
  6202. .result = ACCEPT,
  6203. .result_unpriv = REJECT,
  6204. },
  6205. {
  6206. "map element value store of cleared call register",
  6207. .insns = {
  6208. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6209. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6210. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6211. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6212. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6213. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  6214. BPF_STX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 0),
  6215. BPF_EXIT_INSN(),
  6216. },
  6217. .fixup_map2 = { 3 },
  6218. .errstr_unpriv = "R1 !read_ok",
  6219. .errstr = "R1 !read_ok",
  6220. .result = REJECT,
  6221. .result_unpriv = REJECT,
  6222. },
  6223. {
  6224. "map element value with unaligned store",
  6225. .insns = {
  6226. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6227. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6228. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6229. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6230. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6231. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 17),
  6232. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 3),
  6233. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 42),
  6234. BPF_ST_MEM(BPF_DW, BPF_REG_0, 2, 43),
  6235. BPF_ST_MEM(BPF_DW, BPF_REG_0, -2, 44),
  6236. BPF_MOV64_REG(BPF_REG_8, BPF_REG_0),
  6237. BPF_ST_MEM(BPF_DW, BPF_REG_8, 0, 32),
  6238. BPF_ST_MEM(BPF_DW, BPF_REG_8, 2, 33),
  6239. BPF_ST_MEM(BPF_DW, BPF_REG_8, -2, 34),
  6240. BPF_ALU64_IMM(BPF_ADD, BPF_REG_8, 5),
  6241. BPF_ST_MEM(BPF_DW, BPF_REG_8, 0, 22),
  6242. BPF_ST_MEM(BPF_DW, BPF_REG_8, 4, 23),
  6243. BPF_ST_MEM(BPF_DW, BPF_REG_8, -7, 24),
  6244. BPF_MOV64_REG(BPF_REG_7, BPF_REG_8),
  6245. BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, 3),
  6246. BPF_ST_MEM(BPF_DW, BPF_REG_7, 0, 22),
  6247. BPF_ST_MEM(BPF_DW, BPF_REG_7, 4, 23),
  6248. BPF_ST_MEM(BPF_DW, BPF_REG_7, -4, 24),
  6249. BPF_EXIT_INSN(),
  6250. },
  6251. .fixup_map2 = { 3 },
  6252. .errstr_unpriv = "R0 leaks addr",
  6253. .result = ACCEPT,
  6254. .result_unpriv = REJECT,
  6255. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  6256. },
  6257. {
  6258. "map element value with unaligned load",
  6259. .insns = {
  6260. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6261. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6262. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6263. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6264. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6265. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
  6266. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  6267. BPF_JMP_IMM(BPF_JGE, BPF_REG_1, MAX_ENTRIES, 9),
  6268. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 3),
  6269. BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
  6270. BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 2),
  6271. BPF_MOV64_REG(BPF_REG_8, BPF_REG_0),
  6272. BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_8, 0),
  6273. BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_8, 2),
  6274. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 5),
  6275. BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
  6276. BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 4),
  6277. BPF_EXIT_INSN(),
  6278. },
  6279. .fixup_map2 = { 3 },
  6280. .errstr_unpriv = "R0 leaks addr",
  6281. .result = ACCEPT,
  6282. .result_unpriv = REJECT,
  6283. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  6284. },
  6285. {
  6286. "map element value illegal alu op, 1",
  6287. .insns = {
  6288. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6289. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6290. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6291. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6292. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6293. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  6294. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 8),
  6295. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
  6296. BPF_EXIT_INSN(),
  6297. },
  6298. .fixup_map2 = { 3 },
  6299. .errstr = "R0 bitwise operator &= on pointer",
  6300. .result = REJECT,
  6301. },
  6302. {
  6303. "map element value illegal alu op, 2",
  6304. .insns = {
  6305. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6306. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6307. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6308. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6309. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6310. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  6311. BPF_ALU32_IMM(BPF_ADD, BPF_REG_0, 0),
  6312. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
  6313. BPF_EXIT_INSN(),
  6314. },
  6315. .fixup_map2 = { 3 },
  6316. .errstr = "R0 32-bit pointer arithmetic prohibited",
  6317. .result = REJECT,
  6318. },
  6319. {
  6320. "map element value illegal alu op, 3",
  6321. .insns = {
  6322. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6323. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6324. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6325. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6326. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6327. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  6328. BPF_ALU64_IMM(BPF_DIV, BPF_REG_0, 42),
  6329. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
  6330. BPF_EXIT_INSN(),
  6331. },
  6332. .fixup_map2 = { 3 },
  6333. .errstr = "R0 pointer arithmetic with /= operator",
  6334. .result = REJECT,
  6335. },
  6336. {
  6337. "map element value illegal alu op, 4",
  6338. .insns = {
  6339. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6340. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6341. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6342. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6343. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6344. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  6345. BPF_ENDIAN(BPF_FROM_BE, BPF_REG_0, 64),
  6346. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
  6347. BPF_EXIT_INSN(),
  6348. },
  6349. .fixup_map2 = { 3 },
  6350. .errstr_unpriv = "R0 pointer arithmetic prohibited",
  6351. .errstr = "invalid mem access 'inv'",
  6352. .result = REJECT,
  6353. .result_unpriv = REJECT,
  6354. },
  6355. {
  6356. "map element value illegal alu op, 5",
  6357. .insns = {
  6358. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6359. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6360. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6361. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6362. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6363. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  6364. BPF_MOV64_IMM(BPF_REG_3, 4096),
  6365. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6366. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6367. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
  6368. BPF_STX_XADD(BPF_DW, BPF_REG_2, BPF_REG_3, 0),
  6369. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, 0),
  6370. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
  6371. BPF_EXIT_INSN(),
  6372. },
  6373. .fixup_map2 = { 3 },
  6374. .errstr = "R0 invalid mem access 'inv'",
  6375. .result = REJECT,
  6376. },
  6377. {
  6378. "map element value is preserved across register spilling",
  6379. .insns = {
  6380. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6381. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6382. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6383. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6384. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6385. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  6386. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0,
  6387. offsetof(struct test_val, foo)),
  6388. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 42),
  6389. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6390. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -184),
  6391. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
  6392. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1, 0),
  6393. BPF_ST_MEM(BPF_DW, BPF_REG_3, 0, 42),
  6394. BPF_EXIT_INSN(),
  6395. },
  6396. .fixup_map2 = { 3 },
  6397. .errstr_unpriv = "R0 leaks addr",
  6398. .result = ACCEPT,
  6399. .result_unpriv = REJECT,
  6400. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  6401. },
  6402. {
  6403. "helper access to variable memory: stack, bitwise AND + JMP, correct bounds",
  6404. .insns = {
  6405. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6406. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6407. BPF_MOV64_IMM(BPF_REG_0, 0),
  6408. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
  6409. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
  6410. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
  6411. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
  6412. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -32),
  6413. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
  6414. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
  6415. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  6416. BPF_MOV64_IMM(BPF_REG_2, 16),
  6417. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6418. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6419. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 64),
  6420. BPF_MOV64_IMM(BPF_REG_4, 0),
  6421. BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
  6422. BPF_MOV64_IMM(BPF_REG_3, 0),
  6423. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6424. BPF_MOV64_IMM(BPF_REG_0, 0),
  6425. BPF_EXIT_INSN(),
  6426. },
  6427. .result = ACCEPT,
  6428. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6429. },
  6430. {
  6431. "helper access to variable memory: stack, bitwise AND, zero included",
  6432. .insns = {
  6433. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6434. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6435. BPF_MOV64_IMM(BPF_REG_2, 16),
  6436. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6437. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6438. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 64),
  6439. BPF_MOV64_IMM(BPF_REG_3, 0),
  6440. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6441. BPF_EXIT_INSN(),
  6442. },
  6443. .errstr = "invalid indirect read from stack off -64+0 size 64",
  6444. .result = REJECT,
  6445. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6446. },
  6447. {
  6448. "helper access to variable memory: stack, bitwise AND + JMP, wrong max",
  6449. .insns = {
  6450. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6451. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6452. BPF_MOV64_IMM(BPF_REG_2, 16),
  6453. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6454. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6455. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 65),
  6456. BPF_MOV64_IMM(BPF_REG_4, 0),
  6457. BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
  6458. BPF_MOV64_IMM(BPF_REG_3, 0),
  6459. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6460. BPF_MOV64_IMM(BPF_REG_0, 0),
  6461. BPF_EXIT_INSN(),
  6462. },
  6463. .errstr = "invalid stack type R1 off=-64 access_size=65",
  6464. .result = REJECT,
  6465. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6466. },
  6467. {
  6468. "helper access to variable memory: stack, JMP, correct bounds",
  6469. .insns = {
  6470. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6471. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6472. BPF_MOV64_IMM(BPF_REG_0, 0),
  6473. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
  6474. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
  6475. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
  6476. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
  6477. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -32),
  6478. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
  6479. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
  6480. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  6481. BPF_MOV64_IMM(BPF_REG_2, 16),
  6482. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6483. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6484. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 64, 4),
  6485. BPF_MOV64_IMM(BPF_REG_4, 0),
  6486. BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
  6487. BPF_MOV64_IMM(BPF_REG_3, 0),
  6488. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6489. BPF_MOV64_IMM(BPF_REG_0, 0),
  6490. BPF_EXIT_INSN(),
  6491. },
  6492. .result = ACCEPT,
  6493. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6494. },
  6495. {
  6496. "helper access to variable memory: stack, JMP (signed), correct bounds",
  6497. .insns = {
  6498. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6499. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6500. BPF_MOV64_IMM(BPF_REG_0, 0),
  6501. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
  6502. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
  6503. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
  6504. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
  6505. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -32),
  6506. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
  6507. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
  6508. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  6509. BPF_MOV64_IMM(BPF_REG_2, 16),
  6510. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6511. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6512. BPF_JMP_IMM(BPF_JSGT, BPF_REG_2, 64, 4),
  6513. BPF_MOV64_IMM(BPF_REG_4, 0),
  6514. BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
  6515. BPF_MOV64_IMM(BPF_REG_3, 0),
  6516. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6517. BPF_MOV64_IMM(BPF_REG_0, 0),
  6518. BPF_EXIT_INSN(),
  6519. },
  6520. .result = ACCEPT,
  6521. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6522. },
  6523. {
  6524. "helper access to variable memory: stack, JMP, bounds + offset",
  6525. .insns = {
  6526. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6527. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6528. BPF_MOV64_IMM(BPF_REG_2, 16),
  6529. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6530. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6531. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 64, 5),
  6532. BPF_MOV64_IMM(BPF_REG_4, 0),
  6533. BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 3),
  6534. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
  6535. BPF_MOV64_IMM(BPF_REG_3, 0),
  6536. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6537. BPF_MOV64_IMM(BPF_REG_0, 0),
  6538. BPF_EXIT_INSN(),
  6539. },
  6540. .errstr = "invalid stack type R1 off=-64 access_size=65",
  6541. .result = REJECT,
  6542. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6543. },
  6544. {
  6545. "helper access to variable memory: stack, JMP, wrong max",
  6546. .insns = {
  6547. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6548. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6549. BPF_MOV64_IMM(BPF_REG_2, 16),
  6550. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6551. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6552. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 65, 4),
  6553. BPF_MOV64_IMM(BPF_REG_4, 0),
  6554. BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
  6555. BPF_MOV64_IMM(BPF_REG_3, 0),
  6556. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6557. BPF_MOV64_IMM(BPF_REG_0, 0),
  6558. BPF_EXIT_INSN(),
  6559. },
  6560. .errstr = "invalid stack type R1 off=-64 access_size=65",
  6561. .result = REJECT,
  6562. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6563. },
  6564. {
  6565. "helper access to variable memory: stack, JMP, no max check",
  6566. .insns = {
  6567. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6568. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6569. BPF_MOV64_IMM(BPF_REG_2, 16),
  6570. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6571. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6572. BPF_MOV64_IMM(BPF_REG_4, 0),
  6573. BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
  6574. BPF_MOV64_IMM(BPF_REG_3, 0),
  6575. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6576. BPF_MOV64_IMM(BPF_REG_0, 0),
  6577. BPF_EXIT_INSN(),
  6578. },
  6579. /* because max wasn't checked, signed min is negative */
  6580. .errstr = "R2 min value is negative, either use unsigned or 'var &= const'",
  6581. .result = REJECT,
  6582. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6583. },
  6584. {
  6585. "helper access to variable memory: stack, JMP, no min check",
  6586. .insns = {
  6587. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6588. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6589. BPF_MOV64_IMM(BPF_REG_2, 16),
  6590. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6591. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6592. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 64, 3),
  6593. BPF_MOV64_IMM(BPF_REG_3, 0),
  6594. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6595. BPF_MOV64_IMM(BPF_REG_0, 0),
  6596. BPF_EXIT_INSN(),
  6597. },
  6598. .errstr = "invalid indirect read from stack off -64+0 size 64",
  6599. .result = REJECT,
  6600. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6601. },
  6602. {
  6603. "helper access to variable memory: stack, JMP (signed), no min check",
  6604. .insns = {
  6605. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6606. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6607. BPF_MOV64_IMM(BPF_REG_2, 16),
  6608. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
  6609. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
  6610. BPF_JMP_IMM(BPF_JSGT, BPF_REG_2, 64, 3),
  6611. BPF_MOV64_IMM(BPF_REG_3, 0),
  6612. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6613. BPF_MOV64_IMM(BPF_REG_0, 0),
  6614. BPF_EXIT_INSN(),
  6615. },
  6616. .errstr = "R2 min value is negative",
  6617. .result = REJECT,
  6618. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6619. },
  6620. {
  6621. "helper access to variable memory: map, JMP, correct bounds",
  6622. .insns = {
  6623. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6624. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6625. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6626. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6627. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6628. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 10),
  6629. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  6630. BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
  6631. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
  6632. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
  6633. BPF_JMP_IMM(BPF_JSGT, BPF_REG_2,
  6634. sizeof(struct test_val), 4),
  6635. BPF_MOV64_IMM(BPF_REG_4, 0),
  6636. BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
  6637. BPF_MOV64_IMM(BPF_REG_3, 0),
  6638. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6639. BPF_MOV64_IMM(BPF_REG_0, 0),
  6640. BPF_EXIT_INSN(),
  6641. },
  6642. .fixup_map2 = { 3 },
  6643. .result = ACCEPT,
  6644. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6645. },
  6646. {
  6647. "helper access to variable memory: map, JMP, wrong max",
  6648. .insns = {
  6649. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6650. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6651. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6652. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6653. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6654. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 10),
  6655. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  6656. BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
  6657. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
  6658. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
  6659. BPF_JMP_IMM(BPF_JSGT, BPF_REG_2,
  6660. sizeof(struct test_val) + 1, 4),
  6661. BPF_MOV64_IMM(BPF_REG_4, 0),
  6662. BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
  6663. BPF_MOV64_IMM(BPF_REG_3, 0),
  6664. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6665. BPF_MOV64_IMM(BPF_REG_0, 0),
  6666. BPF_EXIT_INSN(),
  6667. },
  6668. .fixup_map2 = { 3 },
  6669. .errstr = "invalid access to map value, value_size=48 off=0 size=49",
  6670. .result = REJECT,
  6671. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6672. },
  6673. {
  6674. "helper access to variable memory: map adjusted, JMP, correct bounds",
  6675. .insns = {
  6676. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6677. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6678. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6679. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6680. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6681. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
  6682. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  6683. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 20),
  6684. BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
  6685. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
  6686. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
  6687. BPF_JMP_IMM(BPF_JSGT, BPF_REG_2,
  6688. sizeof(struct test_val) - 20, 4),
  6689. BPF_MOV64_IMM(BPF_REG_4, 0),
  6690. BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
  6691. BPF_MOV64_IMM(BPF_REG_3, 0),
  6692. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6693. BPF_MOV64_IMM(BPF_REG_0, 0),
  6694. BPF_EXIT_INSN(),
  6695. },
  6696. .fixup_map2 = { 3 },
  6697. .result = ACCEPT,
  6698. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6699. },
  6700. {
  6701. "helper access to variable memory: map adjusted, JMP, wrong max",
  6702. .insns = {
  6703. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6704. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6705. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  6706. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6707. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6708. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
  6709. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  6710. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 20),
  6711. BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
  6712. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
  6713. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
  6714. BPF_JMP_IMM(BPF_JSGT, BPF_REG_2,
  6715. sizeof(struct test_val) - 19, 4),
  6716. BPF_MOV64_IMM(BPF_REG_4, 0),
  6717. BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
  6718. BPF_MOV64_IMM(BPF_REG_3, 0),
  6719. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6720. BPF_MOV64_IMM(BPF_REG_0, 0),
  6721. BPF_EXIT_INSN(),
  6722. },
  6723. .fixup_map2 = { 3 },
  6724. .errstr = "R1 min value is outside of the array range",
  6725. .result = REJECT,
  6726. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6727. },
  6728. {
  6729. "helper access to variable memory: size = 0 allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)",
  6730. .insns = {
  6731. BPF_MOV64_IMM(BPF_REG_1, 0),
  6732. BPF_MOV64_IMM(BPF_REG_2, 0),
  6733. BPF_MOV64_IMM(BPF_REG_3, 0),
  6734. BPF_MOV64_IMM(BPF_REG_4, 0),
  6735. BPF_MOV64_IMM(BPF_REG_5, 0),
  6736. BPF_EMIT_CALL(BPF_FUNC_csum_diff),
  6737. BPF_EXIT_INSN(),
  6738. },
  6739. .result = ACCEPT,
  6740. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  6741. },
  6742. {
  6743. "helper access to variable memory: size > 0 not allowed on NULL (ARG_PTR_TO_MEM_OR_NULL)",
  6744. .insns = {
  6745. BPF_MOV64_IMM(BPF_REG_1, 0),
  6746. BPF_MOV64_IMM(BPF_REG_2, 1),
  6747. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
  6748. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
  6749. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 64),
  6750. BPF_MOV64_IMM(BPF_REG_3, 0),
  6751. BPF_MOV64_IMM(BPF_REG_4, 0),
  6752. BPF_MOV64_IMM(BPF_REG_5, 0),
  6753. BPF_EMIT_CALL(BPF_FUNC_csum_diff),
  6754. BPF_EXIT_INSN(),
  6755. },
  6756. .errstr = "R1 type=inv expected=fp",
  6757. .result = REJECT,
  6758. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  6759. },
  6760. {
  6761. "helper access to variable memory: size = 0 allowed on != NULL stack pointer (ARG_PTR_TO_MEM_OR_NULL)",
  6762. .insns = {
  6763. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6764. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  6765. BPF_MOV64_IMM(BPF_REG_2, 0),
  6766. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, 0),
  6767. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 8),
  6768. BPF_MOV64_IMM(BPF_REG_3, 0),
  6769. BPF_MOV64_IMM(BPF_REG_4, 0),
  6770. BPF_MOV64_IMM(BPF_REG_5, 0),
  6771. BPF_EMIT_CALL(BPF_FUNC_csum_diff),
  6772. BPF_EXIT_INSN(),
  6773. },
  6774. .result = ACCEPT,
  6775. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  6776. },
  6777. {
  6778. "helper access to variable memory: size = 0 allowed on != NULL map pointer (ARG_PTR_TO_MEM_OR_NULL)",
  6779. .insns = {
  6780. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  6781. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6782. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6783. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6784. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  6785. BPF_FUNC_map_lookup_elem),
  6786. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  6787. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  6788. BPF_MOV64_IMM(BPF_REG_2, 0),
  6789. BPF_MOV64_IMM(BPF_REG_3, 0),
  6790. BPF_MOV64_IMM(BPF_REG_4, 0),
  6791. BPF_MOV64_IMM(BPF_REG_5, 0),
  6792. BPF_EMIT_CALL(BPF_FUNC_csum_diff),
  6793. BPF_EXIT_INSN(),
  6794. },
  6795. .fixup_map1 = { 3 },
  6796. .result = ACCEPT,
  6797. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  6798. },
  6799. {
  6800. "helper access to variable memory: size possible = 0 allowed on != NULL stack pointer (ARG_PTR_TO_MEM_OR_NULL)",
  6801. .insns = {
  6802. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  6803. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6804. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6805. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6806. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  6807. BPF_FUNC_map_lookup_elem),
  6808. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  6809. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
  6810. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 8, 7),
  6811. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6812. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  6813. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, 0),
  6814. BPF_MOV64_IMM(BPF_REG_3, 0),
  6815. BPF_MOV64_IMM(BPF_REG_4, 0),
  6816. BPF_MOV64_IMM(BPF_REG_5, 0),
  6817. BPF_EMIT_CALL(BPF_FUNC_csum_diff),
  6818. BPF_EXIT_INSN(),
  6819. },
  6820. .fixup_map1 = { 3 },
  6821. .result = ACCEPT,
  6822. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  6823. },
  6824. {
  6825. "helper access to variable memory: size possible = 0 allowed on != NULL map pointer (ARG_PTR_TO_MEM_OR_NULL)",
  6826. .insns = {
  6827. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  6828. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6829. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6830. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6831. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  6832. BPF_FUNC_map_lookup_elem),
  6833. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  6834. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  6835. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
  6836. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 8, 4),
  6837. BPF_MOV64_IMM(BPF_REG_3, 0),
  6838. BPF_MOV64_IMM(BPF_REG_4, 0),
  6839. BPF_MOV64_IMM(BPF_REG_5, 0),
  6840. BPF_EMIT_CALL(BPF_FUNC_csum_diff),
  6841. BPF_EXIT_INSN(),
  6842. },
  6843. .fixup_map1 = { 3 },
  6844. .result = ACCEPT,
  6845. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  6846. },
  6847. {
  6848. "helper access to variable memory: size possible = 0 allowed on != NULL packet pointer (ARG_PTR_TO_MEM_OR_NULL)",
  6849. .insns = {
  6850. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  6851. offsetof(struct __sk_buff, data)),
  6852. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  6853. offsetof(struct __sk_buff, data_end)),
  6854. BPF_MOV64_REG(BPF_REG_0, BPF_REG_6),
  6855. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  6856. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 7),
  6857. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  6858. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_6, 0),
  6859. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 8, 4),
  6860. BPF_MOV64_IMM(BPF_REG_3, 0),
  6861. BPF_MOV64_IMM(BPF_REG_4, 0),
  6862. BPF_MOV64_IMM(BPF_REG_5, 0),
  6863. BPF_EMIT_CALL(BPF_FUNC_csum_diff),
  6864. BPF_EXIT_INSN(),
  6865. },
  6866. .result = ACCEPT,
  6867. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  6868. .retval = 0 /* csum_diff of 64-byte packet */,
  6869. },
  6870. {
  6871. "helper access to variable memory: size = 0 not allowed on NULL (!ARG_PTR_TO_MEM_OR_NULL)",
  6872. .insns = {
  6873. BPF_MOV64_IMM(BPF_REG_1, 0),
  6874. BPF_MOV64_IMM(BPF_REG_2, 0),
  6875. BPF_MOV64_IMM(BPF_REG_3, 0),
  6876. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6877. BPF_EXIT_INSN(),
  6878. },
  6879. .errstr = "R1 type=inv expected=fp",
  6880. .result = REJECT,
  6881. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6882. },
  6883. {
  6884. "helper access to variable memory: size > 0 not allowed on NULL (!ARG_PTR_TO_MEM_OR_NULL)",
  6885. .insns = {
  6886. BPF_MOV64_IMM(BPF_REG_1, 0),
  6887. BPF_MOV64_IMM(BPF_REG_2, 1),
  6888. BPF_MOV64_IMM(BPF_REG_3, 0),
  6889. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6890. BPF_EXIT_INSN(),
  6891. },
  6892. .errstr = "R1 type=inv expected=fp",
  6893. .result = REJECT,
  6894. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6895. },
  6896. {
  6897. "helper access to variable memory: size = 0 allowed on != NULL stack pointer (!ARG_PTR_TO_MEM_OR_NULL)",
  6898. .insns = {
  6899. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6900. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  6901. BPF_MOV64_IMM(BPF_REG_2, 0),
  6902. BPF_MOV64_IMM(BPF_REG_3, 0),
  6903. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6904. BPF_EXIT_INSN(),
  6905. },
  6906. .result = ACCEPT,
  6907. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6908. },
  6909. {
  6910. "helper access to variable memory: size = 0 allowed on != NULL map pointer (!ARG_PTR_TO_MEM_OR_NULL)",
  6911. .insns = {
  6912. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  6913. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6914. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6915. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6916. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6917. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  6918. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  6919. BPF_MOV64_IMM(BPF_REG_2, 0),
  6920. BPF_MOV64_IMM(BPF_REG_3, 0),
  6921. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6922. BPF_EXIT_INSN(),
  6923. },
  6924. .fixup_map1 = { 3 },
  6925. .result = ACCEPT,
  6926. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6927. },
  6928. {
  6929. "helper access to variable memory: size possible = 0 allowed on != NULL stack pointer (!ARG_PTR_TO_MEM_OR_NULL)",
  6930. .insns = {
  6931. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  6932. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6933. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6934. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6935. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6936. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  6937. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
  6938. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 8, 4),
  6939. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6940. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  6941. BPF_MOV64_IMM(BPF_REG_3, 0),
  6942. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6943. BPF_EXIT_INSN(),
  6944. },
  6945. .fixup_map1 = { 3 },
  6946. .result = ACCEPT,
  6947. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6948. },
  6949. {
  6950. "helper access to variable memory: size possible = 0 allowed on != NULL map pointer (!ARG_PTR_TO_MEM_OR_NULL)",
  6951. .insns = {
  6952. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  6953. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  6954. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  6955. BPF_LD_MAP_FD(BPF_REG_1, 0),
  6956. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  6957. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  6958. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  6959. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
  6960. BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 8, 2),
  6961. BPF_MOV64_IMM(BPF_REG_3, 0),
  6962. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6963. BPF_EXIT_INSN(),
  6964. },
  6965. .fixup_map1 = { 3 },
  6966. .result = ACCEPT,
  6967. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6968. },
  6969. {
  6970. "helper access to variable memory: 8 bytes leak",
  6971. .insns = {
  6972. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  6973. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  6974. BPF_MOV64_IMM(BPF_REG_0, 0),
  6975. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
  6976. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
  6977. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
  6978. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
  6979. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
  6980. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
  6981. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  6982. BPF_MOV64_IMM(BPF_REG_2, 1),
  6983. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
  6984. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
  6985. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 63),
  6986. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
  6987. BPF_MOV64_IMM(BPF_REG_3, 0),
  6988. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  6989. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  6990. BPF_EXIT_INSN(),
  6991. },
  6992. .errstr = "invalid indirect read from stack off -64+32 size 64",
  6993. .result = REJECT,
  6994. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  6995. },
  6996. {
  6997. "helper access to variable memory: 8 bytes no leak (init memory)",
  6998. .insns = {
  6999. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  7000. BPF_MOV64_IMM(BPF_REG_0, 0),
  7001. BPF_MOV64_IMM(BPF_REG_0, 0),
  7002. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
  7003. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
  7004. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
  7005. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
  7006. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -32),
  7007. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
  7008. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
  7009. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  7010. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
  7011. BPF_MOV64_IMM(BPF_REG_2, 0),
  7012. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 32),
  7013. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 32),
  7014. BPF_MOV64_IMM(BPF_REG_3, 0),
  7015. BPF_EMIT_CALL(BPF_FUNC_probe_read),
  7016. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7017. BPF_EXIT_INSN(),
  7018. },
  7019. .result = ACCEPT,
  7020. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  7021. },
  7022. {
  7023. "invalid and of negative number",
  7024. .insns = {
  7025. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7026. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7027. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7028. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7029. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7030. BPF_FUNC_map_lookup_elem),
  7031. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  7032. BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  7033. BPF_ALU64_IMM(BPF_AND, BPF_REG_1, -4),
  7034. BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
  7035. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7036. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  7037. offsetof(struct test_val, foo)),
  7038. BPF_EXIT_INSN(),
  7039. },
  7040. .fixup_map2 = { 3 },
  7041. .errstr = "R0 max value is outside of the array range",
  7042. .result = REJECT,
  7043. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  7044. },
  7045. {
  7046. "invalid range check",
  7047. .insns = {
  7048. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7049. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7050. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7051. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7052. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7053. BPF_FUNC_map_lookup_elem),
  7054. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 12),
  7055. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
  7056. BPF_MOV64_IMM(BPF_REG_9, 1),
  7057. BPF_ALU32_IMM(BPF_MOD, BPF_REG_1, 2),
  7058. BPF_ALU32_IMM(BPF_ADD, BPF_REG_1, 1),
  7059. BPF_ALU32_REG(BPF_AND, BPF_REG_9, BPF_REG_1),
  7060. BPF_ALU32_IMM(BPF_ADD, BPF_REG_9, 1),
  7061. BPF_ALU32_IMM(BPF_RSH, BPF_REG_9, 1),
  7062. BPF_MOV32_IMM(BPF_REG_3, 1),
  7063. BPF_ALU32_REG(BPF_SUB, BPF_REG_3, BPF_REG_9),
  7064. BPF_ALU32_IMM(BPF_MUL, BPF_REG_3, 0x10000000),
  7065. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_3),
  7066. BPF_STX_MEM(BPF_W, BPF_REG_0, BPF_REG_3, 0),
  7067. BPF_MOV64_REG(BPF_REG_0, 0),
  7068. BPF_EXIT_INSN(),
  7069. },
  7070. .fixup_map2 = { 3 },
  7071. .errstr = "R0 max value is outside of the array range",
  7072. .result = REJECT,
  7073. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  7074. },
  7075. {
  7076. "map in map access",
  7077. .insns = {
  7078. BPF_ST_MEM(0, BPF_REG_10, -4, 0),
  7079. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7080. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
  7081. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7082. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7083. BPF_FUNC_map_lookup_elem),
  7084. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  7085. BPF_ST_MEM(0, BPF_REG_10, -4, 0),
  7086. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7087. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
  7088. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  7089. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7090. BPF_FUNC_map_lookup_elem),
  7091. BPF_MOV64_IMM(BPF_REG_0, 0),
  7092. BPF_EXIT_INSN(),
  7093. },
  7094. .fixup_map_in_map = { 3 },
  7095. .result = ACCEPT,
  7096. },
  7097. {
  7098. "invalid inner map pointer",
  7099. .insns = {
  7100. BPF_ST_MEM(0, BPF_REG_10, -4, 0),
  7101. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7102. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
  7103. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7104. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7105. BPF_FUNC_map_lookup_elem),
  7106. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  7107. BPF_ST_MEM(0, BPF_REG_10, -4, 0),
  7108. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7109. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
  7110. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  7111. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  7112. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7113. BPF_FUNC_map_lookup_elem),
  7114. BPF_MOV64_IMM(BPF_REG_0, 0),
  7115. BPF_EXIT_INSN(),
  7116. },
  7117. .fixup_map_in_map = { 3 },
  7118. .errstr = "R1 pointer arithmetic on CONST_PTR_TO_MAP prohibited",
  7119. .result = REJECT,
  7120. },
  7121. {
  7122. "forgot null checking on the inner map pointer",
  7123. .insns = {
  7124. BPF_ST_MEM(0, BPF_REG_10, -4, 0),
  7125. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7126. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
  7127. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7128. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7129. BPF_FUNC_map_lookup_elem),
  7130. BPF_ST_MEM(0, BPF_REG_10, -4, 0),
  7131. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7132. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
  7133. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  7134. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7135. BPF_FUNC_map_lookup_elem),
  7136. BPF_MOV64_IMM(BPF_REG_0, 0),
  7137. BPF_EXIT_INSN(),
  7138. },
  7139. .fixup_map_in_map = { 3 },
  7140. .errstr = "R1 type=map_value_or_null expected=map_ptr",
  7141. .result = REJECT,
  7142. },
  7143. {
  7144. "ld_abs: check calling conv, r1",
  7145. .insns = {
  7146. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7147. BPF_MOV64_IMM(BPF_REG_1, 0),
  7148. BPF_LD_ABS(BPF_W, -0x200000),
  7149. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  7150. BPF_EXIT_INSN(),
  7151. },
  7152. .errstr = "R1 !read_ok",
  7153. .result = REJECT,
  7154. },
  7155. {
  7156. "ld_abs: check calling conv, r2",
  7157. .insns = {
  7158. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7159. BPF_MOV64_IMM(BPF_REG_2, 0),
  7160. BPF_LD_ABS(BPF_W, -0x200000),
  7161. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  7162. BPF_EXIT_INSN(),
  7163. },
  7164. .errstr = "R2 !read_ok",
  7165. .result = REJECT,
  7166. },
  7167. {
  7168. "ld_abs: check calling conv, r3",
  7169. .insns = {
  7170. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7171. BPF_MOV64_IMM(BPF_REG_3, 0),
  7172. BPF_LD_ABS(BPF_W, -0x200000),
  7173. BPF_MOV64_REG(BPF_REG_0, BPF_REG_3),
  7174. BPF_EXIT_INSN(),
  7175. },
  7176. .errstr = "R3 !read_ok",
  7177. .result = REJECT,
  7178. },
  7179. {
  7180. "ld_abs: check calling conv, r4",
  7181. .insns = {
  7182. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7183. BPF_MOV64_IMM(BPF_REG_4, 0),
  7184. BPF_LD_ABS(BPF_W, -0x200000),
  7185. BPF_MOV64_REG(BPF_REG_0, BPF_REG_4),
  7186. BPF_EXIT_INSN(),
  7187. },
  7188. .errstr = "R4 !read_ok",
  7189. .result = REJECT,
  7190. },
  7191. {
  7192. "ld_abs: check calling conv, r5",
  7193. .insns = {
  7194. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7195. BPF_MOV64_IMM(BPF_REG_5, 0),
  7196. BPF_LD_ABS(BPF_W, -0x200000),
  7197. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  7198. BPF_EXIT_INSN(),
  7199. },
  7200. .errstr = "R5 !read_ok",
  7201. .result = REJECT,
  7202. },
  7203. {
  7204. "ld_abs: check calling conv, r7",
  7205. .insns = {
  7206. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7207. BPF_MOV64_IMM(BPF_REG_7, 0),
  7208. BPF_LD_ABS(BPF_W, -0x200000),
  7209. BPF_MOV64_REG(BPF_REG_0, BPF_REG_7),
  7210. BPF_EXIT_INSN(),
  7211. },
  7212. .result = ACCEPT,
  7213. },
  7214. {
  7215. "ld_abs: tests on r6 and skb data reload helper",
  7216. .insns = {
  7217. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7218. BPF_LD_ABS(BPF_B, 0),
  7219. BPF_LD_ABS(BPF_H, 0),
  7220. BPF_LD_ABS(BPF_W, 0),
  7221. BPF_MOV64_REG(BPF_REG_7, BPF_REG_6),
  7222. BPF_MOV64_IMM(BPF_REG_6, 0),
  7223. BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
  7224. BPF_MOV64_IMM(BPF_REG_2, 1),
  7225. BPF_MOV64_IMM(BPF_REG_3, 2),
  7226. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7227. BPF_FUNC_skb_vlan_push),
  7228. BPF_MOV64_REG(BPF_REG_6, BPF_REG_7),
  7229. BPF_LD_ABS(BPF_B, 0),
  7230. BPF_LD_ABS(BPF_H, 0),
  7231. BPF_LD_ABS(BPF_W, 0),
  7232. BPF_MOV64_IMM(BPF_REG_0, 42),
  7233. BPF_EXIT_INSN(),
  7234. },
  7235. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  7236. .result = ACCEPT,
  7237. .retval = 42 /* ultimate return value */,
  7238. },
  7239. {
  7240. "ld_ind: check calling conv, r1",
  7241. .insns = {
  7242. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7243. BPF_MOV64_IMM(BPF_REG_1, 1),
  7244. BPF_LD_IND(BPF_W, BPF_REG_1, -0x200000),
  7245. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  7246. BPF_EXIT_INSN(),
  7247. },
  7248. .errstr = "R1 !read_ok",
  7249. .result = REJECT,
  7250. },
  7251. {
  7252. "ld_ind: check calling conv, r2",
  7253. .insns = {
  7254. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7255. BPF_MOV64_IMM(BPF_REG_2, 1),
  7256. BPF_LD_IND(BPF_W, BPF_REG_2, -0x200000),
  7257. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  7258. BPF_EXIT_INSN(),
  7259. },
  7260. .errstr = "R2 !read_ok",
  7261. .result = REJECT,
  7262. },
  7263. {
  7264. "ld_ind: check calling conv, r3",
  7265. .insns = {
  7266. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7267. BPF_MOV64_IMM(BPF_REG_3, 1),
  7268. BPF_LD_IND(BPF_W, BPF_REG_3, -0x200000),
  7269. BPF_MOV64_REG(BPF_REG_0, BPF_REG_3),
  7270. BPF_EXIT_INSN(),
  7271. },
  7272. .errstr = "R3 !read_ok",
  7273. .result = REJECT,
  7274. },
  7275. {
  7276. "ld_ind: check calling conv, r4",
  7277. .insns = {
  7278. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7279. BPF_MOV64_IMM(BPF_REG_4, 1),
  7280. BPF_LD_IND(BPF_W, BPF_REG_4, -0x200000),
  7281. BPF_MOV64_REG(BPF_REG_0, BPF_REG_4),
  7282. BPF_EXIT_INSN(),
  7283. },
  7284. .errstr = "R4 !read_ok",
  7285. .result = REJECT,
  7286. },
  7287. {
  7288. "ld_ind: check calling conv, r5",
  7289. .insns = {
  7290. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7291. BPF_MOV64_IMM(BPF_REG_5, 1),
  7292. BPF_LD_IND(BPF_W, BPF_REG_5, -0x200000),
  7293. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  7294. BPF_EXIT_INSN(),
  7295. },
  7296. .errstr = "R5 !read_ok",
  7297. .result = REJECT,
  7298. },
  7299. {
  7300. "ld_ind: check calling conv, r7",
  7301. .insns = {
  7302. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  7303. BPF_MOV64_IMM(BPF_REG_7, 1),
  7304. BPF_LD_IND(BPF_W, BPF_REG_7, -0x200000),
  7305. BPF_MOV64_REG(BPF_REG_0, BPF_REG_7),
  7306. BPF_EXIT_INSN(),
  7307. },
  7308. .result = ACCEPT,
  7309. .retval = 1,
  7310. },
  7311. {
  7312. "check bpf_perf_event_data->sample_period byte load permitted",
  7313. .insns = {
  7314. BPF_MOV64_IMM(BPF_REG_0, 0),
  7315. #if __BYTE_ORDER == __LITTLE_ENDIAN
  7316. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  7317. offsetof(struct bpf_perf_event_data, sample_period)),
  7318. #else
  7319. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
  7320. offsetof(struct bpf_perf_event_data, sample_period) + 7),
  7321. #endif
  7322. BPF_EXIT_INSN(),
  7323. },
  7324. .result = ACCEPT,
  7325. .prog_type = BPF_PROG_TYPE_PERF_EVENT,
  7326. },
  7327. {
  7328. "check bpf_perf_event_data->sample_period half load permitted",
  7329. .insns = {
  7330. BPF_MOV64_IMM(BPF_REG_0, 0),
  7331. #if __BYTE_ORDER == __LITTLE_ENDIAN
  7332. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  7333. offsetof(struct bpf_perf_event_data, sample_period)),
  7334. #else
  7335. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  7336. offsetof(struct bpf_perf_event_data, sample_period) + 6),
  7337. #endif
  7338. BPF_EXIT_INSN(),
  7339. },
  7340. .result = ACCEPT,
  7341. .prog_type = BPF_PROG_TYPE_PERF_EVENT,
  7342. },
  7343. {
  7344. "check bpf_perf_event_data->sample_period word load permitted",
  7345. .insns = {
  7346. BPF_MOV64_IMM(BPF_REG_0, 0),
  7347. #if __BYTE_ORDER == __LITTLE_ENDIAN
  7348. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  7349. offsetof(struct bpf_perf_event_data, sample_period)),
  7350. #else
  7351. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  7352. offsetof(struct bpf_perf_event_data, sample_period) + 4),
  7353. #endif
  7354. BPF_EXIT_INSN(),
  7355. },
  7356. .result = ACCEPT,
  7357. .prog_type = BPF_PROG_TYPE_PERF_EVENT,
  7358. },
  7359. {
  7360. "check bpf_perf_event_data->sample_period dword load permitted",
  7361. .insns = {
  7362. BPF_MOV64_IMM(BPF_REG_0, 0),
  7363. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
  7364. offsetof(struct bpf_perf_event_data, sample_period)),
  7365. BPF_EXIT_INSN(),
  7366. },
  7367. .result = ACCEPT,
  7368. .prog_type = BPF_PROG_TYPE_PERF_EVENT,
  7369. },
  7370. {
  7371. "check skb->data half load not permitted",
  7372. .insns = {
  7373. BPF_MOV64_IMM(BPF_REG_0, 0),
  7374. #if __BYTE_ORDER == __LITTLE_ENDIAN
  7375. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  7376. offsetof(struct __sk_buff, data)),
  7377. #else
  7378. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  7379. offsetof(struct __sk_buff, data) + 2),
  7380. #endif
  7381. BPF_EXIT_INSN(),
  7382. },
  7383. .result = REJECT,
  7384. .errstr = "invalid bpf_context access",
  7385. },
  7386. {
  7387. "check skb->tc_classid half load not permitted for lwt prog",
  7388. .insns = {
  7389. BPF_MOV64_IMM(BPF_REG_0, 0),
  7390. #if __BYTE_ORDER == __LITTLE_ENDIAN
  7391. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  7392. offsetof(struct __sk_buff, tc_classid)),
  7393. #else
  7394. BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
  7395. offsetof(struct __sk_buff, tc_classid) + 2),
  7396. #endif
  7397. BPF_EXIT_INSN(),
  7398. },
  7399. .result = REJECT,
  7400. .errstr = "invalid bpf_context access",
  7401. .prog_type = BPF_PROG_TYPE_LWT_IN,
  7402. },
  7403. {
  7404. "bounds checks mixing signed and unsigned, positive bounds",
  7405. .insns = {
  7406. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7407. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7408. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7409. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7410. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7411. BPF_FUNC_map_lookup_elem),
  7412. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  7413. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7414. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7415. BPF_MOV64_IMM(BPF_REG_2, 2),
  7416. BPF_JMP_REG(BPF_JGE, BPF_REG_2, BPF_REG_1, 3),
  7417. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 4, 2),
  7418. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7419. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7420. BPF_MOV64_IMM(BPF_REG_0, 0),
  7421. BPF_EXIT_INSN(),
  7422. },
  7423. .fixup_map1 = { 3 },
  7424. .errstr = "unbounded min value",
  7425. .result = REJECT,
  7426. },
  7427. {
  7428. "bounds checks mixing signed and unsigned",
  7429. .insns = {
  7430. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7431. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7432. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7433. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7434. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7435. BPF_FUNC_map_lookup_elem),
  7436. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  7437. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7438. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7439. BPF_MOV64_IMM(BPF_REG_2, -1),
  7440. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_2, 3),
  7441. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7442. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7443. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7444. BPF_MOV64_IMM(BPF_REG_0, 0),
  7445. BPF_EXIT_INSN(),
  7446. },
  7447. .fixup_map1 = { 3 },
  7448. .errstr = "unbounded min value",
  7449. .result = REJECT,
  7450. },
  7451. {
  7452. "bounds checks mixing signed and unsigned, variant 2",
  7453. .insns = {
  7454. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7455. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7456. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7457. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7458. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7459. BPF_FUNC_map_lookup_elem),
  7460. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  7461. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7462. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7463. BPF_MOV64_IMM(BPF_REG_2, -1),
  7464. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_2, 5),
  7465. BPF_MOV64_IMM(BPF_REG_8, 0),
  7466. BPF_ALU64_REG(BPF_ADD, BPF_REG_8, BPF_REG_1),
  7467. BPF_JMP_IMM(BPF_JSGT, BPF_REG_8, 1, 2),
  7468. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_8),
  7469. BPF_ST_MEM(BPF_B, BPF_REG_8, 0, 0),
  7470. BPF_MOV64_IMM(BPF_REG_0, 0),
  7471. BPF_EXIT_INSN(),
  7472. },
  7473. .fixup_map1 = { 3 },
  7474. .errstr = "unbounded min value",
  7475. .result = REJECT,
  7476. },
  7477. {
  7478. "bounds checks mixing signed and unsigned, variant 3",
  7479. .insns = {
  7480. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7481. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7482. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7483. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7484. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7485. BPF_FUNC_map_lookup_elem),
  7486. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
  7487. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7488. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7489. BPF_MOV64_IMM(BPF_REG_2, -1),
  7490. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_2, 4),
  7491. BPF_MOV64_REG(BPF_REG_8, BPF_REG_1),
  7492. BPF_JMP_IMM(BPF_JSGT, BPF_REG_8, 1, 2),
  7493. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_8),
  7494. BPF_ST_MEM(BPF_B, BPF_REG_8, 0, 0),
  7495. BPF_MOV64_IMM(BPF_REG_0, 0),
  7496. BPF_EXIT_INSN(),
  7497. },
  7498. .fixup_map1 = { 3 },
  7499. .errstr = "unbounded min value",
  7500. .result = REJECT,
  7501. },
  7502. {
  7503. "bounds checks mixing signed and unsigned, variant 4",
  7504. .insns = {
  7505. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7506. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7507. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7508. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7509. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7510. BPF_FUNC_map_lookup_elem),
  7511. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  7512. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7513. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7514. BPF_MOV64_IMM(BPF_REG_2, 1),
  7515. BPF_ALU64_REG(BPF_AND, BPF_REG_1, BPF_REG_2),
  7516. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7517. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7518. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7519. BPF_MOV64_IMM(BPF_REG_0, 0),
  7520. BPF_EXIT_INSN(),
  7521. },
  7522. .fixup_map1 = { 3 },
  7523. .result = ACCEPT,
  7524. },
  7525. {
  7526. "bounds checks mixing signed and unsigned, variant 5",
  7527. .insns = {
  7528. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7529. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7530. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7531. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7532. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7533. BPF_FUNC_map_lookup_elem),
  7534. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  7535. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7536. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7537. BPF_MOV64_IMM(BPF_REG_2, -1),
  7538. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_2, 5),
  7539. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 4),
  7540. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 4),
  7541. BPF_ALU64_REG(BPF_SUB, BPF_REG_0, BPF_REG_1),
  7542. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7543. BPF_MOV64_IMM(BPF_REG_0, 0),
  7544. BPF_EXIT_INSN(),
  7545. },
  7546. .fixup_map1 = { 3 },
  7547. .errstr = "unbounded min value",
  7548. .result = REJECT,
  7549. },
  7550. {
  7551. "bounds checks mixing signed and unsigned, variant 6",
  7552. .insns = {
  7553. BPF_MOV64_IMM(BPF_REG_2, 0),
  7554. BPF_MOV64_REG(BPF_REG_3, BPF_REG_10),
  7555. BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, -512),
  7556. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7557. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -16),
  7558. BPF_MOV64_IMM(BPF_REG_6, -1),
  7559. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_6, 5),
  7560. BPF_JMP_IMM(BPF_JSGT, BPF_REG_4, 1, 4),
  7561. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 1),
  7562. BPF_MOV64_IMM(BPF_REG_5, 0),
  7563. BPF_ST_MEM(BPF_H, BPF_REG_10, -512, 0),
  7564. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7565. BPF_FUNC_skb_load_bytes),
  7566. BPF_MOV64_IMM(BPF_REG_0, 0),
  7567. BPF_EXIT_INSN(),
  7568. },
  7569. .errstr = "R4 min value is negative, either use unsigned",
  7570. .result = REJECT,
  7571. },
  7572. {
  7573. "bounds checks mixing signed and unsigned, variant 7",
  7574. .insns = {
  7575. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7576. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7577. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7578. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7579. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7580. BPF_FUNC_map_lookup_elem),
  7581. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
  7582. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7583. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7584. BPF_MOV64_IMM(BPF_REG_2, 1024 * 1024 * 1024),
  7585. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_2, 3),
  7586. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7587. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7588. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7589. BPF_MOV64_IMM(BPF_REG_0, 0),
  7590. BPF_EXIT_INSN(),
  7591. },
  7592. .fixup_map1 = { 3 },
  7593. .result = ACCEPT,
  7594. },
  7595. {
  7596. "bounds checks mixing signed and unsigned, variant 8",
  7597. .insns = {
  7598. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7599. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7600. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7601. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7602. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7603. BPF_FUNC_map_lookup_elem),
  7604. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  7605. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7606. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7607. BPF_MOV64_IMM(BPF_REG_2, -1),
  7608. BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 2),
  7609. BPF_MOV64_IMM(BPF_REG_0, 0),
  7610. BPF_EXIT_INSN(),
  7611. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7612. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7613. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7614. BPF_MOV64_IMM(BPF_REG_0, 0),
  7615. BPF_EXIT_INSN(),
  7616. },
  7617. .fixup_map1 = { 3 },
  7618. .errstr = "unbounded min value",
  7619. .result = REJECT,
  7620. },
  7621. {
  7622. "bounds checks mixing signed and unsigned, variant 9",
  7623. .insns = {
  7624. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7625. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7626. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7627. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7628. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7629. BPF_FUNC_map_lookup_elem),
  7630. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 10),
  7631. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7632. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7633. BPF_LD_IMM64(BPF_REG_2, -9223372036854775808ULL),
  7634. BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 2),
  7635. BPF_MOV64_IMM(BPF_REG_0, 0),
  7636. BPF_EXIT_INSN(),
  7637. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7638. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7639. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7640. BPF_MOV64_IMM(BPF_REG_0, 0),
  7641. BPF_EXIT_INSN(),
  7642. },
  7643. .fixup_map1 = { 3 },
  7644. .result = ACCEPT,
  7645. },
  7646. {
  7647. "bounds checks mixing signed and unsigned, variant 10",
  7648. .insns = {
  7649. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7650. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7651. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7652. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7653. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7654. BPF_FUNC_map_lookup_elem),
  7655. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  7656. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7657. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7658. BPF_MOV64_IMM(BPF_REG_2, 0),
  7659. BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 2),
  7660. BPF_MOV64_IMM(BPF_REG_0, 0),
  7661. BPF_EXIT_INSN(),
  7662. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7663. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7664. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7665. BPF_MOV64_IMM(BPF_REG_0, 0),
  7666. BPF_EXIT_INSN(),
  7667. },
  7668. .fixup_map1 = { 3 },
  7669. .errstr = "unbounded min value",
  7670. .result = REJECT,
  7671. },
  7672. {
  7673. "bounds checks mixing signed and unsigned, variant 11",
  7674. .insns = {
  7675. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7676. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7677. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7678. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7679. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7680. BPF_FUNC_map_lookup_elem),
  7681. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  7682. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7683. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7684. BPF_MOV64_IMM(BPF_REG_2, -1),
  7685. BPF_JMP_REG(BPF_JGE, BPF_REG_2, BPF_REG_1, 2),
  7686. /* Dead branch. */
  7687. BPF_MOV64_IMM(BPF_REG_0, 0),
  7688. BPF_EXIT_INSN(),
  7689. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7690. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7691. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7692. BPF_MOV64_IMM(BPF_REG_0, 0),
  7693. BPF_EXIT_INSN(),
  7694. },
  7695. .fixup_map1 = { 3 },
  7696. .errstr = "unbounded min value",
  7697. .result = REJECT,
  7698. },
  7699. {
  7700. "bounds checks mixing signed and unsigned, variant 12",
  7701. .insns = {
  7702. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7703. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7704. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7705. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7706. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7707. BPF_FUNC_map_lookup_elem),
  7708. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  7709. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7710. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7711. BPF_MOV64_IMM(BPF_REG_2, -6),
  7712. BPF_JMP_REG(BPF_JGE, BPF_REG_2, BPF_REG_1, 2),
  7713. BPF_MOV64_IMM(BPF_REG_0, 0),
  7714. BPF_EXIT_INSN(),
  7715. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7716. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7717. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7718. BPF_MOV64_IMM(BPF_REG_0, 0),
  7719. BPF_EXIT_INSN(),
  7720. },
  7721. .fixup_map1 = { 3 },
  7722. .errstr = "unbounded min value",
  7723. .result = REJECT,
  7724. },
  7725. {
  7726. "bounds checks mixing signed and unsigned, variant 13",
  7727. .insns = {
  7728. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7729. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7730. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7731. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7732. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7733. BPF_FUNC_map_lookup_elem),
  7734. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  7735. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7736. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7737. BPF_MOV64_IMM(BPF_REG_2, 2),
  7738. BPF_JMP_REG(BPF_JGE, BPF_REG_2, BPF_REG_1, 2),
  7739. BPF_MOV64_IMM(BPF_REG_7, 1),
  7740. BPF_JMP_IMM(BPF_JSGT, BPF_REG_7, 0, 2),
  7741. BPF_MOV64_IMM(BPF_REG_0, 0),
  7742. BPF_EXIT_INSN(),
  7743. BPF_ALU64_REG(BPF_ADD, BPF_REG_7, BPF_REG_1),
  7744. BPF_JMP_IMM(BPF_JSGT, BPF_REG_7, 4, 2),
  7745. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_7),
  7746. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7747. BPF_MOV64_IMM(BPF_REG_0, 0),
  7748. BPF_EXIT_INSN(),
  7749. },
  7750. .fixup_map1 = { 3 },
  7751. .errstr = "unbounded min value",
  7752. .result = REJECT,
  7753. },
  7754. {
  7755. "bounds checks mixing signed and unsigned, variant 14",
  7756. .insns = {
  7757. BPF_LDX_MEM(BPF_W, BPF_REG_9, BPF_REG_1,
  7758. offsetof(struct __sk_buff, mark)),
  7759. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7760. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7761. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7762. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7763. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7764. BPF_FUNC_map_lookup_elem),
  7765. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
  7766. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7767. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7768. BPF_MOV64_IMM(BPF_REG_2, -1),
  7769. BPF_MOV64_IMM(BPF_REG_8, 2),
  7770. BPF_JMP_IMM(BPF_JEQ, BPF_REG_9, 42, 6),
  7771. BPF_JMP_REG(BPF_JSGT, BPF_REG_8, BPF_REG_1, 3),
  7772. BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 1, 2),
  7773. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7774. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7775. BPF_MOV64_IMM(BPF_REG_0, 0),
  7776. BPF_EXIT_INSN(),
  7777. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_2, -3),
  7778. BPF_JMP_IMM(BPF_JA, 0, 0, -7),
  7779. },
  7780. .fixup_map1 = { 4 },
  7781. .errstr = "R0 invalid mem access 'inv'",
  7782. .result = REJECT,
  7783. },
  7784. {
  7785. "bounds checks mixing signed and unsigned, variant 15",
  7786. .insns = {
  7787. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7788. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7789. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7790. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7791. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7792. BPF_FUNC_map_lookup_elem),
  7793. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  7794. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, -8),
  7795. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
  7796. BPF_MOV64_IMM(BPF_REG_2, -6),
  7797. BPF_JMP_REG(BPF_JGE, BPF_REG_2, BPF_REG_1, 2),
  7798. BPF_MOV64_IMM(BPF_REG_0, 0),
  7799. BPF_EXIT_INSN(),
  7800. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7801. BPF_JMP_IMM(BPF_JGT, BPF_REG_0, 1, 2),
  7802. BPF_MOV64_IMM(BPF_REG_0, 0),
  7803. BPF_EXIT_INSN(),
  7804. BPF_ST_MEM(BPF_B, BPF_REG_0, 0, 0),
  7805. BPF_MOV64_IMM(BPF_REG_0, 0),
  7806. BPF_EXIT_INSN(),
  7807. },
  7808. .fixup_map1 = { 3 },
  7809. .errstr = "unbounded min value",
  7810. .result = REJECT,
  7811. .result_unpriv = REJECT,
  7812. },
  7813. {
  7814. "subtraction bounds (map value) variant 1",
  7815. .insns = {
  7816. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7817. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7818. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7819. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7820. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7821. BPF_FUNC_map_lookup_elem),
  7822. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  7823. BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  7824. BPF_JMP_IMM(BPF_JGT, BPF_REG_1, 0xff, 7),
  7825. BPF_LDX_MEM(BPF_B, BPF_REG_3, BPF_REG_0, 1),
  7826. BPF_JMP_IMM(BPF_JGT, BPF_REG_3, 0xff, 5),
  7827. BPF_ALU64_REG(BPF_SUB, BPF_REG_1, BPF_REG_3),
  7828. BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 56),
  7829. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7830. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  7831. BPF_EXIT_INSN(),
  7832. BPF_MOV64_IMM(BPF_REG_0, 0),
  7833. BPF_EXIT_INSN(),
  7834. },
  7835. .fixup_map1 = { 3 },
  7836. .errstr = "R0 max value is outside of the array range",
  7837. .result = REJECT,
  7838. },
  7839. {
  7840. "subtraction bounds (map value) variant 2",
  7841. .insns = {
  7842. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7843. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7844. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7845. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7846. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7847. BPF_FUNC_map_lookup_elem),
  7848. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
  7849. BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  7850. BPF_JMP_IMM(BPF_JGT, BPF_REG_1, 0xff, 6),
  7851. BPF_LDX_MEM(BPF_B, BPF_REG_3, BPF_REG_0, 1),
  7852. BPF_JMP_IMM(BPF_JGT, BPF_REG_3, 0xff, 4),
  7853. BPF_ALU64_REG(BPF_SUB, BPF_REG_1, BPF_REG_3),
  7854. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  7855. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  7856. BPF_EXIT_INSN(),
  7857. BPF_MOV64_IMM(BPF_REG_0, 0),
  7858. BPF_EXIT_INSN(),
  7859. },
  7860. .fixup_map1 = { 3 },
  7861. .errstr = "R0 min value is negative, either use unsigned index or do a if (index >=0) check.",
  7862. .result = REJECT,
  7863. },
  7864. {
  7865. "bounds check based on zero-extended MOV",
  7866. .insns = {
  7867. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7868. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7869. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7870. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7871. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7872. BPF_FUNC_map_lookup_elem),
  7873. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  7874. /* r2 = 0x0000'0000'ffff'ffff */
  7875. BPF_MOV32_IMM(BPF_REG_2, 0xffffffff),
  7876. /* r2 = 0 */
  7877. BPF_ALU64_IMM(BPF_RSH, BPF_REG_2, 32),
  7878. /* no-op */
  7879. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  7880. /* access at offset 0 */
  7881. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  7882. /* exit */
  7883. BPF_MOV64_IMM(BPF_REG_0, 0),
  7884. BPF_EXIT_INSN(),
  7885. },
  7886. .fixup_map1 = { 3 },
  7887. .result = ACCEPT
  7888. },
  7889. {
  7890. "bounds check based on sign-extended MOV. test1",
  7891. .insns = {
  7892. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7893. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7894. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7895. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7896. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7897. BPF_FUNC_map_lookup_elem),
  7898. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  7899. /* r2 = 0xffff'ffff'ffff'ffff */
  7900. BPF_MOV64_IMM(BPF_REG_2, 0xffffffff),
  7901. /* r2 = 0xffff'ffff */
  7902. BPF_ALU64_IMM(BPF_RSH, BPF_REG_2, 32),
  7903. /* r0 = <oob pointer> */
  7904. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  7905. /* access to OOB pointer */
  7906. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  7907. /* exit */
  7908. BPF_MOV64_IMM(BPF_REG_0, 0),
  7909. BPF_EXIT_INSN(),
  7910. },
  7911. .fixup_map1 = { 3 },
  7912. .errstr = "map_value pointer and 4294967295",
  7913. .result = REJECT
  7914. },
  7915. {
  7916. "bounds check based on sign-extended MOV. test2",
  7917. .insns = {
  7918. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7919. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7920. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7921. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7922. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7923. BPF_FUNC_map_lookup_elem),
  7924. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  7925. /* r2 = 0xffff'ffff'ffff'ffff */
  7926. BPF_MOV64_IMM(BPF_REG_2, 0xffffffff),
  7927. /* r2 = 0xfff'ffff */
  7928. BPF_ALU64_IMM(BPF_RSH, BPF_REG_2, 36),
  7929. /* r0 = <oob pointer> */
  7930. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  7931. /* access to OOB pointer */
  7932. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  7933. /* exit */
  7934. BPF_MOV64_IMM(BPF_REG_0, 0),
  7935. BPF_EXIT_INSN(),
  7936. },
  7937. .fixup_map1 = { 3 },
  7938. .errstr = "R0 min value is outside of the array range",
  7939. .result = REJECT
  7940. },
  7941. {
  7942. "bounds check based on reg_off + var_off + insn_off. test1",
  7943. .insns = {
  7944. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  7945. offsetof(struct __sk_buff, mark)),
  7946. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7947. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7948. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7949. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7950. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7951. BPF_FUNC_map_lookup_elem),
  7952. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  7953. BPF_ALU64_IMM(BPF_AND, BPF_REG_6, 1),
  7954. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, (1 << 29) - 1),
  7955. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_6),
  7956. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, (1 << 29) - 1),
  7957. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 3),
  7958. BPF_MOV64_IMM(BPF_REG_0, 0),
  7959. BPF_EXIT_INSN(),
  7960. },
  7961. .fixup_map1 = { 4 },
  7962. .errstr = "value_size=8 off=1073741825",
  7963. .result = REJECT,
  7964. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  7965. },
  7966. {
  7967. "bounds check based on reg_off + var_off + insn_off. test2",
  7968. .insns = {
  7969. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  7970. offsetof(struct __sk_buff, mark)),
  7971. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7972. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7973. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7974. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7975. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7976. BPF_FUNC_map_lookup_elem),
  7977. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
  7978. BPF_ALU64_IMM(BPF_AND, BPF_REG_6, 1),
  7979. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, (1 << 30) - 1),
  7980. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_6),
  7981. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, (1 << 29) - 1),
  7982. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 3),
  7983. BPF_MOV64_IMM(BPF_REG_0, 0),
  7984. BPF_EXIT_INSN(),
  7985. },
  7986. .fixup_map1 = { 4 },
  7987. .errstr = "value 1073741823",
  7988. .result = REJECT,
  7989. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  7990. },
  7991. {
  7992. "bounds check after truncation of non-boundary-crossing range",
  7993. .insns = {
  7994. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  7995. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  7996. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  7997. BPF_LD_MAP_FD(BPF_REG_1, 0),
  7998. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  7999. BPF_FUNC_map_lookup_elem),
  8000. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  8001. /* r1 = [0x00, 0xff] */
  8002. BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  8003. BPF_MOV64_IMM(BPF_REG_2, 1),
  8004. /* r2 = 0x10'0000'0000 */
  8005. BPF_ALU64_IMM(BPF_LSH, BPF_REG_2, 36),
  8006. /* r1 = [0x10'0000'0000, 0x10'0000'00ff] */
  8007. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2),
  8008. /* r1 = [0x10'7fff'ffff, 0x10'8000'00fe] */
  8009. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0x7fffffff),
  8010. /* r1 = [0x00, 0xff] */
  8011. BPF_ALU32_IMM(BPF_SUB, BPF_REG_1, 0x7fffffff),
  8012. /* r1 = 0 */
  8013. BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 8),
  8014. /* no-op */
  8015. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  8016. /* access at offset 0 */
  8017. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  8018. /* exit */
  8019. BPF_MOV64_IMM(BPF_REG_0, 0),
  8020. BPF_EXIT_INSN(),
  8021. },
  8022. .fixup_map1 = { 3 },
  8023. .result = ACCEPT
  8024. },
  8025. {
  8026. "bounds check after truncation of boundary-crossing range (1)",
  8027. .insns = {
  8028. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8029. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8030. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8031. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8032. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8033. BPF_FUNC_map_lookup_elem),
  8034. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  8035. /* r1 = [0x00, 0xff] */
  8036. BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  8037. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0xffffff80 >> 1),
  8038. /* r1 = [0xffff'ff80, 0x1'0000'007f] */
  8039. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0xffffff80 >> 1),
  8040. /* r1 = [0xffff'ff80, 0xffff'ffff] or
  8041. * [0x0000'0000, 0x0000'007f]
  8042. */
  8043. BPF_ALU32_IMM(BPF_ADD, BPF_REG_1, 0),
  8044. BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 0xffffff80 >> 1),
  8045. /* r1 = [0x00, 0xff] or
  8046. * [0xffff'ffff'0000'0080, 0xffff'ffff'ffff'ffff]
  8047. */
  8048. BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 0xffffff80 >> 1),
  8049. /* r1 = 0 or
  8050. * [0x00ff'ffff'ff00'0000, 0x00ff'ffff'ffff'ffff]
  8051. */
  8052. BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 8),
  8053. /* no-op or OOB pointer computation */
  8054. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  8055. /* potentially OOB access */
  8056. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  8057. /* exit */
  8058. BPF_MOV64_IMM(BPF_REG_0, 0),
  8059. BPF_EXIT_INSN(),
  8060. },
  8061. .fixup_map1 = { 3 },
  8062. /* not actually fully unbounded, but the bound is very high */
  8063. .errstr = "R0 unbounded memory access",
  8064. .result = REJECT
  8065. },
  8066. {
  8067. "bounds check after truncation of boundary-crossing range (2)",
  8068. .insns = {
  8069. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8070. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8071. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8072. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8073. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8074. BPF_FUNC_map_lookup_elem),
  8075. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
  8076. /* r1 = [0x00, 0xff] */
  8077. BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  8078. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0xffffff80 >> 1),
  8079. /* r1 = [0xffff'ff80, 0x1'0000'007f] */
  8080. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0xffffff80 >> 1),
  8081. /* r1 = [0xffff'ff80, 0xffff'ffff] or
  8082. * [0x0000'0000, 0x0000'007f]
  8083. * difference to previous test: truncation via MOV32
  8084. * instead of ALU32.
  8085. */
  8086. BPF_MOV32_REG(BPF_REG_1, BPF_REG_1),
  8087. BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 0xffffff80 >> 1),
  8088. /* r1 = [0x00, 0xff] or
  8089. * [0xffff'ffff'0000'0080, 0xffff'ffff'ffff'ffff]
  8090. */
  8091. BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 0xffffff80 >> 1),
  8092. /* r1 = 0 or
  8093. * [0x00ff'ffff'ff00'0000, 0x00ff'ffff'ffff'ffff]
  8094. */
  8095. BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 8),
  8096. /* no-op or OOB pointer computation */
  8097. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  8098. /* potentially OOB access */
  8099. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  8100. /* exit */
  8101. BPF_MOV64_IMM(BPF_REG_0, 0),
  8102. BPF_EXIT_INSN(),
  8103. },
  8104. .fixup_map1 = { 3 },
  8105. /* not actually fully unbounded, but the bound is very high */
  8106. .errstr = "R0 unbounded memory access",
  8107. .result = REJECT
  8108. },
  8109. {
  8110. "bounds check after wrapping 32-bit addition",
  8111. .insns = {
  8112. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8113. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8114. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8115. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8116. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8117. BPF_FUNC_map_lookup_elem),
  8118. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
  8119. /* r1 = 0x7fff'ffff */
  8120. BPF_MOV64_IMM(BPF_REG_1, 0x7fffffff),
  8121. /* r1 = 0xffff'fffe */
  8122. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0x7fffffff),
  8123. /* r1 = 0 */
  8124. BPF_ALU32_IMM(BPF_ADD, BPF_REG_1, 2),
  8125. /* no-op */
  8126. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  8127. /* access at offset 0 */
  8128. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  8129. /* exit */
  8130. BPF_MOV64_IMM(BPF_REG_0, 0),
  8131. BPF_EXIT_INSN(),
  8132. },
  8133. .fixup_map1 = { 3 },
  8134. .result = ACCEPT
  8135. },
  8136. {
  8137. "bounds check after shift with oversized count operand",
  8138. .insns = {
  8139. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8140. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8141. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8142. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8143. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8144. BPF_FUNC_map_lookup_elem),
  8145. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  8146. BPF_MOV64_IMM(BPF_REG_2, 32),
  8147. BPF_MOV64_IMM(BPF_REG_1, 1),
  8148. /* r1 = (u32)1 << (u32)32 = ? */
  8149. BPF_ALU32_REG(BPF_LSH, BPF_REG_1, BPF_REG_2),
  8150. /* r1 = [0x0000, 0xffff] */
  8151. BPF_ALU64_IMM(BPF_AND, BPF_REG_1, 0xffff),
  8152. /* computes unknown pointer, potentially OOB */
  8153. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  8154. /* potentially OOB access */
  8155. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  8156. /* exit */
  8157. BPF_MOV64_IMM(BPF_REG_0, 0),
  8158. BPF_EXIT_INSN(),
  8159. },
  8160. .fixup_map1 = { 3 },
  8161. .errstr = "R0 max value is outside of the array range",
  8162. .result = REJECT
  8163. },
  8164. {
  8165. "bounds check after right shift of maybe-negative number",
  8166. .insns = {
  8167. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8168. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8169. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8170. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8171. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8172. BPF_FUNC_map_lookup_elem),
  8173. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
  8174. /* r1 = [0x00, 0xff] */
  8175. BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  8176. /* r1 = [-0x01, 0xfe] */
  8177. BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 1),
  8178. /* r1 = 0 or 0xff'ffff'ffff'ffff */
  8179. BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 8),
  8180. /* r1 = 0 or 0xffff'ffff'ffff */
  8181. BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 8),
  8182. /* computes unknown pointer, potentially OOB */
  8183. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  8184. /* potentially OOB access */
  8185. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  8186. /* exit */
  8187. BPF_MOV64_IMM(BPF_REG_0, 0),
  8188. BPF_EXIT_INSN(),
  8189. },
  8190. .fixup_map1 = { 3 },
  8191. .errstr = "R0 unbounded memory access",
  8192. .result = REJECT
  8193. },
  8194. {
  8195. "bounds check map access with off+size signed 32bit overflow. test1",
  8196. .insns = {
  8197. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8198. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8199. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8200. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8201. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8202. BPF_FUNC_map_lookup_elem),
  8203. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  8204. BPF_EXIT_INSN(),
  8205. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 0x7ffffffe),
  8206. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0),
  8207. BPF_JMP_A(0),
  8208. BPF_EXIT_INSN(),
  8209. },
  8210. .fixup_map1 = { 3 },
  8211. .errstr = "map_value pointer and 2147483646",
  8212. .result = REJECT
  8213. },
  8214. {
  8215. "bounds check map access with off+size signed 32bit overflow. test2",
  8216. .insns = {
  8217. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8218. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8219. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8220. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8221. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8222. BPF_FUNC_map_lookup_elem),
  8223. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  8224. BPF_EXIT_INSN(),
  8225. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 0x1fffffff),
  8226. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 0x1fffffff),
  8227. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 0x1fffffff),
  8228. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0),
  8229. BPF_JMP_A(0),
  8230. BPF_EXIT_INSN(),
  8231. },
  8232. .fixup_map1 = { 3 },
  8233. .errstr = "pointer offset 1073741822",
  8234. .result = REJECT
  8235. },
  8236. {
  8237. "bounds check map access with off+size signed 32bit overflow. test3",
  8238. .insns = {
  8239. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8240. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8241. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8242. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8243. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8244. BPF_FUNC_map_lookup_elem),
  8245. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  8246. BPF_EXIT_INSN(),
  8247. BPF_ALU64_IMM(BPF_SUB, BPF_REG_0, 0x1fffffff),
  8248. BPF_ALU64_IMM(BPF_SUB, BPF_REG_0, 0x1fffffff),
  8249. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 2),
  8250. BPF_JMP_A(0),
  8251. BPF_EXIT_INSN(),
  8252. },
  8253. .fixup_map1 = { 3 },
  8254. .errstr = "pointer offset -1073741822",
  8255. .result = REJECT
  8256. },
  8257. {
  8258. "bounds check map access with off+size signed 32bit overflow. test4",
  8259. .insns = {
  8260. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8261. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8262. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8263. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8264. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8265. BPF_FUNC_map_lookup_elem),
  8266. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  8267. BPF_EXIT_INSN(),
  8268. BPF_MOV64_IMM(BPF_REG_1, 1000000),
  8269. BPF_ALU64_IMM(BPF_MUL, BPF_REG_1, 1000000),
  8270. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  8271. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 2),
  8272. BPF_JMP_A(0),
  8273. BPF_EXIT_INSN(),
  8274. },
  8275. .fixup_map1 = { 3 },
  8276. .errstr = "map_value pointer and 1000000000000",
  8277. .result = REJECT
  8278. },
  8279. {
  8280. "pointer/scalar confusion in state equality check (way 1)",
  8281. .insns = {
  8282. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8283. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8284. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8285. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8286. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8287. BPF_FUNC_map_lookup_elem),
  8288. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  8289. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0),
  8290. BPF_JMP_A(1),
  8291. BPF_MOV64_REG(BPF_REG_0, BPF_REG_10),
  8292. BPF_JMP_A(0),
  8293. BPF_EXIT_INSN(),
  8294. },
  8295. .fixup_map1 = { 3 },
  8296. .result = ACCEPT,
  8297. .retval = POINTER_VALUE,
  8298. .result_unpriv = REJECT,
  8299. .errstr_unpriv = "R0 leaks addr as return value"
  8300. },
  8301. {
  8302. "pointer/scalar confusion in state equality check (way 2)",
  8303. .insns = {
  8304. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8305. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8306. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8307. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8308. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8309. BPF_FUNC_map_lookup_elem),
  8310. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  8311. BPF_MOV64_REG(BPF_REG_0, BPF_REG_10),
  8312. BPF_JMP_A(1),
  8313. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0),
  8314. BPF_EXIT_INSN(),
  8315. },
  8316. .fixup_map1 = { 3 },
  8317. .result = ACCEPT,
  8318. .retval = POINTER_VALUE,
  8319. .result_unpriv = REJECT,
  8320. .errstr_unpriv = "R0 leaks addr as return value"
  8321. },
  8322. {
  8323. "variable-offset ctx access",
  8324. .insns = {
  8325. /* Get an unknown value */
  8326. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 0),
  8327. /* Make it small and 4-byte aligned */
  8328. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 4),
  8329. /* add it to skb. We now have either &skb->len or
  8330. * &skb->pkt_type, but we don't know which
  8331. */
  8332. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2),
  8333. /* dereference it */
  8334. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
  8335. BPF_EXIT_INSN(),
  8336. },
  8337. .errstr = "variable ctx access var_off=(0x0; 0x4)",
  8338. .result = REJECT,
  8339. .prog_type = BPF_PROG_TYPE_LWT_IN,
  8340. },
  8341. {
  8342. "variable-offset stack access",
  8343. .insns = {
  8344. /* Fill the top 8 bytes of the stack */
  8345. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8346. /* Get an unknown value */
  8347. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 0),
  8348. /* Make it small and 4-byte aligned */
  8349. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 4),
  8350. BPF_ALU64_IMM(BPF_SUB, BPF_REG_2, 8),
  8351. /* add it to fp. We now have either fp-4 or fp-8, but
  8352. * we don't know which
  8353. */
  8354. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_10),
  8355. /* dereference it */
  8356. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_2, 0),
  8357. BPF_EXIT_INSN(),
  8358. },
  8359. .errstr = "variable stack access var_off=(0xfffffffffffffff8; 0x4)",
  8360. .result = REJECT,
  8361. .prog_type = BPF_PROG_TYPE_LWT_IN,
  8362. },
  8363. {
  8364. "indirect variable-offset stack access",
  8365. .insns = {
  8366. /* Fill the top 8 bytes of the stack */
  8367. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8368. /* Get an unknown value */
  8369. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 0),
  8370. /* Make it small and 4-byte aligned */
  8371. BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 4),
  8372. BPF_ALU64_IMM(BPF_SUB, BPF_REG_2, 8),
  8373. /* add it to fp. We now have either fp-4 or fp-8, but
  8374. * we don't know which
  8375. */
  8376. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_10),
  8377. /* dereference it indirectly */
  8378. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8379. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8380. BPF_FUNC_map_lookup_elem),
  8381. BPF_MOV64_IMM(BPF_REG_0, 0),
  8382. BPF_EXIT_INSN(),
  8383. },
  8384. .fixup_map1 = { 5 },
  8385. .errstr = "variable stack read R2",
  8386. .result = REJECT,
  8387. .prog_type = BPF_PROG_TYPE_LWT_IN,
  8388. },
  8389. {
  8390. "direct stack access with 32-bit wraparound. test1",
  8391. .insns = {
  8392. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  8393. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0x7fffffff),
  8394. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0x7fffffff),
  8395. BPF_MOV32_IMM(BPF_REG_0, 0),
  8396. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  8397. BPF_EXIT_INSN()
  8398. },
  8399. .errstr = "fp pointer and 2147483647",
  8400. .result = REJECT
  8401. },
  8402. {
  8403. "direct stack access with 32-bit wraparound. test2",
  8404. .insns = {
  8405. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  8406. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0x3fffffff),
  8407. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0x3fffffff),
  8408. BPF_MOV32_IMM(BPF_REG_0, 0),
  8409. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  8410. BPF_EXIT_INSN()
  8411. },
  8412. .errstr = "fp pointer and 1073741823",
  8413. .result = REJECT
  8414. },
  8415. {
  8416. "direct stack access with 32-bit wraparound. test3",
  8417. .insns = {
  8418. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  8419. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0x1fffffff),
  8420. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0x1fffffff),
  8421. BPF_MOV32_IMM(BPF_REG_0, 0),
  8422. BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0, 0),
  8423. BPF_EXIT_INSN()
  8424. },
  8425. .errstr = "fp pointer offset 1073741822",
  8426. .result = REJECT
  8427. },
  8428. {
  8429. "liveness pruning and write screening",
  8430. .insns = {
  8431. /* Get an unknown value */
  8432. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 0),
  8433. /* branch conditions teach us nothing about R2 */
  8434. BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1),
  8435. BPF_MOV64_IMM(BPF_REG_0, 0),
  8436. BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1),
  8437. BPF_MOV64_IMM(BPF_REG_0, 0),
  8438. BPF_EXIT_INSN(),
  8439. },
  8440. .errstr = "R0 !read_ok",
  8441. .result = REJECT,
  8442. .prog_type = BPF_PROG_TYPE_LWT_IN,
  8443. },
  8444. {
  8445. "varlen_map_value_access pruning",
  8446. .insns = {
  8447. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  8448. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  8449. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  8450. BPF_LD_MAP_FD(BPF_REG_1, 0),
  8451. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8452. BPF_FUNC_map_lookup_elem),
  8453. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
  8454. BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
  8455. BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES),
  8456. BPF_JMP_REG(BPF_JSGT, BPF_REG_2, BPF_REG_1, 1),
  8457. BPF_MOV32_IMM(BPF_REG_1, 0),
  8458. BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2),
  8459. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
  8460. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  8461. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  8462. offsetof(struct test_val, foo)),
  8463. BPF_EXIT_INSN(),
  8464. },
  8465. .fixup_map2 = { 3 },
  8466. .errstr_unpriv = "R0 leaks addr",
  8467. .errstr = "R0 unbounded memory access",
  8468. .result_unpriv = REJECT,
  8469. .result = REJECT,
  8470. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  8471. },
  8472. {
  8473. "invalid 64-bit BPF_END",
  8474. .insns = {
  8475. BPF_MOV32_IMM(BPF_REG_0, 0),
  8476. {
  8477. .code = BPF_ALU64 | BPF_END | BPF_TO_LE,
  8478. .dst_reg = BPF_REG_0,
  8479. .src_reg = 0,
  8480. .off = 0,
  8481. .imm = 32,
  8482. },
  8483. BPF_EXIT_INSN(),
  8484. },
  8485. .errstr = "unknown opcode d7",
  8486. .result = REJECT,
  8487. },
  8488. {
  8489. "XDP, using ifindex from netdev",
  8490. .insns = {
  8491. BPF_MOV64_IMM(BPF_REG_0, 0),
  8492. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8493. offsetof(struct xdp_md, ingress_ifindex)),
  8494. BPF_JMP_IMM(BPF_JLT, BPF_REG_2, 1, 1),
  8495. BPF_MOV64_IMM(BPF_REG_0, 1),
  8496. BPF_EXIT_INSN(),
  8497. },
  8498. .result = ACCEPT,
  8499. .prog_type = BPF_PROG_TYPE_XDP,
  8500. .retval = 1,
  8501. },
  8502. {
  8503. "meta access, test1",
  8504. .insns = {
  8505. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8506. offsetof(struct xdp_md, data_meta)),
  8507. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8508. offsetof(struct xdp_md, data)),
  8509. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  8510. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  8511. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  8512. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  8513. BPF_MOV64_IMM(BPF_REG_0, 0),
  8514. BPF_EXIT_INSN(),
  8515. },
  8516. .result = ACCEPT,
  8517. .prog_type = BPF_PROG_TYPE_XDP,
  8518. },
  8519. {
  8520. "meta access, test2",
  8521. .insns = {
  8522. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8523. offsetof(struct xdp_md, data_meta)),
  8524. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8525. offsetof(struct xdp_md, data)),
  8526. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  8527. BPF_ALU64_IMM(BPF_SUB, BPF_REG_0, 8),
  8528. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  8529. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 8),
  8530. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 1),
  8531. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  8532. BPF_MOV64_IMM(BPF_REG_0, 0),
  8533. BPF_EXIT_INSN(),
  8534. },
  8535. .result = REJECT,
  8536. .errstr = "invalid access to packet, off=-8",
  8537. .prog_type = BPF_PROG_TYPE_XDP,
  8538. },
  8539. {
  8540. "meta access, test3",
  8541. .insns = {
  8542. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8543. offsetof(struct xdp_md, data_meta)),
  8544. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8545. offsetof(struct xdp_md, data_end)),
  8546. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  8547. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  8548. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  8549. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  8550. BPF_MOV64_IMM(BPF_REG_0, 0),
  8551. BPF_EXIT_INSN(),
  8552. },
  8553. .result = REJECT,
  8554. .errstr = "invalid access to packet",
  8555. .prog_type = BPF_PROG_TYPE_XDP,
  8556. },
  8557. {
  8558. "meta access, test4",
  8559. .insns = {
  8560. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8561. offsetof(struct xdp_md, data_meta)),
  8562. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8563. offsetof(struct xdp_md, data_end)),
  8564. BPF_LDX_MEM(BPF_W, BPF_REG_4, BPF_REG_1,
  8565. offsetof(struct xdp_md, data)),
  8566. BPF_MOV64_REG(BPF_REG_0, BPF_REG_4),
  8567. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  8568. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
  8569. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  8570. BPF_MOV64_IMM(BPF_REG_0, 0),
  8571. BPF_EXIT_INSN(),
  8572. },
  8573. .result = REJECT,
  8574. .errstr = "invalid access to packet",
  8575. .prog_type = BPF_PROG_TYPE_XDP,
  8576. },
  8577. {
  8578. "meta access, test5",
  8579. .insns = {
  8580. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8581. offsetof(struct xdp_md, data_meta)),
  8582. BPF_LDX_MEM(BPF_W, BPF_REG_4, BPF_REG_1,
  8583. offsetof(struct xdp_md, data)),
  8584. BPF_MOV64_REG(BPF_REG_0, BPF_REG_3),
  8585. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  8586. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_4, 3),
  8587. BPF_MOV64_IMM(BPF_REG_2, -8),
  8588. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  8589. BPF_FUNC_xdp_adjust_meta),
  8590. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_3, 0),
  8591. BPF_MOV64_IMM(BPF_REG_0, 0),
  8592. BPF_EXIT_INSN(),
  8593. },
  8594. .result = REJECT,
  8595. .errstr = "R3 !read_ok",
  8596. .prog_type = BPF_PROG_TYPE_XDP,
  8597. },
  8598. {
  8599. "meta access, test6",
  8600. .insns = {
  8601. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8602. offsetof(struct xdp_md, data_meta)),
  8603. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8604. offsetof(struct xdp_md, data)),
  8605. BPF_MOV64_REG(BPF_REG_0, BPF_REG_3),
  8606. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  8607. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  8608. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 8),
  8609. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_0, 1),
  8610. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  8611. BPF_MOV64_IMM(BPF_REG_0, 0),
  8612. BPF_EXIT_INSN(),
  8613. },
  8614. .result = REJECT,
  8615. .errstr = "invalid access to packet",
  8616. .prog_type = BPF_PROG_TYPE_XDP,
  8617. },
  8618. {
  8619. "meta access, test7",
  8620. .insns = {
  8621. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8622. offsetof(struct xdp_md, data_meta)),
  8623. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8624. offsetof(struct xdp_md, data)),
  8625. BPF_MOV64_REG(BPF_REG_0, BPF_REG_3),
  8626. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  8627. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  8628. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 8),
  8629. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 1),
  8630. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  8631. BPF_MOV64_IMM(BPF_REG_0, 0),
  8632. BPF_EXIT_INSN(),
  8633. },
  8634. .result = ACCEPT,
  8635. .prog_type = BPF_PROG_TYPE_XDP,
  8636. },
  8637. {
  8638. "meta access, test8",
  8639. .insns = {
  8640. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8641. offsetof(struct xdp_md, data_meta)),
  8642. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8643. offsetof(struct xdp_md, data)),
  8644. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  8645. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 0xFFFF),
  8646. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 1),
  8647. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  8648. BPF_MOV64_IMM(BPF_REG_0, 0),
  8649. BPF_EXIT_INSN(),
  8650. },
  8651. .result = ACCEPT,
  8652. .prog_type = BPF_PROG_TYPE_XDP,
  8653. },
  8654. {
  8655. "meta access, test9",
  8656. .insns = {
  8657. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8658. offsetof(struct xdp_md, data_meta)),
  8659. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8660. offsetof(struct xdp_md, data)),
  8661. BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
  8662. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 0xFFFF),
  8663. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 1),
  8664. BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 1),
  8665. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  8666. BPF_MOV64_IMM(BPF_REG_0, 0),
  8667. BPF_EXIT_INSN(),
  8668. },
  8669. .result = REJECT,
  8670. .errstr = "invalid access to packet",
  8671. .prog_type = BPF_PROG_TYPE_XDP,
  8672. },
  8673. {
  8674. "meta access, test10",
  8675. .insns = {
  8676. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8677. offsetof(struct xdp_md, data_meta)),
  8678. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8679. offsetof(struct xdp_md, data)),
  8680. BPF_LDX_MEM(BPF_W, BPF_REG_4, BPF_REG_1,
  8681. offsetof(struct xdp_md, data_end)),
  8682. BPF_MOV64_IMM(BPF_REG_5, 42),
  8683. BPF_MOV64_IMM(BPF_REG_6, 24),
  8684. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_5, -8),
  8685. BPF_STX_XADD(BPF_DW, BPF_REG_10, BPF_REG_6, -8),
  8686. BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -8),
  8687. BPF_JMP_IMM(BPF_JGT, BPF_REG_5, 100, 6),
  8688. BPF_ALU64_REG(BPF_ADD, BPF_REG_3, BPF_REG_5),
  8689. BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
  8690. BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
  8691. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 8),
  8692. BPF_JMP_REG(BPF_JGT, BPF_REG_6, BPF_REG_5, 1),
  8693. BPF_LDX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
  8694. BPF_MOV64_IMM(BPF_REG_0, 0),
  8695. BPF_EXIT_INSN(),
  8696. },
  8697. .result = REJECT,
  8698. .errstr = "invalid access to packet",
  8699. .prog_type = BPF_PROG_TYPE_XDP,
  8700. },
  8701. {
  8702. "meta access, test11",
  8703. .insns = {
  8704. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8705. offsetof(struct xdp_md, data_meta)),
  8706. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8707. offsetof(struct xdp_md, data)),
  8708. BPF_MOV64_IMM(BPF_REG_5, 42),
  8709. BPF_MOV64_IMM(BPF_REG_6, 24),
  8710. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_5, -8),
  8711. BPF_STX_XADD(BPF_DW, BPF_REG_10, BPF_REG_6, -8),
  8712. BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -8),
  8713. BPF_JMP_IMM(BPF_JGT, BPF_REG_5, 100, 6),
  8714. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_5),
  8715. BPF_MOV64_REG(BPF_REG_5, BPF_REG_2),
  8716. BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
  8717. BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 8),
  8718. BPF_JMP_REG(BPF_JGT, BPF_REG_6, BPF_REG_3, 1),
  8719. BPF_LDX_MEM(BPF_B, BPF_REG_5, BPF_REG_5, 0),
  8720. BPF_MOV64_IMM(BPF_REG_0, 0),
  8721. BPF_EXIT_INSN(),
  8722. },
  8723. .result = ACCEPT,
  8724. .prog_type = BPF_PROG_TYPE_XDP,
  8725. },
  8726. {
  8727. "meta access, test12",
  8728. .insns = {
  8729. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8730. offsetof(struct xdp_md, data_meta)),
  8731. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8732. offsetof(struct xdp_md, data)),
  8733. BPF_LDX_MEM(BPF_W, BPF_REG_4, BPF_REG_1,
  8734. offsetof(struct xdp_md, data_end)),
  8735. BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
  8736. BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 16),
  8737. BPF_JMP_REG(BPF_JGT, BPF_REG_5, BPF_REG_4, 5),
  8738. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_3, 0),
  8739. BPF_MOV64_REG(BPF_REG_5, BPF_REG_2),
  8740. BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 16),
  8741. BPF_JMP_REG(BPF_JGT, BPF_REG_5, BPF_REG_3, 1),
  8742. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
  8743. BPF_MOV64_IMM(BPF_REG_0, 0),
  8744. BPF_EXIT_INSN(),
  8745. },
  8746. .result = ACCEPT,
  8747. .prog_type = BPF_PROG_TYPE_XDP,
  8748. },
  8749. {
  8750. "arithmetic ops make PTR_TO_CTX unusable",
  8751. .insns = {
  8752. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
  8753. offsetof(struct __sk_buff, data) -
  8754. offsetof(struct __sk_buff, mark)),
  8755. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  8756. offsetof(struct __sk_buff, mark)),
  8757. BPF_EXIT_INSN(),
  8758. },
  8759. .errstr = "dereference of modified ctx ptr",
  8760. .result = REJECT,
  8761. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  8762. },
  8763. {
  8764. "pkt_end - pkt_start is allowed",
  8765. .insns = {
  8766. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  8767. offsetof(struct __sk_buff, data_end)),
  8768. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8769. offsetof(struct __sk_buff, data)),
  8770. BPF_ALU64_REG(BPF_SUB, BPF_REG_0, BPF_REG_2),
  8771. BPF_EXIT_INSN(),
  8772. },
  8773. .result = ACCEPT,
  8774. .retval = TEST_DATA_LEN,
  8775. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  8776. },
  8777. {
  8778. "XDP pkt read, pkt_end mangling, bad access 1",
  8779. .insns = {
  8780. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8781. offsetof(struct xdp_md, data)),
  8782. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8783. offsetof(struct xdp_md, data_end)),
  8784. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8785. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8786. BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, 8),
  8787. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  8788. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8789. BPF_MOV64_IMM(BPF_REG_0, 0),
  8790. BPF_EXIT_INSN(),
  8791. },
  8792. .errstr = "R3 pointer arithmetic on PTR_TO_PACKET_END",
  8793. .result = REJECT,
  8794. .prog_type = BPF_PROG_TYPE_XDP,
  8795. },
  8796. {
  8797. "XDP pkt read, pkt_end mangling, bad access 2",
  8798. .insns = {
  8799. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8800. offsetof(struct xdp_md, data)),
  8801. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8802. offsetof(struct xdp_md, data_end)),
  8803. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8804. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8805. BPF_ALU64_IMM(BPF_SUB, BPF_REG_3, 8),
  8806. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  8807. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8808. BPF_MOV64_IMM(BPF_REG_0, 0),
  8809. BPF_EXIT_INSN(),
  8810. },
  8811. .errstr = "R3 pointer arithmetic on PTR_TO_PACKET_END",
  8812. .result = REJECT,
  8813. .prog_type = BPF_PROG_TYPE_XDP,
  8814. },
  8815. {
  8816. "XDP pkt read, pkt_data' > pkt_end, good access",
  8817. .insns = {
  8818. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8819. offsetof(struct xdp_md, data)),
  8820. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8821. offsetof(struct xdp_md, data_end)),
  8822. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8823. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8824. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  8825. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8826. BPF_MOV64_IMM(BPF_REG_0, 0),
  8827. BPF_EXIT_INSN(),
  8828. },
  8829. .result = ACCEPT,
  8830. .prog_type = BPF_PROG_TYPE_XDP,
  8831. },
  8832. {
  8833. "XDP pkt read, pkt_data' > pkt_end, bad access 1",
  8834. .insns = {
  8835. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8836. offsetof(struct xdp_md, data)),
  8837. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8838. offsetof(struct xdp_md, data_end)),
  8839. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8840. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8841. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  8842. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
  8843. BPF_MOV64_IMM(BPF_REG_0, 0),
  8844. BPF_EXIT_INSN(),
  8845. },
  8846. .errstr = "R1 offset is outside of the packet",
  8847. .result = REJECT,
  8848. .prog_type = BPF_PROG_TYPE_XDP,
  8849. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  8850. },
  8851. {
  8852. "XDP pkt read, pkt_data' > pkt_end, bad access 2",
  8853. .insns = {
  8854. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8855. offsetof(struct xdp_md, data)),
  8856. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8857. offsetof(struct xdp_md, data_end)),
  8858. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8859. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8860. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 0),
  8861. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8862. BPF_MOV64_IMM(BPF_REG_0, 0),
  8863. BPF_EXIT_INSN(),
  8864. },
  8865. .errstr = "R1 offset is outside of the packet",
  8866. .result = REJECT,
  8867. .prog_type = BPF_PROG_TYPE_XDP,
  8868. },
  8869. {
  8870. "XDP pkt read, pkt_end > pkt_data', good access",
  8871. .insns = {
  8872. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8873. offsetof(struct xdp_md, data)),
  8874. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8875. offsetof(struct xdp_md, data_end)),
  8876. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8877. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8878. BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
  8879. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  8880. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  8881. BPF_MOV64_IMM(BPF_REG_0, 0),
  8882. BPF_EXIT_INSN(),
  8883. },
  8884. .result = ACCEPT,
  8885. .prog_type = BPF_PROG_TYPE_XDP,
  8886. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  8887. },
  8888. {
  8889. "XDP pkt read, pkt_end > pkt_data', bad access 1",
  8890. .insns = {
  8891. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8892. offsetof(struct xdp_md, data)),
  8893. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8894. offsetof(struct xdp_md, data_end)),
  8895. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8896. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8897. BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
  8898. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  8899. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8900. BPF_MOV64_IMM(BPF_REG_0, 0),
  8901. BPF_EXIT_INSN(),
  8902. },
  8903. .errstr = "R1 offset is outside of the packet",
  8904. .result = REJECT,
  8905. .prog_type = BPF_PROG_TYPE_XDP,
  8906. },
  8907. {
  8908. "XDP pkt read, pkt_end > pkt_data', bad access 2",
  8909. .insns = {
  8910. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8911. offsetof(struct xdp_md, data)),
  8912. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8913. offsetof(struct xdp_md, data_end)),
  8914. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8915. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8916. BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
  8917. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8918. BPF_MOV64_IMM(BPF_REG_0, 0),
  8919. BPF_EXIT_INSN(),
  8920. },
  8921. .errstr = "R1 offset is outside of the packet",
  8922. .result = REJECT,
  8923. .prog_type = BPF_PROG_TYPE_XDP,
  8924. },
  8925. {
  8926. "XDP pkt read, pkt_data' < pkt_end, good access",
  8927. .insns = {
  8928. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8929. offsetof(struct xdp_md, data)),
  8930. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8931. offsetof(struct xdp_md, data_end)),
  8932. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8933. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8934. BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
  8935. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  8936. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  8937. BPF_MOV64_IMM(BPF_REG_0, 0),
  8938. BPF_EXIT_INSN(),
  8939. },
  8940. .result = ACCEPT,
  8941. .prog_type = BPF_PROG_TYPE_XDP,
  8942. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  8943. },
  8944. {
  8945. "XDP pkt read, pkt_data' < pkt_end, bad access 1",
  8946. .insns = {
  8947. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8948. offsetof(struct xdp_md, data)),
  8949. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8950. offsetof(struct xdp_md, data_end)),
  8951. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8952. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8953. BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
  8954. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  8955. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8956. BPF_MOV64_IMM(BPF_REG_0, 0),
  8957. BPF_EXIT_INSN(),
  8958. },
  8959. .errstr = "R1 offset is outside of the packet",
  8960. .result = REJECT,
  8961. .prog_type = BPF_PROG_TYPE_XDP,
  8962. },
  8963. {
  8964. "XDP pkt read, pkt_data' < pkt_end, bad access 2",
  8965. .insns = {
  8966. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8967. offsetof(struct xdp_md, data)),
  8968. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8969. offsetof(struct xdp_md, data_end)),
  8970. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8971. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8972. BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
  8973. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8974. BPF_MOV64_IMM(BPF_REG_0, 0),
  8975. BPF_EXIT_INSN(),
  8976. },
  8977. .errstr = "R1 offset is outside of the packet",
  8978. .result = REJECT,
  8979. .prog_type = BPF_PROG_TYPE_XDP,
  8980. },
  8981. {
  8982. "XDP pkt read, pkt_end < pkt_data', good access",
  8983. .insns = {
  8984. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  8985. offsetof(struct xdp_md, data)),
  8986. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  8987. offsetof(struct xdp_md, data_end)),
  8988. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  8989. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  8990. BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 1),
  8991. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  8992. BPF_MOV64_IMM(BPF_REG_0, 0),
  8993. BPF_EXIT_INSN(),
  8994. },
  8995. .result = ACCEPT,
  8996. .prog_type = BPF_PROG_TYPE_XDP,
  8997. },
  8998. {
  8999. "XDP pkt read, pkt_end < pkt_data', bad access 1",
  9000. .insns = {
  9001. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9002. offsetof(struct xdp_md, data)),
  9003. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9004. offsetof(struct xdp_md, data_end)),
  9005. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9006. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9007. BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 1),
  9008. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
  9009. BPF_MOV64_IMM(BPF_REG_0, 0),
  9010. BPF_EXIT_INSN(),
  9011. },
  9012. .errstr = "R1 offset is outside of the packet",
  9013. .result = REJECT,
  9014. .prog_type = BPF_PROG_TYPE_XDP,
  9015. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9016. },
  9017. {
  9018. "XDP pkt read, pkt_end < pkt_data', bad access 2",
  9019. .insns = {
  9020. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9021. offsetof(struct xdp_md, data)),
  9022. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9023. offsetof(struct xdp_md, data_end)),
  9024. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9025. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9026. BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 0),
  9027. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9028. BPF_MOV64_IMM(BPF_REG_0, 0),
  9029. BPF_EXIT_INSN(),
  9030. },
  9031. .errstr = "R1 offset is outside of the packet",
  9032. .result = REJECT,
  9033. .prog_type = BPF_PROG_TYPE_XDP,
  9034. },
  9035. {
  9036. "XDP pkt read, pkt_data' >= pkt_end, good access",
  9037. .insns = {
  9038. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9039. offsetof(struct xdp_md, data)),
  9040. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9041. offsetof(struct xdp_md, data_end)),
  9042. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9043. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9044. BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 1),
  9045. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9046. BPF_MOV64_IMM(BPF_REG_0, 0),
  9047. BPF_EXIT_INSN(),
  9048. },
  9049. .result = ACCEPT,
  9050. .prog_type = BPF_PROG_TYPE_XDP,
  9051. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9052. },
  9053. {
  9054. "XDP pkt read, pkt_data' >= pkt_end, bad access 1",
  9055. .insns = {
  9056. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9057. offsetof(struct xdp_md, data)),
  9058. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9059. offsetof(struct xdp_md, data_end)),
  9060. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9061. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9062. BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 1),
  9063. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9064. BPF_MOV64_IMM(BPF_REG_0, 0),
  9065. BPF_EXIT_INSN(),
  9066. },
  9067. .errstr = "R1 offset is outside of the packet",
  9068. .result = REJECT,
  9069. .prog_type = BPF_PROG_TYPE_XDP,
  9070. },
  9071. {
  9072. "XDP pkt read, pkt_data' >= pkt_end, bad access 2",
  9073. .insns = {
  9074. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9075. offsetof(struct xdp_md, data)),
  9076. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9077. offsetof(struct xdp_md, data_end)),
  9078. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9079. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9080. BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 0),
  9081. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9082. BPF_MOV64_IMM(BPF_REG_0, 0),
  9083. BPF_EXIT_INSN(),
  9084. },
  9085. .errstr = "R1 offset is outside of the packet",
  9086. .result = REJECT,
  9087. .prog_type = BPF_PROG_TYPE_XDP,
  9088. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9089. },
  9090. {
  9091. "XDP pkt read, pkt_end >= pkt_data', good access",
  9092. .insns = {
  9093. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9094. offsetof(struct xdp_md, data)),
  9095. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9096. offsetof(struct xdp_md, data_end)),
  9097. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9098. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9099. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
  9100. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9101. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9102. BPF_MOV64_IMM(BPF_REG_0, 0),
  9103. BPF_EXIT_INSN(),
  9104. },
  9105. .result = ACCEPT,
  9106. .prog_type = BPF_PROG_TYPE_XDP,
  9107. },
  9108. {
  9109. "XDP pkt read, pkt_end >= pkt_data', bad access 1",
  9110. .insns = {
  9111. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9112. offsetof(struct xdp_md, data)),
  9113. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9114. offsetof(struct xdp_md, data_end)),
  9115. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9116. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9117. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
  9118. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9119. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
  9120. BPF_MOV64_IMM(BPF_REG_0, 0),
  9121. BPF_EXIT_INSN(),
  9122. },
  9123. .errstr = "R1 offset is outside of the packet",
  9124. .result = REJECT,
  9125. .prog_type = BPF_PROG_TYPE_XDP,
  9126. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9127. },
  9128. {
  9129. "XDP pkt read, pkt_end >= pkt_data', bad access 2",
  9130. .insns = {
  9131. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9132. offsetof(struct xdp_md, data)),
  9133. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9134. offsetof(struct xdp_md, data_end)),
  9135. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9136. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9137. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
  9138. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9139. BPF_MOV64_IMM(BPF_REG_0, 0),
  9140. BPF_EXIT_INSN(),
  9141. },
  9142. .errstr = "R1 offset is outside of the packet",
  9143. .result = REJECT,
  9144. .prog_type = BPF_PROG_TYPE_XDP,
  9145. },
  9146. {
  9147. "XDP pkt read, pkt_data' <= pkt_end, good access",
  9148. .insns = {
  9149. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9150. offsetof(struct xdp_md, data)),
  9151. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9152. offsetof(struct xdp_md, data_end)),
  9153. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9154. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9155. BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
  9156. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9157. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9158. BPF_MOV64_IMM(BPF_REG_0, 0),
  9159. BPF_EXIT_INSN(),
  9160. },
  9161. .result = ACCEPT,
  9162. .prog_type = BPF_PROG_TYPE_XDP,
  9163. },
  9164. {
  9165. "XDP pkt read, pkt_data' <= pkt_end, bad access 1",
  9166. .insns = {
  9167. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9168. offsetof(struct xdp_md, data)),
  9169. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9170. offsetof(struct xdp_md, data_end)),
  9171. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9172. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9173. BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
  9174. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9175. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
  9176. BPF_MOV64_IMM(BPF_REG_0, 0),
  9177. BPF_EXIT_INSN(),
  9178. },
  9179. .errstr = "R1 offset is outside of the packet",
  9180. .result = REJECT,
  9181. .prog_type = BPF_PROG_TYPE_XDP,
  9182. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9183. },
  9184. {
  9185. "XDP pkt read, pkt_data' <= pkt_end, bad access 2",
  9186. .insns = {
  9187. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9188. offsetof(struct xdp_md, data)),
  9189. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9190. offsetof(struct xdp_md, data_end)),
  9191. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9192. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9193. BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
  9194. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9195. BPF_MOV64_IMM(BPF_REG_0, 0),
  9196. BPF_EXIT_INSN(),
  9197. },
  9198. .errstr = "R1 offset is outside of the packet",
  9199. .result = REJECT,
  9200. .prog_type = BPF_PROG_TYPE_XDP,
  9201. },
  9202. {
  9203. "XDP pkt read, pkt_end <= pkt_data', good access",
  9204. .insns = {
  9205. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9206. offsetof(struct xdp_md, data)),
  9207. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9208. offsetof(struct xdp_md, data_end)),
  9209. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9210. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9211. BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 1),
  9212. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9213. BPF_MOV64_IMM(BPF_REG_0, 0),
  9214. BPF_EXIT_INSN(),
  9215. },
  9216. .result = ACCEPT,
  9217. .prog_type = BPF_PROG_TYPE_XDP,
  9218. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9219. },
  9220. {
  9221. "XDP pkt read, pkt_end <= pkt_data', bad access 1",
  9222. .insns = {
  9223. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9224. offsetof(struct xdp_md, data)),
  9225. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9226. offsetof(struct xdp_md, data_end)),
  9227. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9228. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9229. BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 1),
  9230. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9231. BPF_MOV64_IMM(BPF_REG_0, 0),
  9232. BPF_EXIT_INSN(),
  9233. },
  9234. .errstr = "R1 offset is outside of the packet",
  9235. .result = REJECT,
  9236. .prog_type = BPF_PROG_TYPE_XDP,
  9237. },
  9238. {
  9239. "XDP pkt read, pkt_end <= pkt_data', bad access 2",
  9240. .insns = {
  9241. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9242. offsetof(struct xdp_md, data)),
  9243. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9244. offsetof(struct xdp_md, data_end)),
  9245. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9246. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9247. BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 0),
  9248. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9249. BPF_MOV64_IMM(BPF_REG_0, 0),
  9250. BPF_EXIT_INSN(),
  9251. },
  9252. .errstr = "R1 offset is outside of the packet",
  9253. .result = REJECT,
  9254. .prog_type = BPF_PROG_TYPE_XDP,
  9255. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9256. },
  9257. {
  9258. "XDP pkt read, pkt_meta' > pkt_data, good access",
  9259. .insns = {
  9260. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9261. offsetof(struct xdp_md, data_meta)),
  9262. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9263. offsetof(struct xdp_md, data)),
  9264. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9265. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9266. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  9267. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9268. BPF_MOV64_IMM(BPF_REG_0, 0),
  9269. BPF_EXIT_INSN(),
  9270. },
  9271. .result = ACCEPT,
  9272. .prog_type = BPF_PROG_TYPE_XDP,
  9273. },
  9274. {
  9275. "XDP pkt read, pkt_meta' > pkt_data, bad access 1",
  9276. .insns = {
  9277. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9278. offsetof(struct xdp_md, data_meta)),
  9279. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9280. offsetof(struct xdp_md, data)),
  9281. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9282. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9283. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
  9284. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
  9285. BPF_MOV64_IMM(BPF_REG_0, 0),
  9286. BPF_EXIT_INSN(),
  9287. },
  9288. .errstr = "R1 offset is outside of the packet",
  9289. .result = REJECT,
  9290. .prog_type = BPF_PROG_TYPE_XDP,
  9291. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9292. },
  9293. {
  9294. "XDP pkt read, pkt_meta' > pkt_data, bad access 2",
  9295. .insns = {
  9296. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9297. offsetof(struct xdp_md, data_meta)),
  9298. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9299. offsetof(struct xdp_md, data)),
  9300. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9301. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9302. BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 0),
  9303. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9304. BPF_MOV64_IMM(BPF_REG_0, 0),
  9305. BPF_EXIT_INSN(),
  9306. },
  9307. .errstr = "R1 offset is outside of the packet",
  9308. .result = REJECT,
  9309. .prog_type = BPF_PROG_TYPE_XDP,
  9310. },
  9311. {
  9312. "XDP pkt read, pkt_data > pkt_meta', good access",
  9313. .insns = {
  9314. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9315. offsetof(struct xdp_md, data_meta)),
  9316. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9317. offsetof(struct xdp_md, data)),
  9318. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9319. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9320. BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
  9321. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9322. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9323. BPF_MOV64_IMM(BPF_REG_0, 0),
  9324. BPF_EXIT_INSN(),
  9325. },
  9326. .result = ACCEPT,
  9327. .prog_type = BPF_PROG_TYPE_XDP,
  9328. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9329. },
  9330. {
  9331. "XDP pkt read, pkt_data > pkt_meta', bad access 1",
  9332. .insns = {
  9333. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9334. offsetof(struct xdp_md, data_meta)),
  9335. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9336. offsetof(struct xdp_md, data)),
  9337. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9338. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9339. BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
  9340. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9341. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9342. BPF_MOV64_IMM(BPF_REG_0, 0),
  9343. BPF_EXIT_INSN(),
  9344. },
  9345. .errstr = "R1 offset is outside of the packet",
  9346. .result = REJECT,
  9347. .prog_type = BPF_PROG_TYPE_XDP,
  9348. },
  9349. {
  9350. "XDP pkt read, pkt_data > pkt_meta', bad access 2",
  9351. .insns = {
  9352. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9353. offsetof(struct xdp_md, data_meta)),
  9354. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9355. offsetof(struct xdp_md, data)),
  9356. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9357. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9358. BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_1, 1),
  9359. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9360. BPF_MOV64_IMM(BPF_REG_0, 0),
  9361. BPF_EXIT_INSN(),
  9362. },
  9363. .errstr = "R1 offset is outside of the packet",
  9364. .result = REJECT,
  9365. .prog_type = BPF_PROG_TYPE_XDP,
  9366. },
  9367. {
  9368. "XDP pkt read, pkt_meta' < pkt_data, good access",
  9369. .insns = {
  9370. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9371. offsetof(struct xdp_md, data_meta)),
  9372. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9373. offsetof(struct xdp_md, data)),
  9374. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9375. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9376. BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
  9377. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9378. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9379. BPF_MOV64_IMM(BPF_REG_0, 0),
  9380. BPF_EXIT_INSN(),
  9381. },
  9382. .result = ACCEPT,
  9383. .prog_type = BPF_PROG_TYPE_XDP,
  9384. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9385. },
  9386. {
  9387. "XDP pkt read, pkt_meta' < pkt_data, bad access 1",
  9388. .insns = {
  9389. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9390. offsetof(struct xdp_md, data_meta)),
  9391. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9392. offsetof(struct xdp_md, data)),
  9393. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9394. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9395. BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
  9396. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9397. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9398. BPF_MOV64_IMM(BPF_REG_0, 0),
  9399. BPF_EXIT_INSN(),
  9400. },
  9401. .errstr = "R1 offset is outside of the packet",
  9402. .result = REJECT,
  9403. .prog_type = BPF_PROG_TYPE_XDP,
  9404. },
  9405. {
  9406. "XDP pkt read, pkt_meta' < pkt_data, bad access 2",
  9407. .insns = {
  9408. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9409. offsetof(struct xdp_md, data_meta)),
  9410. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9411. offsetof(struct xdp_md, data)),
  9412. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9413. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9414. BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 1),
  9415. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9416. BPF_MOV64_IMM(BPF_REG_0, 0),
  9417. BPF_EXIT_INSN(),
  9418. },
  9419. .errstr = "R1 offset is outside of the packet",
  9420. .result = REJECT,
  9421. .prog_type = BPF_PROG_TYPE_XDP,
  9422. },
  9423. {
  9424. "XDP pkt read, pkt_data < pkt_meta', good access",
  9425. .insns = {
  9426. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9427. offsetof(struct xdp_md, data_meta)),
  9428. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9429. offsetof(struct xdp_md, data)),
  9430. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9431. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9432. BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 1),
  9433. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9434. BPF_MOV64_IMM(BPF_REG_0, 0),
  9435. BPF_EXIT_INSN(),
  9436. },
  9437. .result = ACCEPT,
  9438. .prog_type = BPF_PROG_TYPE_XDP,
  9439. },
  9440. {
  9441. "XDP pkt read, pkt_data < pkt_meta', bad access 1",
  9442. .insns = {
  9443. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9444. offsetof(struct xdp_md, data_meta)),
  9445. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9446. offsetof(struct xdp_md, data)),
  9447. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9448. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9449. BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 1),
  9450. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
  9451. BPF_MOV64_IMM(BPF_REG_0, 0),
  9452. BPF_EXIT_INSN(),
  9453. },
  9454. .errstr = "R1 offset is outside of the packet",
  9455. .result = REJECT,
  9456. .prog_type = BPF_PROG_TYPE_XDP,
  9457. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9458. },
  9459. {
  9460. "XDP pkt read, pkt_data < pkt_meta', bad access 2",
  9461. .insns = {
  9462. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9463. offsetof(struct xdp_md, data_meta)),
  9464. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9465. offsetof(struct xdp_md, data)),
  9466. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9467. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9468. BPF_JMP_REG(BPF_JLT, BPF_REG_3, BPF_REG_1, 0),
  9469. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9470. BPF_MOV64_IMM(BPF_REG_0, 0),
  9471. BPF_EXIT_INSN(),
  9472. },
  9473. .errstr = "R1 offset is outside of the packet",
  9474. .result = REJECT,
  9475. .prog_type = BPF_PROG_TYPE_XDP,
  9476. },
  9477. {
  9478. "XDP pkt read, pkt_meta' >= pkt_data, good access",
  9479. .insns = {
  9480. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9481. offsetof(struct xdp_md, data_meta)),
  9482. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9483. offsetof(struct xdp_md, data)),
  9484. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9485. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9486. BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 1),
  9487. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9488. BPF_MOV64_IMM(BPF_REG_0, 0),
  9489. BPF_EXIT_INSN(),
  9490. },
  9491. .result = ACCEPT,
  9492. .prog_type = BPF_PROG_TYPE_XDP,
  9493. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9494. },
  9495. {
  9496. "XDP pkt read, pkt_meta' >= pkt_data, bad access 1",
  9497. .insns = {
  9498. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9499. offsetof(struct xdp_md, data_meta)),
  9500. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9501. offsetof(struct xdp_md, data)),
  9502. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9503. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9504. BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 1),
  9505. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9506. BPF_MOV64_IMM(BPF_REG_0, 0),
  9507. BPF_EXIT_INSN(),
  9508. },
  9509. .errstr = "R1 offset is outside of the packet",
  9510. .result = REJECT,
  9511. .prog_type = BPF_PROG_TYPE_XDP,
  9512. },
  9513. {
  9514. "XDP pkt read, pkt_meta' >= pkt_data, bad access 2",
  9515. .insns = {
  9516. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9517. offsetof(struct xdp_md, data_meta)),
  9518. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9519. offsetof(struct xdp_md, data)),
  9520. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9521. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9522. BPF_JMP_REG(BPF_JGE, BPF_REG_1, BPF_REG_3, 0),
  9523. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9524. BPF_MOV64_IMM(BPF_REG_0, 0),
  9525. BPF_EXIT_INSN(),
  9526. },
  9527. .errstr = "R1 offset is outside of the packet",
  9528. .result = REJECT,
  9529. .prog_type = BPF_PROG_TYPE_XDP,
  9530. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9531. },
  9532. {
  9533. "XDP pkt read, pkt_data >= pkt_meta', good access",
  9534. .insns = {
  9535. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9536. offsetof(struct xdp_md, data_meta)),
  9537. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9538. offsetof(struct xdp_md, data)),
  9539. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9540. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9541. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
  9542. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9543. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9544. BPF_MOV64_IMM(BPF_REG_0, 0),
  9545. BPF_EXIT_INSN(),
  9546. },
  9547. .result = ACCEPT,
  9548. .prog_type = BPF_PROG_TYPE_XDP,
  9549. },
  9550. {
  9551. "XDP pkt read, pkt_data >= pkt_meta', bad access 1",
  9552. .insns = {
  9553. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9554. offsetof(struct xdp_md, data_meta)),
  9555. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9556. offsetof(struct xdp_md, data)),
  9557. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9558. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9559. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
  9560. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9561. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
  9562. BPF_MOV64_IMM(BPF_REG_0, 0),
  9563. BPF_EXIT_INSN(),
  9564. },
  9565. .errstr = "R1 offset is outside of the packet",
  9566. .result = REJECT,
  9567. .prog_type = BPF_PROG_TYPE_XDP,
  9568. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9569. },
  9570. {
  9571. "XDP pkt read, pkt_data >= pkt_meta', bad access 2",
  9572. .insns = {
  9573. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9574. offsetof(struct xdp_md, data_meta)),
  9575. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9576. offsetof(struct xdp_md, data)),
  9577. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9578. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9579. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 1),
  9580. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9581. BPF_MOV64_IMM(BPF_REG_0, 0),
  9582. BPF_EXIT_INSN(),
  9583. },
  9584. .errstr = "R1 offset is outside of the packet",
  9585. .result = REJECT,
  9586. .prog_type = BPF_PROG_TYPE_XDP,
  9587. },
  9588. {
  9589. "XDP pkt read, pkt_meta' <= pkt_data, good access",
  9590. .insns = {
  9591. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9592. offsetof(struct xdp_md, data_meta)),
  9593. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9594. offsetof(struct xdp_md, data)),
  9595. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9596. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9597. BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
  9598. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9599. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9600. BPF_MOV64_IMM(BPF_REG_0, 0),
  9601. BPF_EXIT_INSN(),
  9602. },
  9603. .result = ACCEPT,
  9604. .prog_type = BPF_PROG_TYPE_XDP,
  9605. },
  9606. {
  9607. "XDP pkt read, pkt_meta' <= pkt_data, bad access 1",
  9608. .insns = {
  9609. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9610. offsetof(struct xdp_md, data_meta)),
  9611. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9612. offsetof(struct xdp_md, data)),
  9613. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9614. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9615. BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
  9616. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  9617. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -4),
  9618. BPF_MOV64_IMM(BPF_REG_0, 0),
  9619. BPF_EXIT_INSN(),
  9620. },
  9621. .errstr = "R1 offset is outside of the packet",
  9622. .result = REJECT,
  9623. .prog_type = BPF_PROG_TYPE_XDP,
  9624. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9625. },
  9626. {
  9627. "XDP pkt read, pkt_meta' <= pkt_data, bad access 2",
  9628. .insns = {
  9629. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9630. offsetof(struct xdp_md, data_meta)),
  9631. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9632. offsetof(struct xdp_md, data)),
  9633. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9634. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9635. BPF_JMP_REG(BPF_JLE, BPF_REG_1, BPF_REG_3, 1),
  9636. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9637. BPF_MOV64_IMM(BPF_REG_0, 0),
  9638. BPF_EXIT_INSN(),
  9639. },
  9640. .errstr = "R1 offset is outside of the packet",
  9641. .result = REJECT,
  9642. .prog_type = BPF_PROG_TYPE_XDP,
  9643. },
  9644. {
  9645. "XDP pkt read, pkt_data <= pkt_meta', good access",
  9646. .insns = {
  9647. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9648. offsetof(struct xdp_md, data_meta)),
  9649. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9650. offsetof(struct xdp_md, data)),
  9651. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9652. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9653. BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 1),
  9654. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9655. BPF_MOV64_IMM(BPF_REG_0, 0),
  9656. BPF_EXIT_INSN(),
  9657. },
  9658. .result = ACCEPT,
  9659. .prog_type = BPF_PROG_TYPE_XDP,
  9660. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9661. },
  9662. {
  9663. "XDP pkt read, pkt_data <= pkt_meta', bad access 1",
  9664. .insns = {
  9665. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9666. offsetof(struct xdp_md, data_meta)),
  9667. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9668. offsetof(struct xdp_md, data)),
  9669. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9670. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9671. BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 1),
  9672. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, -8),
  9673. BPF_MOV64_IMM(BPF_REG_0, 0),
  9674. BPF_EXIT_INSN(),
  9675. },
  9676. .errstr = "R1 offset is outside of the packet",
  9677. .result = REJECT,
  9678. .prog_type = BPF_PROG_TYPE_XDP,
  9679. },
  9680. {
  9681. "XDP pkt read, pkt_data <= pkt_meta', bad access 2",
  9682. .insns = {
  9683. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  9684. offsetof(struct xdp_md, data_meta)),
  9685. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  9686. offsetof(struct xdp_md, data)),
  9687. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  9688. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  9689. BPF_JMP_REG(BPF_JLE, BPF_REG_3, BPF_REG_1, 0),
  9690. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -5),
  9691. BPF_MOV64_IMM(BPF_REG_0, 0),
  9692. BPF_EXIT_INSN(),
  9693. },
  9694. .errstr = "R1 offset is outside of the packet",
  9695. .result = REJECT,
  9696. .prog_type = BPF_PROG_TYPE_XDP,
  9697. .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
  9698. },
  9699. {
  9700. "check deducing bounds from const, 1",
  9701. .insns = {
  9702. BPF_MOV64_IMM(BPF_REG_0, 1),
  9703. BPF_JMP_IMM(BPF_JSGE, BPF_REG_0, 1, 0),
  9704. BPF_ALU64_REG(BPF_SUB, BPF_REG_0, BPF_REG_1),
  9705. BPF_EXIT_INSN(),
  9706. },
  9707. .result = REJECT,
  9708. .errstr = "R0 tried to subtract pointer from scalar",
  9709. },
  9710. {
  9711. "check deducing bounds from const, 2",
  9712. .insns = {
  9713. BPF_MOV64_IMM(BPF_REG_0, 1),
  9714. BPF_JMP_IMM(BPF_JSGE, BPF_REG_0, 1, 1),
  9715. BPF_EXIT_INSN(),
  9716. BPF_JMP_IMM(BPF_JSLE, BPF_REG_0, 1, 1),
  9717. BPF_EXIT_INSN(),
  9718. BPF_ALU64_REG(BPF_SUB, BPF_REG_1, BPF_REG_0),
  9719. BPF_EXIT_INSN(),
  9720. },
  9721. .result = ACCEPT,
  9722. .retval = 1,
  9723. },
  9724. {
  9725. "check deducing bounds from const, 3",
  9726. .insns = {
  9727. BPF_MOV64_IMM(BPF_REG_0, 0),
  9728. BPF_JMP_IMM(BPF_JSLE, BPF_REG_0, 0, 0),
  9729. BPF_ALU64_REG(BPF_SUB, BPF_REG_0, BPF_REG_1),
  9730. BPF_EXIT_INSN(),
  9731. },
  9732. .result = REJECT,
  9733. .errstr = "R0 tried to subtract pointer from scalar",
  9734. },
  9735. {
  9736. "check deducing bounds from const, 4",
  9737. .insns = {
  9738. BPF_MOV64_IMM(BPF_REG_0, 0),
  9739. BPF_JMP_IMM(BPF_JSLE, BPF_REG_0, 0, 1),
  9740. BPF_EXIT_INSN(),
  9741. BPF_JMP_IMM(BPF_JSGE, BPF_REG_0, 0, 1),
  9742. BPF_EXIT_INSN(),
  9743. BPF_ALU64_REG(BPF_SUB, BPF_REG_1, BPF_REG_0),
  9744. BPF_EXIT_INSN(),
  9745. },
  9746. .result = ACCEPT,
  9747. },
  9748. {
  9749. "check deducing bounds from const, 5",
  9750. .insns = {
  9751. BPF_MOV64_IMM(BPF_REG_0, 0),
  9752. BPF_JMP_IMM(BPF_JSGE, BPF_REG_0, 0, 1),
  9753. BPF_ALU64_REG(BPF_SUB, BPF_REG_0, BPF_REG_1),
  9754. BPF_EXIT_INSN(),
  9755. },
  9756. .result = REJECT,
  9757. .errstr = "R0 tried to subtract pointer from scalar",
  9758. },
  9759. {
  9760. "check deducing bounds from const, 6",
  9761. .insns = {
  9762. BPF_MOV64_IMM(BPF_REG_0, 0),
  9763. BPF_JMP_IMM(BPF_JSGE, BPF_REG_0, 0, 1),
  9764. BPF_EXIT_INSN(),
  9765. BPF_ALU64_REG(BPF_SUB, BPF_REG_0, BPF_REG_1),
  9766. BPF_EXIT_INSN(),
  9767. },
  9768. .result = REJECT,
  9769. .errstr = "R0 tried to subtract pointer from scalar",
  9770. },
  9771. {
  9772. "check deducing bounds from const, 7",
  9773. .insns = {
  9774. BPF_MOV64_IMM(BPF_REG_0, ~0),
  9775. BPF_JMP_IMM(BPF_JSGE, BPF_REG_0, 0, 0),
  9776. BPF_ALU64_REG(BPF_SUB, BPF_REG_1, BPF_REG_0),
  9777. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  9778. offsetof(struct __sk_buff, mark)),
  9779. BPF_EXIT_INSN(),
  9780. },
  9781. .result = REJECT,
  9782. .errstr = "dereference of modified ctx ptr",
  9783. },
  9784. {
  9785. "check deducing bounds from const, 8",
  9786. .insns = {
  9787. BPF_MOV64_IMM(BPF_REG_0, ~0),
  9788. BPF_JMP_IMM(BPF_JSGE, BPF_REG_0, 0, 1),
  9789. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_0),
  9790. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  9791. offsetof(struct __sk_buff, mark)),
  9792. BPF_EXIT_INSN(),
  9793. },
  9794. .result = REJECT,
  9795. .errstr = "dereference of modified ctx ptr",
  9796. },
  9797. {
  9798. "check deducing bounds from const, 9",
  9799. .insns = {
  9800. BPF_MOV64_IMM(BPF_REG_0, 0),
  9801. BPF_JMP_IMM(BPF_JSGE, BPF_REG_0, 0, 0),
  9802. BPF_ALU64_REG(BPF_SUB, BPF_REG_0, BPF_REG_1),
  9803. BPF_EXIT_INSN(),
  9804. },
  9805. .result = REJECT,
  9806. .errstr = "R0 tried to subtract pointer from scalar",
  9807. },
  9808. {
  9809. "check deducing bounds from const, 10",
  9810. .insns = {
  9811. BPF_MOV64_IMM(BPF_REG_0, 0),
  9812. BPF_JMP_IMM(BPF_JSLE, BPF_REG_0, 0, 0),
  9813. /* Marks reg as unknown. */
  9814. BPF_ALU64_IMM(BPF_NEG, BPF_REG_0, 0),
  9815. BPF_ALU64_REG(BPF_SUB, BPF_REG_0, BPF_REG_1),
  9816. BPF_EXIT_INSN(),
  9817. },
  9818. .result = REJECT,
  9819. .errstr = "math between ctx pointer and register with unbounded min value is not allowed",
  9820. },
  9821. {
  9822. "bpf_exit with invalid return code. test1",
  9823. .insns = {
  9824. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
  9825. BPF_EXIT_INSN(),
  9826. },
  9827. .errstr = "R0 has value (0x0; 0xffffffff)",
  9828. .result = REJECT,
  9829. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  9830. },
  9831. {
  9832. "bpf_exit with invalid return code. test2",
  9833. .insns = {
  9834. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
  9835. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 1),
  9836. BPF_EXIT_INSN(),
  9837. },
  9838. .result = ACCEPT,
  9839. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  9840. },
  9841. {
  9842. "bpf_exit with invalid return code. test3",
  9843. .insns = {
  9844. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
  9845. BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 3),
  9846. BPF_EXIT_INSN(),
  9847. },
  9848. .errstr = "R0 has value (0x0; 0x3)",
  9849. .result = REJECT,
  9850. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  9851. },
  9852. {
  9853. "bpf_exit with invalid return code. test4",
  9854. .insns = {
  9855. BPF_MOV64_IMM(BPF_REG_0, 1),
  9856. BPF_EXIT_INSN(),
  9857. },
  9858. .result = ACCEPT,
  9859. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  9860. },
  9861. {
  9862. "bpf_exit with invalid return code. test5",
  9863. .insns = {
  9864. BPF_MOV64_IMM(BPF_REG_0, 2),
  9865. BPF_EXIT_INSN(),
  9866. },
  9867. .errstr = "R0 has value (0x2; 0x0)",
  9868. .result = REJECT,
  9869. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  9870. },
  9871. {
  9872. "bpf_exit with invalid return code. test6",
  9873. .insns = {
  9874. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  9875. BPF_EXIT_INSN(),
  9876. },
  9877. .errstr = "R0 is not a known value (ctx)",
  9878. .result = REJECT,
  9879. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  9880. },
  9881. {
  9882. "bpf_exit with invalid return code. test7",
  9883. .insns = {
  9884. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
  9885. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 4),
  9886. BPF_ALU64_REG(BPF_MUL, BPF_REG_0, BPF_REG_2),
  9887. BPF_EXIT_INSN(),
  9888. },
  9889. .errstr = "R0 has unknown scalar value",
  9890. .result = REJECT,
  9891. .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
  9892. },
  9893. {
  9894. "calls: basic sanity",
  9895. .insns = {
  9896. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  9897. BPF_MOV64_IMM(BPF_REG_0, 1),
  9898. BPF_EXIT_INSN(),
  9899. BPF_MOV64_IMM(BPF_REG_0, 2),
  9900. BPF_EXIT_INSN(),
  9901. },
  9902. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  9903. .result = ACCEPT,
  9904. },
  9905. {
  9906. "calls: not on unpriviledged",
  9907. .insns = {
  9908. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  9909. BPF_MOV64_IMM(BPF_REG_0, 1),
  9910. BPF_EXIT_INSN(),
  9911. BPF_MOV64_IMM(BPF_REG_0, 2),
  9912. BPF_EXIT_INSN(),
  9913. },
  9914. .errstr_unpriv = "function calls to other bpf functions are allowed for root only",
  9915. .result_unpriv = REJECT,
  9916. .result = ACCEPT,
  9917. .retval = 1,
  9918. },
  9919. {
  9920. "calls: div by 0 in subprog",
  9921. .insns = {
  9922. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  9923. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 8),
  9924. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  9925. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  9926. offsetof(struct __sk_buff, data_end)),
  9927. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  9928. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 8),
  9929. BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 1),
  9930. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  9931. BPF_MOV64_IMM(BPF_REG_0, 1),
  9932. BPF_EXIT_INSN(),
  9933. BPF_MOV32_IMM(BPF_REG_2, 0),
  9934. BPF_MOV32_IMM(BPF_REG_3, 1),
  9935. BPF_ALU32_REG(BPF_DIV, BPF_REG_3, BPF_REG_2),
  9936. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  9937. offsetof(struct __sk_buff, data)),
  9938. BPF_EXIT_INSN(),
  9939. },
  9940. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  9941. .result = ACCEPT,
  9942. .retval = 1,
  9943. },
  9944. {
  9945. "calls: multiple ret types in subprog 1",
  9946. .insns = {
  9947. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  9948. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 8),
  9949. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  9950. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  9951. offsetof(struct __sk_buff, data_end)),
  9952. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  9953. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 8),
  9954. BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 1),
  9955. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  9956. BPF_MOV64_IMM(BPF_REG_0, 1),
  9957. BPF_EXIT_INSN(),
  9958. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  9959. offsetof(struct __sk_buff, data)),
  9960. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  9961. BPF_MOV32_IMM(BPF_REG_0, 42),
  9962. BPF_EXIT_INSN(),
  9963. },
  9964. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  9965. .result = REJECT,
  9966. .errstr = "R0 invalid mem access 'inv'",
  9967. },
  9968. {
  9969. "calls: multiple ret types in subprog 2",
  9970. .insns = {
  9971. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  9972. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 8),
  9973. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  9974. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
  9975. offsetof(struct __sk_buff, data_end)),
  9976. BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
  9977. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 8),
  9978. BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 1),
  9979. BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_0, 0),
  9980. BPF_MOV64_IMM(BPF_REG_0, 1),
  9981. BPF_EXIT_INSN(),
  9982. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  9983. offsetof(struct __sk_buff, data)),
  9984. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  9985. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 9),
  9986. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  9987. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  9988. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  9989. BPF_LD_MAP_FD(BPF_REG_1, 0),
  9990. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  9991. BPF_FUNC_map_lookup_elem),
  9992. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  9993. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_6,
  9994. offsetof(struct __sk_buff, data)),
  9995. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 64),
  9996. BPF_EXIT_INSN(),
  9997. },
  9998. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  9999. .fixup_map1 = { 16 },
  10000. .result = REJECT,
  10001. .errstr = "R0 min value is outside of the array range",
  10002. },
  10003. {
  10004. "calls: overlapping caller/callee",
  10005. .insns = {
  10006. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 0),
  10007. BPF_MOV64_IMM(BPF_REG_0, 1),
  10008. BPF_EXIT_INSN(),
  10009. },
  10010. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10011. .errstr = "last insn is not an exit or jmp",
  10012. .result = REJECT,
  10013. },
  10014. {
  10015. "calls: wrong recursive calls",
  10016. .insns = {
  10017. BPF_JMP_IMM(BPF_JA, 0, 0, 4),
  10018. BPF_JMP_IMM(BPF_JA, 0, 0, 4),
  10019. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -2),
  10020. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -2),
  10021. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -2),
  10022. BPF_MOV64_IMM(BPF_REG_0, 1),
  10023. BPF_EXIT_INSN(),
  10024. },
  10025. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10026. .errstr = "jump out of range",
  10027. .result = REJECT,
  10028. },
  10029. {
  10030. "calls: wrong src reg",
  10031. .insns = {
  10032. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 2, 0, 0),
  10033. BPF_MOV64_IMM(BPF_REG_0, 1),
  10034. BPF_EXIT_INSN(),
  10035. },
  10036. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10037. .errstr = "BPF_CALL uses reserved fields",
  10038. .result = REJECT,
  10039. },
  10040. {
  10041. "calls: wrong off value",
  10042. .insns = {
  10043. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, -1, 2),
  10044. BPF_MOV64_IMM(BPF_REG_0, 1),
  10045. BPF_EXIT_INSN(),
  10046. BPF_MOV64_IMM(BPF_REG_0, 2),
  10047. BPF_EXIT_INSN(),
  10048. },
  10049. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10050. .errstr = "BPF_CALL uses reserved fields",
  10051. .result = REJECT,
  10052. },
  10053. {
  10054. "calls: jump back loop",
  10055. .insns = {
  10056. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -1),
  10057. BPF_MOV64_IMM(BPF_REG_0, 1),
  10058. BPF_EXIT_INSN(),
  10059. },
  10060. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10061. .errstr = "back-edge from insn 0 to 0",
  10062. .result = REJECT,
  10063. },
  10064. {
  10065. "calls: conditional call",
  10066. .insns = {
  10067. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10068. offsetof(struct __sk_buff, mark)),
  10069. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 3),
  10070. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10071. BPF_MOV64_IMM(BPF_REG_0, 1),
  10072. BPF_EXIT_INSN(),
  10073. BPF_MOV64_IMM(BPF_REG_0, 2),
  10074. BPF_EXIT_INSN(),
  10075. },
  10076. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10077. .errstr = "jump out of range",
  10078. .result = REJECT,
  10079. },
  10080. {
  10081. "calls: conditional call 2",
  10082. .insns = {
  10083. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10084. offsetof(struct __sk_buff, mark)),
  10085. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 3),
  10086. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  10087. BPF_MOV64_IMM(BPF_REG_0, 1),
  10088. BPF_EXIT_INSN(),
  10089. BPF_MOV64_IMM(BPF_REG_0, 2),
  10090. BPF_EXIT_INSN(),
  10091. BPF_MOV64_IMM(BPF_REG_0, 3),
  10092. BPF_EXIT_INSN(),
  10093. },
  10094. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10095. .result = ACCEPT,
  10096. },
  10097. {
  10098. "calls: conditional call 3",
  10099. .insns = {
  10100. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10101. offsetof(struct __sk_buff, mark)),
  10102. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 3),
  10103. BPF_JMP_IMM(BPF_JA, 0, 0, 4),
  10104. BPF_MOV64_IMM(BPF_REG_0, 1),
  10105. BPF_EXIT_INSN(),
  10106. BPF_MOV64_IMM(BPF_REG_0, 1),
  10107. BPF_JMP_IMM(BPF_JA, 0, 0, -6),
  10108. BPF_MOV64_IMM(BPF_REG_0, 3),
  10109. BPF_JMP_IMM(BPF_JA, 0, 0, -6),
  10110. },
  10111. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10112. .errstr = "back-edge from insn",
  10113. .result = REJECT,
  10114. },
  10115. {
  10116. "calls: conditional call 4",
  10117. .insns = {
  10118. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10119. offsetof(struct __sk_buff, mark)),
  10120. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 3),
  10121. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  10122. BPF_MOV64_IMM(BPF_REG_0, 1),
  10123. BPF_EXIT_INSN(),
  10124. BPF_MOV64_IMM(BPF_REG_0, 1),
  10125. BPF_JMP_IMM(BPF_JA, 0, 0, -5),
  10126. BPF_MOV64_IMM(BPF_REG_0, 3),
  10127. BPF_EXIT_INSN(),
  10128. },
  10129. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10130. .result = ACCEPT,
  10131. },
  10132. {
  10133. "calls: conditional call 5",
  10134. .insns = {
  10135. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10136. offsetof(struct __sk_buff, mark)),
  10137. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 3),
  10138. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  10139. BPF_MOV64_IMM(BPF_REG_0, 1),
  10140. BPF_EXIT_INSN(),
  10141. BPF_MOV64_IMM(BPF_REG_0, 1),
  10142. BPF_JMP_IMM(BPF_JA, 0, 0, -6),
  10143. BPF_MOV64_IMM(BPF_REG_0, 3),
  10144. BPF_EXIT_INSN(),
  10145. },
  10146. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10147. .errstr = "back-edge from insn",
  10148. .result = REJECT,
  10149. },
  10150. {
  10151. "calls: conditional call 6",
  10152. .insns = {
  10153. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10154. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, -2),
  10155. BPF_EXIT_INSN(),
  10156. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10157. offsetof(struct __sk_buff, mark)),
  10158. BPF_EXIT_INSN(),
  10159. },
  10160. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10161. .errstr = "back-edge from insn",
  10162. .result = REJECT,
  10163. },
  10164. {
  10165. "calls: using r0 returned by callee",
  10166. .insns = {
  10167. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10168. BPF_EXIT_INSN(),
  10169. BPF_MOV64_IMM(BPF_REG_0, 2),
  10170. BPF_EXIT_INSN(),
  10171. },
  10172. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10173. .result = ACCEPT,
  10174. },
  10175. {
  10176. "calls: using uninit r0 from callee",
  10177. .insns = {
  10178. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10179. BPF_EXIT_INSN(),
  10180. BPF_EXIT_INSN(),
  10181. },
  10182. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10183. .errstr = "!read_ok",
  10184. .result = REJECT,
  10185. },
  10186. {
  10187. "calls: callee is using r1",
  10188. .insns = {
  10189. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10190. BPF_EXIT_INSN(),
  10191. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10192. offsetof(struct __sk_buff, len)),
  10193. BPF_EXIT_INSN(),
  10194. },
  10195. .prog_type = BPF_PROG_TYPE_SCHED_ACT,
  10196. .result = ACCEPT,
  10197. .retval = TEST_DATA_LEN,
  10198. },
  10199. {
  10200. "calls: callee using args1",
  10201. .insns = {
  10202. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10203. BPF_EXIT_INSN(),
  10204. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  10205. BPF_EXIT_INSN(),
  10206. },
  10207. .errstr_unpriv = "allowed for root only",
  10208. .result_unpriv = REJECT,
  10209. .result = ACCEPT,
  10210. .retval = POINTER_VALUE,
  10211. },
  10212. {
  10213. "calls: callee using wrong args2",
  10214. .insns = {
  10215. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10216. BPF_EXIT_INSN(),
  10217. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  10218. BPF_EXIT_INSN(),
  10219. },
  10220. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10221. .errstr = "R2 !read_ok",
  10222. .result = REJECT,
  10223. },
  10224. {
  10225. "calls: callee using two args",
  10226. .insns = {
  10227. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10228. BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_6,
  10229. offsetof(struct __sk_buff, len)),
  10230. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_6,
  10231. offsetof(struct __sk_buff, len)),
  10232. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10233. BPF_EXIT_INSN(),
  10234. BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
  10235. BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
  10236. BPF_EXIT_INSN(),
  10237. },
  10238. .errstr_unpriv = "allowed for root only",
  10239. .result_unpriv = REJECT,
  10240. .result = ACCEPT,
  10241. .retval = TEST_DATA_LEN + TEST_DATA_LEN - ETH_HLEN - ETH_HLEN,
  10242. },
  10243. {
  10244. "calls: callee changing pkt pointers",
  10245. .insns = {
  10246. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  10247. offsetof(struct xdp_md, data)),
  10248. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
  10249. offsetof(struct xdp_md, data_end)),
  10250. BPF_MOV64_REG(BPF_REG_8, BPF_REG_6),
  10251. BPF_ALU64_IMM(BPF_ADD, BPF_REG_8, 8),
  10252. BPF_JMP_REG(BPF_JGT, BPF_REG_8, BPF_REG_7, 2),
  10253. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10254. /* clear_all_pkt_pointers() has to walk all frames
  10255. * to make sure that pkt pointers in the caller
  10256. * are cleared when callee is calling a helper that
  10257. * adjusts packet size
  10258. */
  10259. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  10260. BPF_MOV32_IMM(BPF_REG_0, 0),
  10261. BPF_EXIT_INSN(),
  10262. BPF_MOV64_IMM(BPF_REG_2, 0),
  10263. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  10264. BPF_FUNC_xdp_adjust_head),
  10265. BPF_EXIT_INSN(),
  10266. },
  10267. .result = REJECT,
  10268. .errstr = "R6 invalid mem access 'inv'",
  10269. .prog_type = BPF_PROG_TYPE_XDP,
  10270. },
  10271. {
  10272. "calls: two calls with args",
  10273. .insns = {
  10274. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10275. BPF_EXIT_INSN(),
  10276. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10277. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 6),
  10278. BPF_MOV64_REG(BPF_REG_7, BPF_REG_0),
  10279. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  10280. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10281. BPF_ALU64_REG(BPF_ADD, BPF_REG_7, BPF_REG_0),
  10282. BPF_MOV64_REG(BPF_REG_0, BPF_REG_7),
  10283. BPF_EXIT_INSN(),
  10284. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10285. offsetof(struct __sk_buff, len)),
  10286. BPF_EXIT_INSN(),
  10287. },
  10288. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  10289. .result = ACCEPT,
  10290. .retval = TEST_DATA_LEN + TEST_DATA_LEN,
  10291. },
  10292. {
  10293. "calls: calls with stack arith",
  10294. .insns = {
  10295. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  10296. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -64),
  10297. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10298. BPF_EXIT_INSN(),
  10299. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -64),
  10300. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10301. BPF_EXIT_INSN(),
  10302. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -64),
  10303. BPF_MOV64_IMM(BPF_REG_0, 42),
  10304. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
  10305. BPF_EXIT_INSN(),
  10306. },
  10307. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  10308. .result = ACCEPT,
  10309. .retval = 42,
  10310. },
  10311. {
  10312. "calls: calls with misaligned stack access",
  10313. .insns = {
  10314. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  10315. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -63),
  10316. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10317. BPF_EXIT_INSN(),
  10318. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -61),
  10319. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10320. BPF_EXIT_INSN(),
  10321. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -63),
  10322. BPF_MOV64_IMM(BPF_REG_0, 42),
  10323. BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
  10324. BPF_EXIT_INSN(),
  10325. },
  10326. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  10327. .flags = F_LOAD_WITH_STRICT_ALIGNMENT,
  10328. .errstr = "misaligned stack access",
  10329. .result = REJECT,
  10330. },
  10331. {
  10332. "calls: calls control flow, jump test",
  10333. .insns = {
  10334. BPF_MOV64_IMM(BPF_REG_0, 42),
  10335. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  10336. BPF_MOV64_IMM(BPF_REG_0, 43),
  10337. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  10338. BPF_JMP_IMM(BPF_JA, 0, 0, -3),
  10339. BPF_EXIT_INSN(),
  10340. },
  10341. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  10342. .result = ACCEPT,
  10343. .retval = 43,
  10344. },
  10345. {
  10346. "calls: calls control flow, jump test 2",
  10347. .insns = {
  10348. BPF_MOV64_IMM(BPF_REG_0, 42),
  10349. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  10350. BPF_MOV64_IMM(BPF_REG_0, 43),
  10351. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  10352. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -3),
  10353. BPF_EXIT_INSN(),
  10354. },
  10355. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  10356. .errstr = "jump out of range from insn 1 to 4",
  10357. .result = REJECT,
  10358. },
  10359. {
  10360. "calls: two calls with bad jump",
  10361. .insns = {
  10362. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10363. BPF_EXIT_INSN(),
  10364. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10365. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 6),
  10366. BPF_MOV64_REG(BPF_REG_7, BPF_REG_0),
  10367. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  10368. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10369. BPF_ALU64_REG(BPF_ADD, BPF_REG_7, BPF_REG_0),
  10370. BPF_MOV64_REG(BPF_REG_0, BPF_REG_7),
  10371. BPF_EXIT_INSN(),
  10372. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10373. offsetof(struct __sk_buff, len)),
  10374. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, -3),
  10375. BPF_EXIT_INSN(),
  10376. },
  10377. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10378. .errstr = "jump out of range from insn 11 to 9",
  10379. .result = REJECT,
  10380. },
  10381. {
  10382. "calls: recursive call. test1",
  10383. .insns = {
  10384. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10385. BPF_EXIT_INSN(),
  10386. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -1),
  10387. BPF_EXIT_INSN(),
  10388. },
  10389. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10390. .errstr = "back-edge",
  10391. .result = REJECT,
  10392. },
  10393. {
  10394. "calls: recursive call. test2",
  10395. .insns = {
  10396. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10397. BPF_EXIT_INSN(),
  10398. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -3),
  10399. BPF_EXIT_INSN(),
  10400. },
  10401. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10402. .errstr = "back-edge",
  10403. .result = REJECT,
  10404. },
  10405. {
  10406. "calls: unreachable code",
  10407. .insns = {
  10408. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10409. BPF_EXIT_INSN(),
  10410. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10411. BPF_EXIT_INSN(),
  10412. BPF_MOV64_IMM(BPF_REG_0, 0),
  10413. BPF_EXIT_INSN(),
  10414. BPF_MOV64_IMM(BPF_REG_0, 0),
  10415. BPF_EXIT_INSN(),
  10416. },
  10417. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10418. .errstr = "unreachable insn 6",
  10419. .result = REJECT,
  10420. },
  10421. {
  10422. "calls: invalid call",
  10423. .insns = {
  10424. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10425. BPF_EXIT_INSN(),
  10426. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -4),
  10427. BPF_EXIT_INSN(),
  10428. },
  10429. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10430. .errstr = "invalid destination",
  10431. .result = REJECT,
  10432. },
  10433. {
  10434. "calls: invalid call 2",
  10435. .insns = {
  10436. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10437. BPF_EXIT_INSN(),
  10438. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 0x7fffffff),
  10439. BPF_EXIT_INSN(),
  10440. },
  10441. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10442. .errstr = "invalid destination",
  10443. .result = REJECT,
  10444. },
  10445. {
  10446. "calls: jumping across function bodies. test1",
  10447. .insns = {
  10448. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10449. BPF_MOV64_IMM(BPF_REG_0, 0),
  10450. BPF_EXIT_INSN(),
  10451. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, -3),
  10452. BPF_EXIT_INSN(),
  10453. },
  10454. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10455. .errstr = "jump out of range",
  10456. .result = REJECT,
  10457. },
  10458. {
  10459. "calls: jumping across function bodies. test2",
  10460. .insns = {
  10461. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 3),
  10462. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10463. BPF_MOV64_IMM(BPF_REG_0, 0),
  10464. BPF_EXIT_INSN(),
  10465. BPF_EXIT_INSN(),
  10466. },
  10467. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10468. .errstr = "jump out of range",
  10469. .result = REJECT,
  10470. },
  10471. {
  10472. "calls: call without exit",
  10473. .insns = {
  10474. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10475. BPF_EXIT_INSN(),
  10476. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10477. BPF_EXIT_INSN(),
  10478. BPF_MOV64_IMM(BPF_REG_0, 0),
  10479. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, -2),
  10480. },
  10481. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10482. .errstr = "not an exit",
  10483. .result = REJECT,
  10484. },
  10485. {
  10486. "calls: call into middle of ld_imm64",
  10487. .insns = {
  10488. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10489. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10490. BPF_MOV64_IMM(BPF_REG_0, 0),
  10491. BPF_EXIT_INSN(),
  10492. BPF_LD_IMM64(BPF_REG_0, 0),
  10493. BPF_EXIT_INSN(),
  10494. },
  10495. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10496. .errstr = "last insn",
  10497. .result = REJECT,
  10498. },
  10499. {
  10500. "calls: call into middle of other call",
  10501. .insns = {
  10502. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10503. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10504. BPF_MOV64_IMM(BPF_REG_0, 0),
  10505. BPF_EXIT_INSN(),
  10506. BPF_MOV64_IMM(BPF_REG_0, 0),
  10507. BPF_MOV64_IMM(BPF_REG_0, 0),
  10508. BPF_EXIT_INSN(),
  10509. },
  10510. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10511. .errstr = "last insn",
  10512. .result = REJECT,
  10513. },
  10514. {
  10515. "calls: ld_abs with changing ctx data in callee",
  10516. .insns = {
  10517. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10518. BPF_LD_ABS(BPF_B, 0),
  10519. BPF_LD_ABS(BPF_H, 0),
  10520. BPF_LD_ABS(BPF_W, 0),
  10521. BPF_MOV64_REG(BPF_REG_7, BPF_REG_6),
  10522. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 5),
  10523. BPF_MOV64_REG(BPF_REG_6, BPF_REG_7),
  10524. BPF_LD_ABS(BPF_B, 0),
  10525. BPF_LD_ABS(BPF_H, 0),
  10526. BPF_LD_ABS(BPF_W, 0),
  10527. BPF_EXIT_INSN(),
  10528. BPF_MOV64_IMM(BPF_REG_2, 1),
  10529. BPF_MOV64_IMM(BPF_REG_3, 2),
  10530. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  10531. BPF_FUNC_skb_vlan_push),
  10532. BPF_EXIT_INSN(),
  10533. },
  10534. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  10535. .errstr = "BPF_LD_[ABS|IND] instructions cannot be mixed",
  10536. .result = REJECT,
  10537. },
  10538. {
  10539. "calls: two calls with bad fallthrough",
  10540. .insns = {
  10541. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10542. BPF_EXIT_INSN(),
  10543. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10544. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 6),
  10545. BPF_MOV64_REG(BPF_REG_7, BPF_REG_0),
  10546. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  10547. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10548. BPF_ALU64_REG(BPF_ADD, BPF_REG_7, BPF_REG_0),
  10549. BPF_MOV64_REG(BPF_REG_0, BPF_REG_7),
  10550. BPF_MOV64_REG(BPF_REG_0, BPF_REG_0),
  10551. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
  10552. offsetof(struct __sk_buff, len)),
  10553. BPF_EXIT_INSN(),
  10554. },
  10555. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  10556. .errstr = "not an exit",
  10557. .result = REJECT,
  10558. },
  10559. {
  10560. "calls: two calls with stack read",
  10561. .insns = {
  10562. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  10563. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  10564. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  10565. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10566. BPF_EXIT_INSN(),
  10567. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10568. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 6),
  10569. BPF_MOV64_REG(BPF_REG_7, BPF_REG_0),
  10570. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  10571. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10572. BPF_ALU64_REG(BPF_ADD, BPF_REG_7, BPF_REG_0),
  10573. BPF_MOV64_REG(BPF_REG_0, BPF_REG_7),
  10574. BPF_EXIT_INSN(),
  10575. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
  10576. BPF_EXIT_INSN(),
  10577. },
  10578. .prog_type = BPF_PROG_TYPE_XDP,
  10579. .result = ACCEPT,
  10580. },
  10581. {
  10582. "calls: two calls with stack write",
  10583. .insns = {
  10584. /* main prog */
  10585. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  10586. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  10587. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  10588. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  10589. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  10590. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10591. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -16),
  10592. BPF_EXIT_INSN(),
  10593. /* subprog 1 */
  10594. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10595. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  10596. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 7),
  10597. BPF_MOV64_REG(BPF_REG_8, BPF_REG_0),
  10598. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  10599. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  10600. BPF_ALU64_REG(BPF_ADD, BPF_REG_8, BPF_REG_0),
  10601. BPF_MOV64_REG(BPF_REG_0, BPF_REG_8),
  10602. /* write into stack frame of main prog */
  10603. BPF_STX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
  10604. BPF_EXIT_INSN(),
  10605. /* subprog 2 */
  10606. /* read from stack frame of main prog */
  10607. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, 0),
  10608. BPF_EXIT_INSN(),
  10609. },
  10610. .prog_type = BPF_PROG_TYPE_XDP,
  10611. .result = ACCEPT,
  10612. },
  10613. {
  10614. "calls: stack overflow using two frames (pre-call access)",
  10615. .insns = {
  10616. /* prog 1 */
  10617. BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
  10618. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1),
  10619. BPF_EXIT_INSN(),
  10620. /* prog 2 */
  10621. BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
  10622. BPF_MOV64_IMM(BPF_REG_0, 0),
  10623. BPF_EXIT_INSN(),
  10624. },
  10625. .prog_type = BPF_PROG_TYPE_XDP,
  10626. .errstr = "combined stack size",
  10627. .result = REJECT,
  10628. },
  10629. {
  10630. "calls: stack overflow using two frames (post-call access)",
  10631. .insns = {
  10632. /* prog 1 */
  10633. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 2),
  10634. BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
  10635. BPF_EXIT_INSN(),
  10636. /* prog 2 */
  10637. BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
  10638. BPF_MOV64_IMM(BPF_REG_0, 0),
  10639. BPF_EXIT_INSN(),
  10640. },
  10641. .prog_type = BPF_PROG_TYPE_XDP,
  10642. .errstr = "combined stack size",
  10643. .result = REJECT,
  10644. },
  10645. {
  10646. "calls: stack depth check using three frames. test1",
  10647. .insns = {
  10648. /* main */
  10649. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 4), /* call A */
  10650. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 5), /* call B */
  10651. BPF_ST_MEM(BPF_B, BPF_REG_10, -32, 0),
  10652. BPF_MOV64_IMM(BPF_REG_0, 0),
  10653. BPF_EXIT_INSN(),
  10654. /* A */
  10655. BPF_ST_MEM(BPF_B, BPF_REG_10, -256, 0),
  10656. BPF_EXIT_INSN(),
  10657. /* B */
  10658. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, -3), /* call A */
  10659. BPF_ST_MEM(BPF_B, BPF_REG_10, -64, 0),
  10660. BPF_EXIT_INSN(),
  10661. },
  10662. .prog_type = BPF_PROG_TYPE_XDP,
  10663. /* stack_main=32, stack_A=256, stack_B=64
  10664. * and max(main+A, main+A+B) < 512
  10665. */
  10666. .result = ACCEPT,
  10667. },
  10668. {
  10669. "calls: stack depth check using three frames. test2",
  10670. .insns = {
  10671. /* main */
  10672. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 4), /* call A */
  10673. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 5), /* call B */
  10674. BPF_ST_MEM(BPF_B, BPF_REG_10, -32, 0),
  10675. BPF_MOV64_IMM(BPF_REG_0, 0),
  10676. BPF_EXIT_INSN(),
  10677. /* A */
  10678. BPF_ST_MEM(BPF_B, BPF_REG_10, -64, 0),
  10679. BPF_EXIT_INSN(),
  10680. /* B */
  10681. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, -3), /* call A */
  10682. BPF_ST_MEM(BPF_B, BPF_REG_10, -256, 0),
  10683. BPF_EXIT_INSN(),
  10684. },
  10685. .prog_type = BPF_PROG_TYPE_XDP,
  10686. /* stack_main=32, stack_A=64, stack_B=256
  10687. * and max(main+A, main+A+B) < 512
  10688. */
  10689. .result = ACCEPT,
  10690. },
  10691. {
  10692. "calls: stack depth check using three frames. test3",
  10693. .insns = {
  10694. /* main */
  10695. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10696. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 6), /* call A */
  10697. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  10698. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 8), /* call B */
  10699. BPF_JMP_IMM(BPF_JGE, BPF_REG_6, 0, 1),
  10700. BPF_ST_MEM(BPF_B, BPF_REG_10, -64, 0),
  10701. BPF_MOV64_IMM(BPF_REG_0, 0),
  10702. BPF_EXIT_INSN(),
  10703. /* A */
  10704. BPF_JMP_IMM(BPF_JLT, BPF_REG_1, 10, 1),
  10705. BPF_EXIT_INSN(),
  10706. BPF_ST_MEM(BPF_B, BPF_REG_10, -224, 0),
  10707. BPF_JMP_IMM(BPF_JA, 0, 0, -3),
  10708. /* B */
  10709. BPF_JMP_IMM(BPF_JGT, BPF_REG_1, 2, 1),
  10710. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, -6), /* call A */
  10711. BPF_ST_MEM(BPF_B, BPF_REG_10, -256, 0),
  10712. BPF_EXIT_INSN(),
  10713. },
  10714. .prog_type = BPF_PROG_TYPE_XDP,
  10715. /* stack_main=64, stack_A=224, stack_B=256
  10716. * and max(main+A, main+A+B) > 512
  10717. */
  10718. .errstr = "combined stack",
  10719. .result = REJECT,
  10720. },
  10721. {
  10722. "calls: stack depth check using three frames. test4",
  10723. /* void main(void) {
  10724. * func1(0);
  10725. * func1(1);
  10726. * func2(1);
  10727. * }
  10728. * void func1(int alloc_or_recurse) {
  10729. * if (alloc_or_recurse) {
  10730. * frame_pointer[-300] = 1;
  10731. * } else {
  10732. * func2(alloc_or_recurse);
  10733. * }
  10734. * }
  10735. * void func2(int alloc_or_recurse) {
  10736. * if (alloc_or_recurse) {
  10737. * frame_pointer[-300] = 1;
  10738. * }
  10739. * }
  10740. */
  10741. .insns = {
  10742. /* main */
  10743. BPF_MOV64_IMM(BPF_REG_1, 0),
  10744. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 6), /* call A */
  10745. BPF_MOV64_IMM(BPF_REG_1, 1),
  10746. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 4), /* call A */
  10747. BPF_MOV64_IMM(BPF_REG_1, 1),
  10748. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 7), /* call B */
  10749. BPF_MOV64_IMM(BPF_REG_0, 0),
  10750. BPF_EXIT_INSN(),
  10751. /* A */
  10752. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 2),
  10753. BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
  10754. BPF_EXIT_INSN(),
  10755. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call B */
  10756. BPF_EXIT_INSN(),
  10757. /* B */
  10758. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
  10759. BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
  10760. BPF_EXIT_INSN(),
  10761. },
  10762. .prog_type = BPF_PROG_TYPE_XDP,
  10763. .result = REJECT,
  10764. .errstr = "combined stack",
  10765. },
  10766. {
  10767. "calls: stack depth check using three frames. test5",
  10768. .insns = {
  10769. /* main */
  10770. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call A */
  10771. BPF_EXIT_INSN(),
  10772. /* A */
  10773. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call B */
  10774. BPF_EXIT_INSN(),
  10775. /* B */
  10776. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call C */
  10777. BPF_EXIT_INSN(),
  10778. /* C */
  10779. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call D */
  10780. BPF_EXIT_INSN(),
  10781. /* D */
  10782. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call E */
  10783. BPF_EXIT_INSN(),
  10784. /* E */
  10785. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call F */
  10786. BPF_EXIT_INSN(),
  10787. /* F */
  10788. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call G */
  10789. BPF_EXIT_INSN(),
  10790. /* G */
  10791. BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, 1), /* call H */
  10792. BPF_EXIT_INSN(),
  10793. /* H */
  10794. BPF_MOV64_IMM(BPF_REG_0, 0),
  10795. BPF_EXIT_INSN(),
  10796. },
  10797. .prog_type = BPF_PROG_TYPE_XDP,
  10798. .errstr = "call stack",
  10799. .result = REJECT,
  10800. },
  10801. {
  10802. "calls: spill into caller stack frame",
  10803. .insns = {
  10804. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  10805. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  10806. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  10807. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10808. BPF_EXIT_INSN(),
  10809. BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_1, 0),
  10810. BPF_MOV64_IMM(BPF_REG_0, 0),
  10811. BPF_EXIT_INSN(),
  10812. },
  10813. .prog_type = BPF_PROG_TYPE_XDP,
  10814. .errstr = "cannot spill",
  10815. .result = REJECT,
  10816. },
  10817. {
  10818. "calls: write into caller stack frame",
  10819. .insns = {
  10820. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  10821. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  10822. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10823. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10824. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  10825. BPF_EXIT_INSN(),
  10826. BPF_ST_MEM(BPF_DW, BPF_REG_1, 0, 42),
  10827. BPF_MOV64_IMM(BPF_REG_0, 0),
  10828. BPF_EXIT_INSN(),
  10829. },
  10830. .prog_type = BPF_PROG_TYPE_XDP,
  10831. .result = ACCEPT,
  10832. .retval = 42,
  10833. },
  10834. {
  10835. "calls: write into callee stack frame",
  10836. .insns = {
  10837. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10838. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 42),
  10839. BPF_EXIT_INSN(),
  10840. BPF_MOV64_REG(BPF_REG_0, BPF_REG_10),
  10841. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, -8),
  10842. BPF_EXIT_INSN(),
  10843. },
  10844. .prog_type = BPF_PROG_TYPE_XDP,
  10845. .errstr = "cannot return stack pointer",
  10846. .result = REJECT,
  10847. },
  10848. {
  10849. "calls: two calls with stack write and void return",
  10850. .insns = {
  10851. /* main prog */
  10852. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  10853. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  10854. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  10855. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  10856. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  10857. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10858. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -16),
  10859. BPF_EXIT_INSN(),
  10860. /* subprog 1 */
  10861. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10862. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  10863. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10864. BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
  10865. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10866. BPF_EXIT_INSN(),
  10867. /* subprog 2 */
  10868. /* write into stack frame of main prog */
  10869. BPF_ST_MEM(BPF_DW, BPF_REG_1, 0, 0),
  10870. BPF_EXIT_INSN(), /* void return */
  10871. },
  10872. .prog_type = BPF_PROG_TYPE_XDP,
  10873. .result = ACCEPT,
  10874. },
  10875. {
  10876. "calls: ambiguous return value",
  10877. .insns = {
  10878. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10879. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 5),
  10880. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  10881. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  10882. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10883. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  10884. BPF_EXIT_INSN(),
  10885. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
  10886. BPF_MOV64_IMM(BPF_REG_0, 0),
  10887. BPF_EXIT_INSN(),
  10888. },
  10889. .errstr_unpriv = "allowed for root only",
  10890. .result_unpriv = REJECT,
  10891. .errstr = "R0 !read_ok",
  10892. .result = REJECT,
  10893. },
  10894. {
  10895. "calls: two calls that return map_value",
  10896. .insns = {
  10897. /* main prog */
  10898. /* pass fp-16, fp-8 into a function */
  10899. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  10900. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  10901. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  10902. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  10903. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 8),
  10904. /* fetch map_value_ptr from the stack of this function */
  10905. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  10906. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  10907. /* write into map value */
  10908. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  10909. /* fetch secound map_value_ptr from the stack */
  10910. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -16),
  10911. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  10912. /* write into map value */
  10913. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  10914. BPF_MOV64_IMM(BPF_REG_0, 0),
  10915. BPF_EXIT_INSN(),
  10916. /* subprog 1 */
  10917. /* call 3rd function twice */
  10918. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10919. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  10920. /* first time with fp-8 */
  10921. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  10922. BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
  10923. /* second time with fp-16 */
  10924. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  10925. BPF_EXIT_INSN(),
  10926. /* subprog 2 */
  10927. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10928. /* lookup from map */
  10929. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  10930. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  10931. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  10932. BPF_LD_MAP_FD(BPF_REG_1, 0),
  10933. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  10934. BPF_FUNC_map_lookup_elem),
  10935. /* write map_value_ptr into stack frame of main prog */
  10936. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  10937. BPF_MOV64_IMM(BPF_REG_0, 0),
  10938. BPF_EXIT_INSN(), /* return 0 */
  10939. },
  10940. .prog_type = BPF_PROG_TYPE_XDP,
  10941. .fixup_map1 = { 23 },
  10942. .result = ACCEPT,
  10943. },
  10944. {
  10945. "calls: two calls that return map_value with bool condition",
  10946. .insns = {
  10947. /* main prog */
  10948. /* pass fp-16, fp-8 into a function */
  10949. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  10950. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  10951. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  10952. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  10953. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  10954. BPF_MOV64_IMM(BPF_REG_0, 0),
  10955. BPF_EXIT_INSN(),
  10956. /* subprog 1 */
  10957. /* call 3rd function twice */
  10958. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10959. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  10960. /* first time with fp-8 */
  10961. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 9),
  10962. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 1, 2),
  10963. /* fetch map_value_ptr from the stack of this function */
  10964. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  10965. /* write into map value */
  10966. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  10967. BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
  10968. /* second time with fp-16 */
  10969. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  10970. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 1, 2),
  10971. /* fetch secound map_value_ptr from the stack */
  10972. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_7, 0),
  10973. /* write into map value */
  10974. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  10975. BPF_EXIT_INSN(),
  10976. /* subprog 2 */
  10977. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  10978. /* lookup from map */
  10979. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  10980. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  10981. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  10982. BPF_LD_MAP_FD(BPF_REG_1, 0),
  10983. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  10984. BPF_FUNC_map_lookup_elem),
  10985. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  10986. BPF_MOV64_IMM(BPF_REG_0, 0),
  10987. BPF_EXIT_INSN(), /* return 0 */
  10988. /* write map_value_ptr into stack frame of main prog */
  10989. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  10990. BPF_MOV64_IMM(BPF_REG_0, 1),
  10991. BPF_EXIT_INSN(), /* return 1 */
  10992. },
  10993. .prog_type = BPF_PROG_TYPE_XDP,
  10994. .fixup_map1 = { 23 },
  10995. .result = ACCEPT,
  10996. },
  10997. {
  10998. "calls: two calls that return map_value with incorrect bool check",
  10999. .insns = {
  11000. /* main prog */
  11001. /* pass fp-16, fp-8 into a function */
  11002. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  11003. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  11004. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11005. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  11006. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  11007. BPF_MOV64_IMM(BPF_REG_0, 0),
  11008. BPF_EXIT_INSN(),
  11009. /* subprog 1 */
  11010. /* call 3rd function twice */
  11011. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  11012. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  11013. /* first time with fp-8 */
  11014. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 9),
  11015. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 1, 2),
  11016. /* fetch map_value_ptr from the stack of this function */
  11017. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
  11018. /* write into map value */
  11019. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11020. BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
  11021. /* second time with fp-16 */
  11022. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  11023. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11024. /* fetch secound map_value_ptr from the stack */
  11025. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_7, 0),
  11026. /* write into map value */
  11027. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11028. BPF_EXIT_INSN(),
  11029. /* subprog 2 */
  11030. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  11031. /* lookup from map */
  11032. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11033. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11034. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11035. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11036. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11037. BPF_FUNC_map_lookup_elem),
  11038. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11039. BPF_MOV64_IMM(BPF_REG_0, 0),
  11040. BPF_EXIT_INSN(), /* return 0 */
  11041. /* write map_value_ptr into stack frame of main prog */
  11042. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  11043. BPF_MOV64_IMM(BPF_REG_0, 1),
  11044. BPF_EXIT_INSN(), /* return 1 */
  11045. },
  11046. .prog_type = BPF_PROG_TYPE_XDP,
  11047. .fixup_map1 = { 23 },
  11048. .result = REJECT,
  11049. .errstr = "invalid read from stack off -16+0 size 8",
  11050. },
  11051. {
  11052. "calls: two calls that receive map_value via arg=ptr_stack_of_caller. test1",
  11053. .insns = {
  11054. /* main prog */
  11055. /* pass fp-16, fp-8 into a function */
  11056. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  11057. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  11058. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11059. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  11060. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  11061. BPF_MOV64_IMM(BPF_REG_0, 0),
  11062. BPF_EXIT_INSN(),
  11063. /* subprog 1 */
  11064. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  11065. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  11066. /* 1st lookup from map */
  11067. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11068. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11069. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11070. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11071. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11072. BPF_FUNC_map_lookup_elem),
  11073. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11074. BPF_MOV64_IMM(BPF_REG_8, 0),
  11075. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  11076. /* write map_value_ptr into stack frame of main prog at fp-8 */
  11077. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  11078. BPF_MOV64_IMM(BPF_REG_8, 1),
  11079. /* 2nd lookup from map */
  11080. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), /* 20 */
  11081. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11082. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11083. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, /* 24 */
  11084. BPF_FUNC_map_lookup_elem),
  11085. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11086. BPF_MOV64_IMM(BPF_REG_9, 0),
  11087. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  11088. /* write map_value_ptr into stack frame of main prog at fp-16 */
  11089. BPF_STX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
  11090. BPF_MOV64_IMM(BPF_REG_9, 1),
  11091. /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
  11092. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), /* 30 */
  11093. BPF_MOV64_REG(BPF_REG_2, BPF_REG_8),
  11094. BPF_MOV64_REG(BPF_REG_3, BPF_REG_7),
  11095. BPF_MOV64_REG(BPF_REG_4, BPF_REG_9),
  11096. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1), /* 34 */
  11097. BPF_EXIT_INSN(),
  11098. /* subprog 2 */
  11099. /* if arg2 == 1 do *arg1 = 0 */
  11100. BPF_JMP_IMM(BPF_JNE, BPF_REG_2, 1, 2),
  11101. /* fetch map_value_ptr from the stack of this function */
  11102. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 0),
  11103. /* write into map value */
  11104. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11105. /* if arg4 == 1 do *arg3 = 0 */
  11106. BPF_JMP_IMM(BPF_JNE, BPF_REG_4, 1, 2),
  11107. /* fetch map_value_ptr from the stack of this function */
  11108. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_3, 0),
  11109. /* write into map value */
  11110. BPF_ST_MEM(BPF_DW, BPF_REG_0, 2, 0),
  11111. BPF_EXIT_INSN(),
  11112. },
  11113. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11114. .fixup_map1 = { 12, 22 },
  11115. .result = REJECT,
  11116. .errstr = "invalid access to map value, value_size=8 off=2 size=8",
  11117. },
  11118. {
  11119. "calls: two calls that receive map_value via arg=ptr_stack_of_caller. test2",
  11120. .insns = {
  11121. /* main prog */
  11122. /* pass fp-16, fp-8 into a function */
  11123. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  11124. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  11125. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11126. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  11127. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  11128. BPF_MOV64_IMM(BPF_REG_0, 0),
  11129. BPF_EXIT_INSN(),
  11130. /* subprog 1 */
  11131. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  11132. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  11133. /* 1st lookup from map */
  11134. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11135. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11136. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11137. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11138. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11139. BPF_FUNC_map_lookup_elem),
  11140. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11141. BPF_MOV64_IMM(BPF_REG_8, 0),
  11142. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  11143. /* write map_value_ptr into stack frame of main prog at fp-8 */
  11144. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  11145. BPF_MOV64_IMM(BPF_REG_8, 1),
  11146. /* 2nd lookup from map */
  11147. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), /* 20 */
  11148. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11149. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11150. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, /* 24 */
  11151. BPF_FUNC_map_lookup_elem),
  11152. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11153. BPF_MOV64_IMM(BPF_REG_9, 0),
  11154. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  11155. /* write map_value_ptr into stack frame of main prog at fp-16 */
  11156. BPF_STX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
  11157. BPF_MOV64_IMM(BPF_REG_9, 1),
  11158. /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
  11159. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), /* 30 */
  11160. BPF_MOV64_REG(BPF_REG_2, BPF_REG_8),
  11161. BPF_MOV64_REG(BPF_REG_3, BPF_REG_7),
  11162. BPF_MOV64_REG(BPF_REG_4, BPF_REG_9),
  11163. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1), /* 34 */
  11164. BPF_EXIT_INSN(),
  11165. /* subprog 2 */
  11166. /* if arg2 == 1 do *arg1 = 0 */
  11167. BPF_JMP_IMM(BPF_JNE, BPF_REG_2, 1, 2),
  11168. /* fetch map_value_ptr from the stack of this function */
  11169. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 0),
  11170. /* write into map value */
  11171. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11172. /* if arg4 == 1 do *arg3 = 0 */
  11173. BPF_JMP_IMM(BPF_JNE, BPF_REG_4, 1, 2),
  11174. /* fetch map_value_ptr from the stack of this function */
  11175. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_3, 0),
  11176. /* write into map value */
  11177. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11178. BPF_EXIT_INSN(),
  11179. },
  11180. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11181. .fixup_map1 = { 12, 22 },
  11182. .result = ACCEPT,
  11183. },
  11184. {
  11185. "calls: two jumps that receive map_value via arg=ptr_stack_of_jumper. test3",
  11186. .insns = {
  11187. /* main prog */
  11188. /* pass fp-16, fp-8 into a function */
  11189. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  11190. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  11191. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11192. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  11193. BPF_JMP_IMM(BPF_JNE, BPF_REG_1, 0, 2),
  11194. BPF_MOV64_IMM(BPF_REG_0, 0),
  11195. BPF_EXIT_INSN(),
  11196. /* subprog 1 */
  11197. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  11198. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  11199. /* 1st lookup from map */
  11200. BPF_ST_MEM(BPF_DW, BPF_REG_10, -24, 0),
  11201. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11202. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -24),
  11203. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11204. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11205. BPF_FUNC_map_lookup_elem),
  11206. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11207. BPF_MOV64_IMM(BPF_REG_8, 0),
  11208. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  11209. /* write map_value_ptr into stack frame of main prog at fp-8 */
  11210. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  11211. BPF_MOV64_IMM(BPF_REG_8, 1),
  11212. /* 2nd lookup from map */
  11213. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11214. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -24),
  11215. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11216. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11217. BPF_FUNC_map_lookup_elem),
  11218. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11219. BPF_MOV64_IMM(BPF_REG_9, 0), // 26
  11220. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  11221. /* write map_value_ptr into stack frame of main prog at fp-16 */
  11222. BPF_STX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
  11223. BPF_MOV64_IMM(BPF_REG_9, 1),
  11224. /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
  11225. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), // 30
  11226. BPF_MOV64_REG(BPF_REG_2, BPF_REG_8),
  11227. BPF_MOV64_REG(BPF_REG_3, BPF_REG_7),
  11228. BPF_MOV64_REG(BPF_REG_4, BPF_REG_9),
  11229. BPF_JMP_IMM(BPF_JNE, BPF_REG_1, 0, 1), // 34
  11230. BPF_JMP_IMM(BPF_JA, 0, 0, -30),
  11231. /* subprog 2 */
  11232. /* if arg2 == 1 do *arg1 = 0 */
  11233. BPF_JMP_IMM(BPF_JNE, BPF_REG_2, 1, 2),
  11234. /* fetch map_value_ptr from the stack of this function */
  11235. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 0),
  11236. /* write into map value */
  11237. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11238. /* if arg4 == 1 do *arg3 = 0 */
  11239. BPF_JMP_IMM(BPF_JNE, BPF_REG_4, 1, 2),
  11240. /* fetch map_value_ptr from the stack of this function */
  11241. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_3, 0),
  11242. /* write into map value */
  11243. BPF_ST_MEM(BPF_DW, BPF_REG_0, 2, 0),
  11244. BPF_JMP_IMM(BPF_JA, 0, 0, -8),
  11245. },
  11246. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11247. .fixup_map1 = { 12, 22 },
  11248. .result = REJECT,
  11249. .errstr = "invalid access to map value, value_size=8 off=2 size=8",
  11250. },
  11251. {
  11252. "calls: two calls that receive map_value_ptr_or_null via arg. test1",
  11253. .insns = {
  11254. /* main prog */
  11255. /* pass fp-16, fp-8 into a function */
  11256. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  11257. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  11258. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11259. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  11260. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  11261. BPF_MOV64_IMM(BPF_REG_0, 0),
  11262. BPF_EXIT_INSN(),
  11263. /* subprog 1 */
  11264. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  11265. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  11266. /* 1st lookup from map */
  11267. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11268. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11269. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11270. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11271. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11272. BPF_FUNC_map_lookup_elem),
  11273. /* write map_value_ptr_or_null into stack frame of main prog at fp-8 */
  11274. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  11275. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11276. BPF_MOV64_IMM(BPF_REG_8, 0),
  11277. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  11278. BPF_MOV64_IMM(BPF_REG_8, 1),
  11279. /* 2nd lookup from map */
  11280. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11281. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11282. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11283. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11284. BPF_FUNC_map_lookup_elem),
  11285. /* write map_value_ptr_or_null into stack frame of main prog at fp-16 */
  11286. BPF_STX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
  11287. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11288. BPF_MOV64_IMM(BPF_REG_9, 0),
  11289. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  11290. BPF_MOV64_IMM(BPF_REG_9, 1),
  11291. /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
  11292. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  11293. BPF_MOV64_REG(BPF_REG_2, BPF_REG_8),
  11294. BPF_MOV64_REG(BPF_REG_3, BPF_REG_7),
  11295. BPF_MOV64_REG(BPF_REG_4, BPF_REG_9),
  11296. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  11297. BPF_EXIT_INSN(),
  11298. /* subprog 2 */
  11299. /* if arg2 == 1 do *arg1 = 0 */
  11300. BPF_JMP_IMM(BPF_JNE, BPF_REG_2, 1, 2),
  11301. /* fetch map_value_ptr from the stack of this function */
  11302. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 0),
  11303. /* write into map value */
  11304. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11305. /* if arg4 == 1 do *arg3 = 0 */
  11306. BPF_JMP_IMM(BPF_JNE, BPF_REG_4, 1, 2),
  11307. /* fetch map_value_ptr from the stack of this function */
  11308. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_3, 0),
  11309. /* write into map value */
  11310. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11311. BPF_EXIT_INSN(),
  11312. },
  11313. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11314. .fixup_map1 = { 12, 22 },
  11315. .result = ACCEPT,
  11316. },
  11317. {
  11318. "calls: two calls that receive map_value_ptr_or_null via arg. test2",
  11319. .insns = {
  11320. /* main prog */
  11321. /* pass fp-16, fp-8 into a function */
  11322. BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
  11323. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
  11324. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11325. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
  11326. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 2),
  11327. BPF_MOV64_IMM(BPF_REG_0, 0),
  11328. BPF_EXIT_INSN(),
  11329. /* subprog 1 */
  11330. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  11331. BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
  11332. /* 1st lookup from map */
  11333. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11334. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11335. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11336. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11337. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11338. BPF_FUNC_map_lookup_elem),
  11339. /* write map_value_ptr_or_null into stack frame of main prog at fp-8 */
  11340. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  11341. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11342. BPF_MOV64_IMM(BPF_REG_8, 0),
  11343. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  11344. BPF_MOV64_IMM(BPF_REG_8, 1),
  11345. /* 2nd lookup from map */
  11346. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11347. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11348. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11349. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11350. BPF_FUNC_map_lookup_elem),
  11351. /* write map_value_ptr_or_null into stack frame of main prog at fp-16 */
  11352. BPF_STX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
  11353. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  11354. BPF_MOV64_IMM(BPF_REG_9, 0),
  11355. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  11356. BPF_MOV64_IMM(BPF_REG_9, 1),
  11357. /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
  11358. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  11359. BPF_MOV64_REG(BPF_REG_2, BPF_REG_8),
  11360. BPF_MOV64_REG(BPF_REG_3, BPF_REG_7),
  11361. BPF_MOV64_REG(BPF_REG_4, BPF_REG_9),
  11362. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  11363. BPF_EXIT_INSN(),
  11364. /* subprog 2 */
  11365. /* if arg2 == 1 do *arg1 = 0 */
  11366. BPF_JMP_IMM(BPF_JNE, BPF_REG_2, 1, 2),
  11367. /* fetch map_value_ptr from the stack of this function */
  11368. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 0),
  11369. /* write into map value */
  11370. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11371. /* if arg4 == 0 do *arg3 = 0 */
  11372. BPF_JMP_IMM(BPF_JNE, BPF_REG_4, 0, 2),
  11373. /* fetch map_value_ptr from the stack of this function */
  11374. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_3, 0),
  11375. /* write into map value */
  11376. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
  11377. BPF_EXIT_INSN(),
  11378. },
  11379. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11380. .fixup_map1 = { 12, 22 },
  11381. .result = REJECT,
  11382. .errstr = "R0 invalid mem access 'inv'",
  11383. },
  11384. {
  11385. "calls: pkt_ptr spill into caller stack",
  11386. .insns = {
  11387. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11388. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11389. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 1),
  11390. BPF_EXIT_INSN(),
  11391. /* subprog 1 */
  11392. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11393. offsetof(struct __sk_buff, data)),
  11394. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11395. offsetof(struct __sk_buff, data_end)),
  11396. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11397. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11398. /* spill unchecked pkt_ptr into stack of caller */
  11399. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11400. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 2),
  11401. /* now the pkt range is verified, read pkt_ptr from stack */
  11402. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_4, 0),
  11403. /* write 4 bytes into packet */
  11404. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11405. BPF_EXIT_INSN(),
  11406. },
  11407. .result = ACCEPT,
  11408. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11409. .retval = POINTER_VALUE,
  11410. },
  11411. {
  11412. "calls: pkt_ptr spill into caller stack 2",
  11413. .insns = {
  11414. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11415. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11416. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  11417. /* Marking is still kept, but not in all cases safe. */
  11418. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  11419. BPF_ST_MEM(BPF_W, BPF_REG_4, 0, 0),
  11420. BPF_EXIT_INSN(),
  11421. /* subprog 1 */
  11422. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11423. offsetof(struct __sk_buff, data)),
  11424. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11425. offsetof(struct __sk_buff, data_end)),
  11426. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11427. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11428. /* spill unchecked pkt_ptr into stack of caller */
  11429. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11430. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 2),
  11431. /* now the pkt range is verified, read pkt_ptr from stack */
  11432. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_4, 0),
  11433. /* write 4 bytes into packet */
  11434. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11435. BPF_EXIT_INSN(),
  11436. },
  11437. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11438. .errstr = "invalid access to packet",
  11439. .result = REJECT,
  11440. },
  11441. {
  11442. "calls: pkt_ptr spill into caller stack 3",
  11443. .insns = {
  11444. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11445. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11446. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  11447. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  11448. /* Marking is still kept and safe here. */
  11449. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  11450. BPF_ST_MEM(BPF_W, BPF_REG_4, 0, 0),
  11451. BPF_EXIT_INSN(),
  11452. /* subprog 1 */
  11453. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11454. offsetof(struct __sk_buff, data)),
  11455. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11456. offsetof(struct __sk_buff, data_end)),
  11457. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11458. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11459. /* spill unchecked pkt_ptr into stack of caller */
  11460. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11461. BPF_MOV64_IMM(BPF_REG_5, 0),
  11462. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 3),
  11463. BPF_MOV64_IMM(BPF_REG_5, 1),
  11464. /* now the pkt range is verified, read pkt_ptr from stack */
  11465. BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_4, 0),
  11466. /* write 4 bytes into packet */
  11467. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11468. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  11469. BPF_EXIT_INSN(),
  11470. },
  11471. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11472. .result = ACCEPT,
  11473. .retval = 1,
  11474. },
  11475. {
  11476. "calls: pkt_ptr spill into caller stack 4",
  11477. .insns = {
  11478. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11479. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11480. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  11481. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  11482. /* Check marking propagated. */
  11483. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  11484. BPF_ST_MEM(BPF_W, BPF_REG_4, 0, 0),
  11485. BPF_EXIT_INSN(),
  11486. /* subprog 1 */
  11487. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11488. offsetof(struct __sk_buff, data)),
  11489. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11490. offsetof(struct __sk_buff, data_end)),
  11491. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11492. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11493. /* spill unchecked pkt_ptr into stack of caller */
  11494. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11495. BPF_MOV64_IMM(BPF_REG_5, 0),
  11496. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 2),
  11497. BPF_MOV64_IMM(BPF_REG_5, 1),
  11498. /* don't read back pkt_ptr from stack here */
  11499. /* write 4 bytes into packet */
  11500. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11501. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  11502. BPF_EXIT_INSN(),
  11503. },
  11504. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11505. .result = ACCEPT,
  11506. .retval = 1,
  11507. },
  11508. {
  11509. "calls: pkt_ptr spill into caller stack 5",
  11510. .insns = {
  11511. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11512. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11513. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_1, 0),
  11514. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  11515. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  11516. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_4, 0),
  11517. BPF_EXIT_INSN(),
  11518. /* subprog 1 */
  11519. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11520. offsetof(struct __sk_buff, data)),
  11521. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11522. offsetof(struct __sk_buff, data_end)),
  11523. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11524. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11525. BPF_MOV64_IMM(BPF_REG_5, 0),
  11526. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 3),
  11527. /* spill checked pkt_ptr into stack of caller */
  11528. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11529. BPF_MOV64_IMM(BPF_REG_5, 1),
  11530. /* don't read back pkt_ptr from stack here */
  11531. /* write 4 bytes into packet */
  11532. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11533. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  11534. BPF_EXIT_INSN(),
  11535. },
  11536. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11537. .errstr = "same insn cannot be used with different",
  11538. .result = REJECT,
  11539. },
  11540. {
  11541. "calls: pkt_ptr spill into caller stack 6",
  11542. .insns = {
  11543. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11544. offsetof(struct __sk_buff, data_end)),
  11545. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11546. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11547. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11548. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  11549. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  11550. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_4, 0),
  11551. BPF_EXIT_INSN(),
  11552. /* subprog 1 */
  11553. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11554. offsetof(struct __sk_buff, data)),
  11555. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11556. offsetof(struct __sk_buff, data_end)),
  11557. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11558. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11559. BPF_MOV64_IMM(BPF_REG_5, 0),
  11560. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 3),
  11561. /* spill checked pkt_ptr into stack of caller */
  11562. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11563. BPF_MOV64_IMM(BPF_REG_5, 1),
  11564. /* don't read back pkt_ptr from stack here */
  11565. /* write 4 bytes into packet */
  11566. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11567. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  11568. BPF_EXIT_INSN(),
  11569. },
  11570. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11571. .errstr = "R4 invalid mem access",
  11572. .result = REJECT,
  11573. },
  11574. {
  11575. "calls: pkt_ptr spill into caller stack 7",
  11576. .insns = {
  11577. BPF_MOV64_IMM(BPF_REG_2, 0),
  11578. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11579. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11580. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11581. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  11582. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  11583. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_4, 0),
  11584. BPF_EXIT_INSN(),
  11585. /* subprog 1 */
  11586. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11587. offsetof(struct __sk_buff, data)),
  11588. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11589. offsetof(struct __sk_buff, data_end)),
  11590. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11591. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11592. BPF_MOV64_IMM(BPF_REG_5, 0),
  11593. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 3),
  11594. /* spill checked pkt_ptr into stack of caller */
  11595. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11596. BPF_MOV64_IMM(BPF_REG_5, 1),
  11597. /* don't read back pkt_ptr from stack here */
  11598. /* write 4 bytes into packet */
  11599. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11600. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  11601. BPF_EXIT_INSN(),
  11602. },
  11603. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11604. .errstr = "R4 invalid mem access",
  11605. .result = REJECT,
  11606. },
  11607. {
  11608. "calls: pkt_ptr spill into caller stack 8",
  11609. .insns = {
  11610. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11611. offsetof(struct __sk_buff, data)),
  11612. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11613. offsetof(struct __sk_buff, data_end)),
  11614. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11615. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11616. BPF_JMP_REG(BPF_JLE, BPF_REG_0, BPF_REG_3, 1),
  11617. BPF_EXIT_INSN(),
  11618. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11619. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11620. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11621. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  11622. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  11623. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_4, 0),
  11624. BPF_EXIT_INSN(),
  11625. /* subprog 1 */
  11626. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11627. offsetof(struct __sk_buff, data)),
  11628. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11629. offsetof(struct __sk_buff, data_end)),
  11630. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11631. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11632. BPF_MOV64_IMM(BPF_REG_5, 0),
  11633. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 3),
  11634. /* spill checked pkt_ptr into stack of caller */
  11635. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11636. BPF_MOV64_IMM(BPF_REG_5, 1),
  11637. /* don't read back pkt_ptr from stack here */
  11638. /* write 4 bytes into packet */
  11639. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11640. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  11641. BPF_EXIT_INSN(),
  11642. },
  11643. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11644. .result = ACCEPT,
  11645. },
  11646. {
  11647. "calls: pkt_ptr spill into caller stack 9",
  11648. .insns = {
  11649. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11650. offsetof(struct __sk_buff, data)),
  11651. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11652. offsetof(struct __sk_buff, data_end)),
  11653. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11654. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11655. BPF_JMP_REG(BPF_JLE, BPF_REG_0, BPF_REG_3, 1),
  11656. BPF_EXIT_INSN(),
  11657. BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
  11658. BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
  11659. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11660. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 3),
  11661. BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
  11662. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_4, 0),
  11663. BPF_EXIT_INSN(),
  11664. /* subprog 1 */
  11665. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  11666. offsetof(struct __sk_buff, data)),
  11667. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  11668. offsetof(struct __sk_buff, data_end)),
  11669. BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
  11670. BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
  11671. BPF_MOV64_IMM(BPF_REG_5, 0),
  11672. /* spill unchecked pkt_ptr into stack of caller */
  11673. BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
  11674. BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 2),
  11675. BPF_MOV64_IMM(BPF_REG_5, 1),
  11676. /* don't read back pkt_ptr from stack here */
  11677. /* write 4 bytes into packet */
  11678. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  11679. BPF_MOV64_REG(BPF_REG_0, BPF_REG_5),
  11680. BPF_EXIT_INSN(),
  11681. },
  11682. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11683. .errstr = "invalid access to packet",
  11684. .result = REJECT,
  11685. },
  11686. {
  11687. "calls: caller stack init to zero or map_value_or_null",
  11688. .insns = {
  11689. BPF_MOV64_IMM(BPF_REG_0, 0),
  11690. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  11691. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11692. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11693. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, 4),
  11694. /* fetch map_value_or_null or const_zero from stack */
  11695. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  11696. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
  11697. /* store into map_value */
  11698. BPF_ST_MEM(BPF_W, BPF_REG_0, 0, 0),
  11699. BPF_EXIT_INSN(),
  11700. /* subprog 1 */
  11701. /* if (ctx == 0) return; */
  11702. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 8),
  11703. /* else bpf_map_lookup() and *(fp - 8) = r0 */
  11704. BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
  11705. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11706. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11707. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11708. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11709. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11710. BPF_FUNC_map_lookup_elem),
  11711. /* write map_value_ptr_or_null into stack frame of main prog at fp-8 */
  11712. BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_0, 0),
  11713. BPF_EXIT_INSN(),
  11714. },
  11715. .fixup_map1 = { 13 },
  11716. .result = ACCEPT,
  11717. .prog_type = BPF_PROG_TYPE_XDP,
  11718. },
  11719. {
  11720. "calls: stack init to zero and pruning",
  11721. .insns = {
  11722. /* first make allocated_stack 16 byte */
  11723. BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, 0),
  11724. /* now fork the execution such that the false branch
  11725. * of JGT insn will be verified second and it skisp zero
  11726. * init of fp-8 stack slot. If stack liveness marking
  11727. * is missing live_read marks from call map_lookup
  11728. * processing then pruning will incorrectly assume
  11729. * that fp-8 stack slot was unused in the fall-through
  11730. * branch and will accept the program incorrectly
  11731. */
  11732. BPF_JMP_IMM(BPF_JGT, BPF_REG_1, 2, 2),
  11733. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11734. BPF_JMP_IMM(BPF_JA, 0, 0, 0),
  11735. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11736. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11737. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11738. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11739. BPF_FUNC_map_lookup_elem),
  11740. BPF_EXIT_INSN(),
  11741. },
  11742. .fixup_map2 = { 6 },
  11743. .errstr = "invalid indirect read from stack off -8+0 size 8",
  11744. .result = REJECT,
  11745. .prog_type = BPF_PROG_TYPE_XDP,
  11746. },
  11747. {
  11748. "calls: two calls returning different map pointers for lookup (hash, array)",
  11749. .insns = {
  11750. /* main prog */
  11751. BPF_JMP_IMM(BPF_JNE, BPF_REG_1, 0, 2),
  11752. BPF_CALL_REL(11),
  11753. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  11754. BPF_CALL_REL(12),
  11755. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  11756. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11757. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11758. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11759. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11760. BPF_FUNC_map_lookup_elem),
  11761. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  11762. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  11763. offsetof(struct test_val, foo)),
  11764. BPF_MOV64_IMM(BPF_REG_0, 1),
  11765. BPF_EXIT_INSN(),
  11766. /* subprog 1 */
  11767. BPF_LD_MAP_FD(BPF_REG_0, 0),
  11768. BPF_EXIT_INSN(),
  11769. /* subprog 2 */
  11770. BPF_LD_MAP_FD(BPF_REG_0, 0),
  11771. BPF_EXIT_INSN(),
  11772. },
  11773. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11774. .fixup_map2 = { 13 },
  11775. .fixup_map4 = { 16 },
  11776. .result = ACCEPT,
  11777. .retval = 1,
  11778. },
  11779. {
  11780. "calls: two calls returning different map pointers for lookup (hash, map in map)",
  11781. .insns = {
  11782. /* main prog */
  11783. BPF_JMP_IMM(BPF_JNE, BPF_REG_1, 0, 2),
  11784. BPF_CALL_REL(11),
  11785. BPF_JMP_IMM(BPF_JA, 0, 0, 1),
  11786. BPF_CALL_REL(12),
  11787. BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
  11788. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  11789. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11790. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11791. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11792. BPF_FUNC_map_lookup_elem),
  11793. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
  11794. BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
  11795. offsetof(struct test_val, foo)),
  11796. BPF_MOV64_IMM(BPF_REG_0, 1),
  11797. BPF_EXIT_INSN(),
  11798. /* subprog 1 */
  11799. BPF_LD_MAP_FD(BPF_REG_0, 0),
  11800. BPF_EXIT_INSN(),
  11801. /* subprog 2 */
  11802. BPF_LD_MAP_FD(BPF_REG_0, 0),
  11803. BPF_EXIT_INSN(),
  11804. },
  11805. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  11806. .fixup_map_in_map = { 16 },
  11807. .fixup_map4 = { 13 },
  11808. .result = REJECT,
  11809. .errstr = "R0 invalid mem access 'map_ptr'",
  11810. },
  11811. {
  11812. "cond: two branches returning different map pointers for lookup (tail, tail)",
  11813. .insns = {
  11814. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  11815. offsetof(struct __sk_buff, mark)),
  11816. BPF_JMP_IMM(BPF_JNE, BPF_REG_6, 0, 3),
  11817. BPF_LD_MAP_FD(BPF_REG_2, 0),
  11818. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  11819. BPF_LD_MAP_FD(BPF_REG_2, 0),
  11820. BPF_MOV64_IMM(BPF_REG_3, 7),
  11821. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11822. BPF_FUNC_tail_call),
  11823. BPF_MOV64_IMM(BPF_REG_0, 1),
  11824. BPF_EXIT_INSN(),
  11825. },
  11826. .fixup_prog1 = { 5 },
  11827. .fixup_prog2 = { 2 },
  11828. .result_unpriv = REJECT,
  11829. .errstr_unpriv = "tail_call abusing map_ptr",
  11830. .result = ACCEPT,
  11831. .retval = 42,
  11832. },
  11833. {
  11834. "cond: two branches returning same map pointers for lookup (tail, tail)",
  11835. .insns = {
  11836. BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
  11837. offsetof(struct __sk_buff, mark)),
  11838. BPF_JMP_IMM(BPF_JEQ, BPF_REG_6, 0, 3),
  11839. BPF_LD_MAP_FD(BPF_REG_2, 0),
  11840. BPF_JMP_IMM(BPF_JA, 0, 0, 2),
  11841. BPF_LD_MAP_FD(BPF_REG_2, 0),
  11842. BPF_MOV64_IMM(BPF_REG_3, 7),
  11843. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  11844. BPF_FUNC_tail_call),
  11845. BPF_MOV64_IMM(BPF_REG_0, 1),
  11846. BPF_EXIT_INSN(),
  11847. },
  11848. .fixup_prog2 = { 2, 5 },
  11849. .result_unpriv = ACCEPT,
  11850. .result = ACCEPT,
  11851. .retval = 42,
  11852. },
  11853. {
  11854. "search pruning: all branches should be verified (nop operation)",
  11855. .insns = {
  11856. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11857. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11858. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  11859. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11860. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  11861. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
  11862. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
  11863. BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2),
  11864. BPF_MOV64_IMM(BPF_REG_4, 0),
  11865. BPF_JMP_A(1),
  11866. BPF_MOV64_IMM(BPF_REG_4, 1),
  11867. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16),
  11868. BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
  11869. BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16),
  11870. BPF_JMP_IMM(BPF_JEQ, BPF_REG_5, 0, 2),
  11871. BPF_MOV64_IMM(BPF_REG_6, 0),
  11872. BPF_ST_MEM(BPF_DW, BPF_REG_6, 0, 0xdead),
  11873. BPF_EXIT_INSN(),
  11874. },
  11875. .fixup_map1 = { 3 },
  11876. .errstr = "R6 invalid mem access 'inv'",
  11877. .result = REJECT,
  11878. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  11879. },
  11880. {
  11881. "search pruning: all branches should be verified (invalid stack access)",
  11882. .insns = {
  11883. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  11884. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  11885. BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
  11886. BPF_LD_MAP_FD(BPF_REG_1, 0),
  11887. BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
  11888. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
  11889. BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
  11890. BPF_MOV64_IMM(BPF_REG_4, 0),
  11891. BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2),
  11892. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16),
  11893. BPF_JMP_A(1),
  11894. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -24),
  11895. BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
  11896. BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16),
  11897. BPF_EXIT_INSN(),
  11898. },
  11899. .fixup_map1 = { 3 },
  11900. .errstr = "invalid read from stack off -16+0 size 8",
  11901. .result = REJECT,
  11902. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  11903. },
  11904. {
  11905. "jit: lsh, rsh, arsh by 1",
  11906. .insns = {
  11907. BPF_MOV64_IMM(BPF_REG_0, 1),
  11908. BPF_MOV64_IMM(BPF_REG_1, 0xff),
  11909. BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 1),
  11910. BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 1),
  11911. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0x3fc, 1),
  11912. BPF_EXIT_INSN(),
  11913. BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 1),
  11914. BPF_ALU32_IMM(BPF_RSH, BPF_REG_1, 1),
  11915. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0xff, 1),
  11916. BPF_EXIT_INSN(),
  11917. BPF_ALU64_IMM(BPF_ARSH, BPF_REG_1, 1),
  11918. BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0x7f, 1),
  11919. BPF_EXIT_INSN(),
  11920. BPF_MOV64_IMM(BPF_REG_0, 2),
  11921. BPF_EXIT_INSN(),
  11922. },
  11923. .result = ACCEPT,
  11924. .retval = 2,
  11925. },
  11926. {
  11927. "jit: mov32 for ldimm64, 1",
  11928. .insns = {
  11929. BPF_MOV64_IMM(BPF_REG_0, 2),
  11930. BPF_LD_IMM64(BPF_REG_1, 0xfeffffffffffffffULL),
  11931. BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 32),
  11932. BPF_LD_IMM64(BPF_REG_2, 0xfeffffffULL),
  11933. BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_2, 1),
  11934. BPF_MOV64_IMM(BPF_REG_0, 1),
  11935. BPF_EXIT_INSN(),
  11936. },
  11937. .result = ACCEPT,
  11938. .retval = 2,
  11939. },
  11940. {
  11941. "jit: mov32 for ldimm64, 2",
  11942. .insns = {
  11943. BPF_MOV64_IMM(BPF_REG_0, 1),
  11944. BPF_LD_IMM64(BPF_REG_1, 0x1ffffffffULL),
  11945. BPF_LD_IMM64(BPF_REG_2, 0xffffffffULL),
  11946. BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_2, 1),
  11947. BPF_MOV64_IMM(BPF_REG_0, 2),
  11948. BPF_EXIT_INSN(),
  11949. },
  11950. .result = ACCEPT,
  11951. .retval = 2,
  11952. },
  11953. {
  11954. "jit: various mul tests",
  11955. .insns = {
  11956. BPF_LD_IMM64(BPF_REG_2, 0xeeff0d413122ULL),
  11957. BPF_LD_IMM64(BPF_REG_0, 0xfefefeULL),
  11958. BPF_LD_IMM64(BPF_REG_1, 0xefefefULL),
  11959. BPF_ALU64_REG(BPF_MUL, BPF_REG_0, BPF_REG_1),
  11960. BPF_JMP_REG(BPF_JEQ, BPF_REG_0, BPF_REG_2, 2),
  11961. BPF_MOV64_IMM(BPF_REG_0, 1),
  11962. BPF_EXIT_INSN(),
  11963. BPF_LD_IMM64(BPF_REG_3, 0xfefefeULL),
  11964. BPF_ALU64_REG(BPF_MUL, BPF_REG_3, BPF_REG_1),
  11965. BPF_JMP_REG(BPF_JEQ, BPF_REG_3, BPF_REG_2, 2),
  11966. BPF_MOV64_IMM(BPF_REG_0, 1),
  11967. BPF_EXIT_INSN(),
  11968. BPF_MOV32_REG(BPF_REG_2, BPF_REG_2),
  11969. BPF_LD_IMM64(BPF_REG_0, 0xfefefeULL),
  11970. BPF_ALU32_REG(BPF_MUL, BPF_REG_0, BPF_REG_1),
  11971. BPF_JMP_REG(BPF_JEQ, BPF_REG_0, BPF_REG_2, 2),
  11972. BPF_MOV64_IMM(BPF_REG_0, 1),
  11973. BPF_EXIT_INSN(),
  11974. BPF_LD_IMM64(BPF_REG_3, 0xfefefeULL),
  11975. BPF_ALU32_REG(BPF_MUL, BPF_REG_3, BPF_REG_1),
  11976. BPF_JMP_REG(BPF_JEQ, BPF_REG_3, BPF_REG_2, 2),
  11977. BPF_MOV64_IMM(BPF_REG_0, 1),
  11978. BPF_EXIT_INSN(),
  11979. BPF_LD_IMM64(BPF_REG_0, 0x952a7bbcULL),
  11980. BPF_LD_IMM64(BPF_REG_1, 0xfefefeULL),
  11981. BPF_LD_IMM64(BPF_REG_2, 0xeeff0d413122ULL),
  11982. BPF_ALU32_REG(BPF_MUL, BPF_REG_2, BPF_REG_1),
  11983. BPF_JMP_REG(BPF_JEQ, BPF_REG_2, BPF_REG_0, 2),
  11984. BPF_MOV64_IMM(BPF_REG_0, 1),
  11985. BPF_EXIT_INSN(),
  11986. BPF_MOV64_IMM(BPF_REG_0, 2),
  11987. BPF_EXIT_INSN(),
  11988. },
  11989. .result = ACCEPT,
  11990. .retval = 2,
  11991. },
  11992. {
  11993. "xadd/w check unaligned stack",
  11994. .insns = {
  11995. BPF_MOV64_IMM(BPF_REG_0, 1),
  11996. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  11997. BPF_STX_XADD(BPF_W, BPF_REG_10, BPF_REG_0, -7),
  11998. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  11999. BPF_EXIT_INSN(),
  12000. },
  12001. .result = REJECT,
  12002. .errstr = "misaligned stack access off",
  12003. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12004. },
  12005. {
  12006. "xadd/w check unaligned map",
  12007. .insns = {
  12008. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  12009. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  12010. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  12011. BPF_LD_MAP_FD(BPF_REG_1, 0),
  12012. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  12013. BPF_FUNC_map_lookup_elem),
  12014. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
  12015. BPF_EXIT_INSN(),
  12016. BPF_MOV64_IMM(BPF_REG_1, 1),
  12017. BPF_STX_XADD(BPF_W, BPF_REG_0, BPF_REG_1, 3),
  12018. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0, 3),
  12019. BPF_EXIT_INSN(),
  12020. },
  12021. .fixup_map1 = { 3 },
  12022. .result = REJECT,
  12023. .errstr = "misaligned value access off",
  12024. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12025. },
  12026. {
  12027. "xadd/w check unaligned pkt",
  12028. .insns = {
  12029. BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
  12030. offsetof(struct xdp_md, data)),
  12031. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
  12032. offsetof(struct xdp_md, data_end)),
  12033. BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
  12034. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
  12035. BPF_JMP_REG(BPF_JLT, BPF_REG_1, BPF_REG_3, 2),
  12036. BPF_MOV64_IMM(BPF_REG_0, 99),
  12037. BPF_JMP_IMM(BPF_JA, 0, 0, 6),
  12038. BPF_MOV64_IMM(BPF_REG_0, 1),
  12039. BPF_ST_MEM(BPF_W, BPF_REG_2, 0, 0),
  12040. BPF_ST_MEM(BPF_W, BPF_REG_2, 3, 0),
  12041. BPF_STX_XADD(BPF_W, BPF_REG_2, BPF_REG_0, 1),
  12042. BPF_STX_XADD(BPF_W, BPF_REG_2, BPF_REG_0, 2),
  12043. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_2, 1),
  12044. BPF_EXIT_INSN(),
  12045. },
  12046. .result = REJECT,
  12047. .errstr = "BPF_XADD stores into R2 packet",
  12048. .prog_type = BPF_PROG_TYPE_XDP,
  12049. },
  12050. {
  12051. "xadd/w check whether src/dst got mangled, 1",
  12052. .insns = {
  12053. BPF_MOV64_IMM(BPF_REG_0, 1),
  12054. BPF_MOV64_REG(BPF_REG_6, BPF_REG_0),
  12055. BPF_MOV64_REG(BPF_REG_7, BPF_REG_10),
  12056. BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  12057. BPF_STX_XADD(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  12058. BPF_STX_XADD(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
  12059. BPF_JMP_REG(BPF_JNE, BPF_REG_6, BPF_REG_0, 3),
  12060. BPF_JMP_REG(BPF_JNE, BPF_REG_7, BPF_REG_10, 2),
  12061. BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
  12062. BPF_EXIT_INSN(),
  12063. BPF_MOV64_IMM(BPF_REG_0, 42),
  12064. BPF_EXIT_INSN(),
  12065. },
  12066. .result = ACCEPT,
  12067. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12068. .retval = 3,
  12069. },
  12070. {
  12071. "xadd/w check whether src/dst got mangled, 2",
  12072. .insns = {
  12073. BPF_MOV64_IMM(BPF_REG_0, 1),
  12074. BPF_MOV64_REG(BPF_REG_6, BPF_REG_0),
  12075. BPF_MOV64_REG(BPF_REG_7, BPF_REG_10),
  12076. BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -8),
  12077. BPF_STX_XADD(BPF_W, BPF_REG_10, BPF_REG_0, -8),
  12078. BPF_STX_XADD(BPF_W, BPF_REG_10, BPF_REG_0, -8),
  12079. BPF_JMP_REG(BPF_JNE, BPF_REG_6, BPF_REG_0, 3),
  12080. BPF_JMP_REG(BPF_JNE, BPF_REG_7, BPF_REG_10, 2),
  12081. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_10, -8),
  12082. BPF_EXIT_INSN(),
  12083. BPF_MOV64_IMM(BPF_REG_0, 42),
  12084. BPF_EXIT_INSN(),
  12085. },
  12086. .result = ACCEPT,
  12087. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12088. .retval = 3,
  12089. },
  12090. {
  12091. "bpf_get_stack return R0 within range",
  12092. .insns = {
  12093. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  12094. BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
  12095. BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
  12096. BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
  12097. BPF_LD_MAP_FD(BPF_REG_1, 0),
  12098. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  12099. BPF_FUNC_map_lookup_elem),
  12100. BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 28),
  12101. BPF_MOV64_REG(BPF_REG_7, BPF_REG_0),
  12102. BPF_MOV64_IMM(BPF_REG_9, sizeof(struct test_val)),
  12103. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  12104. BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
  12105. BPF_MOV64_IMM(BPF_REG_3, sizeof(struct test_val)),
  12106. BPF_MOV64_IMM(BPF_REG_4, 256),
  12107. BPF_EMIT_CALL(BPF_FUNC_get_stack),
  12108. BPF_MOV64_IMM(BPF_REG_1, 0),
  12109. BPF_MOV64_REG(BPF_REG_8, BPF_REG_0),
  12110. BPF_ALU64_IMM(BPF_LSH, BPF_REG_8, 32),
  12111. BPF_ALU64_IMM(BPF_ARSH, BPF_REG_8, 32),
  12112. BPF_JMP_REG(BPF_JSLT, BPF_REG_1, BPF_REG_8, 16),
  12113. BPF_ALU64_REG(BPF_SUB, BPF_REG_9, BPF_REG_8),
  12114. BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
  12115. BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_8),
  12116. BPF_MOV64_REG(BPF_REG_1, BPF_REG_9),
  12117. BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 32),
  12118. BPF_ALU64_IMM(BPF_ARSH, BPF_REG_1, 32),
  12119. BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
  12120. BPF_ALU64_REG(BPF_ADD, BPF_REG_3, BPF_REG_1),
  12121. BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
  12122. BPF_MOV64_IMM(BPF_REG_5, sizeof(struct test_val)),
  12123. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_5),
  12124. BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_1, 4),
  12125. BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
  12126. BPF_MOV64_REG(BPF_REG_3, BPF_REG_9),
  12127. BPF_MOV64_IMM(BPF_REG_4, 0),
  12128. BPF_EMIT_CALL(BPF_FUNC_get_stack),
  12129. BPF_EXIT_INSN(),
  12130. },
  12131. .fixup_map2 = { 4 },
  12132. .result = ACCEPT,
  12133. .prog_type = BPF_PROG_TYPE_TRACEPOINT,
  12134. },
  12135. {
  12136. "ld_abs: invalid op 1",
  12137. .insns = {
  12138. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  12139. BPF_LD_ABS(BPF_DW, 0),
  12140. BPF_EXIT_INSN(),
  12141. },
  12142. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12143. .result = REJECT,
  12144. .errstr = "unknown opcode",
  12145. },
  12146. {
  12147. "ld_abs: invalid op 2",
  12148. .insns = {
  12149. BPF_MOV32_IMM(BPF_REG_0, 256),
  12150. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  12151. BPF_LD_IND(BPF_DW, BPF_REG_0, 0),
  12152. BPF_EXIT_INSN(),
  12153. },
  12154. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12155. .result = REJECT,
  12156. .errstr = "unknown opcode",
  12157. },
  12158. {
  12159. "ld_abs: nmap reduced",
  12160. .insns = {
  12161. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  12162. BPF_LD_ABS(BPF_H, 12),
  12163. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0x806, 28),
  12164. BPF_LD_ABS(BPF_H, 12),
  12165. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0x806, 26),
  12166. BPF_MOV32_IMM(BPF_REG_0, 18),
  12167. BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -64),
  12168. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_10, -64),
  12169. BPF_LD_IND(BPF_W, BPF_REG_7, 14),
  12170. BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -60),
  12171. BPF_MOV32_IMM(BPF_REG_0, 280971478),
  12172. BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -56),
  12173. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_10, -56),
  12174. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_10, -60),
  12175. BPF_ALU32_REG(BPF_SUB, BPF_REG_0, BPF_REG_7),
  12176. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 15),
  12177. BPF_LD_ABS(BPF_H, 12),
  12178. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0x806, 13),
  12179. BPF_MOV32_IMM(BPF_REG_0, 22),
  12180. BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -56),
  12181. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_10, -56),
  12182. BPF_LD_IND(BPF_H, BPF_REG_7, 14),
  12183. BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -52),
  12184. BPF_MOV32_IMM(BPF_REG_0, 17366),
  12185. BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_0, -48),
  12186. BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_10, -48),
  12187. BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_10, -52),
  12188. BPF_ALU32_REG(BPF_SUB, BPF_REG_0, BPF_REG_7),
  12189. BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
  12190. BPF_MOV32_IMM(BPF_REG_0, 256),
  12191. BPF_EXIT_INSN(),
  12192. BPF_MOV32_IMM(BPF_REG_0, 0),
  12193. BPF_EXIT_INSN(),
  12194. },
  12195. .data = {
  12196. 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0x08, 0x06, 0,
  12197. 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
  12198. 0x10, 0xbf, 0x48, 0xd6, 0x43, 0xd6,
  12199. },
  12200. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12201. .result = ACCEPT,
  12202. .retval = 256,
  12203. },
  12204. {
  12205. "ld_abs: div + abs, test 1",
  12206. .insns = {
  12207. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
  12208. BPF_LD_ABS(BPF_B, 3),
  12209. BPF_ALU64_IMM(BPF_MOV, BPF_REG_2, 2),
  12210. BPF_ALU32_REG(BPF_DIV, BPF_REG_0, BPF_REG_2),
  12211. BPF_ALU64_REG(BPF_MOV, BPF_REG_8, BPF_REG_0),
  12212. BPF_LD_ABS(BPF_B, 4),
  12213. BPF_ALU64_REG(BPF_ADD, BPF_REG_8, BPF_REG_0),
  12214. BPF_LD_IND(BPF_B, BPF_REG_8, -70),
  12215. BPF_EXIT_INSN(),
  12216. },
  12217. .data = {
  12218. 10, 20, 30, 40, 50,
  12219. },
  12220. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12221. .result = ACCEPT,
  12222. .retval = 10,
  12223. },
  12224. {
  12225. "ld_abs: div + abs, test 2",
  12226. .insns = {
  12227. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
  12228. BPF_LD_ABS(BPF_B, 3),
  12229. BPF_ALU64_IMM(BPF_MOV, BPF_REG_2, 2),
  12230. BPF_ALU32_REG(BPF_DIV, BPF_REG_0, BPF_REG_2),
  12231. BPF_ALU64_REG(BPF_MOV, BPF_REG_8, BPF_REG_0),
  12232. BPF_LD_ABS(BPF_B, 128),
  12233. BPF_ALU64_REG(BPF_ADD, BPF_REG_8, BPF_REG_0),
  12234. BPF_LD_IND(BPF_B, BPF_REG_8, -70),
  12235. BPF_EXIT_INSN(),
  12236. },
  12237. .data = {
  12238. 10, 20, 30, 40, 50,
  12239. },
  12240. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12241. .result = ACCEPT,
  12242. .retval = 0,
  12243. },
  12244. {
  12245. "ld_abs: div + abs, test 3",
  12246. .insns = {
  12247. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
  12248. BPF_ALU64_IMM(BPF_MOV, BPF_REG_7, 0),
  12249. BPF_LD_ABS(BPF_B, 3),
  12250. BPF_ALU32_REG(BPF_DIV, BPF_REG_0, BPF_REG_7),
  12251. BPF_EXIT_INSN(),
  12252. },
  12253. .data = {
  12254. 10, 20, 30, 40, 50,
  12255. },
  12256. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12257. .result = ACCEPT,
  12258. .retval = 0,
  12259. },
  12260. {
  12261. "ld_abs: div + abs, test 4",
  12262. .insns = {
  12263. BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
  12264. BPF_ALU64_IMM(BPF_MOV, BPF_REG_7, 0),
  12265. BPF_LD_ABS(BPF_B, 256),
  12266. BPF_ALU32_REG(BPF_DIV, BPF_REG_0, BPF_REG_7),
  12267. BPF_EXIT_INSN(),
  12268. },
  12269. .data = {
  12270. 10, 20, 30, 40, 50,
  12271. },
  12272. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12273. .result = ACCEPT,
  12274. .retval = 0,
  12275. },
  12276. {
  12277. "ld_abs: vlan + abs, test 1",
  12278. .insns = { },
  12279. .data = {
  12280. 0x34,
  12281. },
  12282. .fill_helper = bpf_fill_ld_abs_vlan_push_pop,
  12283. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12284. .result = ACCEPT,
  12285. .retval = 0xbef,
  12286. },
  12287. {
  12288. "ld_abs: vlan + abs, test 2",
  12289. .insns = {
  12290. BPF_MOV64_REG(BPF_REG_6, BPF_REG_1),
  12291. BPF_LD_ABS(BPF_B, 0),
  12292. BPF_LD_ABS(BPF_H, 0),
  12293. BPF_LD_ABS(BPF_W, 0),
  12294. BPF_MOV64_REG(BPF_REG_7, BPF_REG_6),
  12295. BPF_MOV64_IMM(BPF_REG_6, 0),
  12296. BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
  12297. BPF_MOV64_IMM(BPF_REG_2, 1),
  12298. BPF_MOV64_IMM(BPF_REG_3, 2),
  12299. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  12300. BPF_FUNC_skb_vlan_push),
  12301. BPF_MOV64_REG(BPF_REG_6, BPF_REG_7),
  12302. BPF_LD_ABS(BPF_B, 0),
  12303. BPF_LD_ABS(BPF_H, 0),
  12304. BPF_LD_ABS(BPF_W, 0),
  12305. BPF_MOV64_IMM(BPF_REG_0, 42),
  12306. BPF_EXIT_INSN(),
  12307. },
  12308. .data = {
  12309. 0x34,
  12310. },
  12311. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12312. .result = ACCEPT,
  12313. .retval = 42,
  12314. },
  12315. {
  12316. "ld_abs: jump around ld_abs",
  12317. .insns = { },
  12318. .data = {
  12319. 10, 11,
  12320. },
  12321. .fill_helper = bpf_fill_jump_around_ld_abs,
  12322. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12323. .result = ACCEPT,
  12324. .retval = 10,
  12325. },
  12326. {
  12327. "ld_dw: xor semi-random 64 bit imms, test 1",
  12328. .insns = { },
  12329. .data = { },
  12330. .fill_helper = bpf_fill_rand_ld_dw,
  12331. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12332. .result = ACCEPT,
  12333. .retval = 4090,
  12334. },
  12335. {
  12336. "ld_dw: xor semi-random 64 bit imms, test 2",
  12337. .insns = { },
  12338. .data = { },
  12339. .fill_helper = bpf_fill_rand_ld_dw,
  12340. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12341. .result = ACCEPT,
  12342. .retval = 2047,
  12343. },
  12344. {
  12345. "ld_dw: xor semi-random 64 bit imms, test 3",
  12346. .insns = { },
  12347. .data = { },
  12348. .fill_helper = bpf_fill_rand_ld_dw,
  12349. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12350. .result = ACCEPT,
  12351. .retval = 511,
  12352. },
  12353. {
  12354. "ld_dw: xor semi-random 64 bit imms, test 4",
  12355. .insns = { },
  12356. .data = { },
  12357. .fill_helper = bpf_fill_rand_ld_dw,
  12358. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12359. .result = ACCEPT,
  12360. .retval = 5,
  12361. },
  12362. {
  12363. "pass unmodified ctx pointer to helper",
  12364. .insns = {
  12365. BPF_MOV64_IMM(BPF_REG_2, 0),
  12366. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  12367. BPF_FUNC_csum_update),
  12368. BPF_MOV64_IMM(BPF_REG_0, 0),
  12369. BPF_EXIT_INSN(),
  12370. },
  12371. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12372. .result = ACCEPT,
  12373. },
  12374. {
  12375. "pass modified ctx pointer to helper, 1",
  12376. .insns = {
  12377. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -612),
  12378. BPF_MOV64_IMM(BPF_REG_2, 0),
  12379. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  12380. BPF_FUNC_csum_update),
  12381. BPF_MOV64_IMM(BPF_REG_0, 0),
  12382. BPF_EXIT_INSN(),
  12383. },
  12384. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12385. .result = REJECT,
  12386. .errstr = "dereference of modified ctx ptr",
  12387. },
  12388. {
  12389. "pass modified ctx pointer to helper, 2",
  12390. .insns = {
  12391. BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -612),
  12392. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  12393. BPF_FUNC_get_socket_cookie),
  12394. BPF_MOV64_IMM(BPF_REG_0, 0),
  12395. BPF_EXIT_INSN(),
  12396. },
  12397. .result_unpriv = REJECT,
  12398. .result = REJECT,
  12399. .errstr_unpriv = "dereference of modified ctx ptr",
  12400. .errstr = "dereference of modified ctx ptr",
  12401. },
  12402. {
  12403. "pass modified ctx pointer to helper, 3",
  12404. .insns = {
  12405. BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1, 0),
  12406. BPF_ALU64_IMM(BPF_AND, BPF_REG_3, 4),
  12407. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
  12408. BPF_MOV64_IMM(BPF_REG_2, 0),
  12409. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  12410. BPF_FUNC_csum_update),
  12411. BPF_MOV64_IMM(BPF_REG_0, 0),
  12412. BPF_EXIT_INSN(),
  12413. },
  12414. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12415. .result = REJECT,
  12416. .errstr = "variable ctx access var_off=(0x0; 0x4)",
  12417. },
  12418. {
  12419. "mov64 src == dst",
  12420. .insns = {
  12421. BPF_MOV64_IMM(BPF_REG_2, 0),
  12422. BPF_MOV64_REG(BPF_REG_2, BPF_REG_2),
  12423. // Check bounds are OK
  12424. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2),
  12425. BPF_MOV64_IMM(BPF_REG_0, 0),
  12426. BPF_EXIT_INSN(),
  12427. },
  12428. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12429. .result = ACCEPT,
  12430. },
  12431. {
  12432. "mov64 src != dst",
  12433. .insns = {
  12434. BPF_MOV64_IMM(BPF_REG_3, 0),
  12435. BPF_MOV64_REG(BPF_REG_2, BPF_REG_3),
  12436. // Check bounds are OK
  12437. BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2),
  12438. BPF_MOV64_IMM(BPF_REG_0, 0),
  12439. BPF_EXIT_INSN(),
  12440. },
  12441. .prog_type = BPF_PROG_TYPE_SCHED_CLS,
  12442. .result = ACCEPT,
  12443. },
  12444. };
  12445. static int probe_filter_length(const struct bpf_insn *fp)
  12446. {
  12447. int len;
  12448. for (len = MAX_INSNS - 1; len > 0; --len)
  12449. if (fp[len].code != 0 || fp[len].imm != 0)
  12450. break;
  12451. return len + 1;
  12452. }
  12453. static int create_map(uint32_t type, uint32_t size_key,
  12454. uint32_t size_value, uint32_t max_elem)
  12455. {
  12456. int fd;
  12457. fd = bpf_create_map(type, size_key, size_value, max_elem,
  12458. type == BPF_MAP_TYPE_HASH ? BPF_F_NO_PREALLOC : 0);
  12459. if (fd < 0)
  12460. printf("Failed to create hash map '%s'!\n", strerror(errno));
  12461. return fd;
  12462. }
  12463. static int create_prog_dummy1(void)
  12464. {
  12465. struct bpf_insn prog[] = {
  12466. BPF_MOV64_IMM(BPF_REG_0, 42),
  12467. BPF_EXIT_INSN(),
  12468. };
  12469. return bpf_load_program(BPF_PROG_TYPE_SOCKET_FILTER, prog,
  12470. ARRAY_SIZE(prog), "GPL", 0, NULL, 0);
  12471. }
  12472. static int create_prog_dummy2(int mfd, int idx)
  12473. {
  12474. struct bpf_insn prog[] = {
  12475. BPF_MOV64_IMM(BPF_REG_3, idx),
  12476. BPF_LD_MAP_FD(BPF_REG_2, mfd),
  12477. BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
  12478. BPF_FUNC_tail_call),
  12479. BPF_MOV64_IMM(BPF_REG_0, 41),
  12480. BPF_EXIT_INSN(),
  12481. };
  12482. return bpf_load_program(BPF_PROG_TYPE_SOCKET_FILTER, prog,
  12483. ARRAY_SIZE(prog), "GPL", 0, NULL, 0);
  12484. }
  12485. static int create_prog_array(uint32_t max_elem, int p1key)
  12486. {
  12487. int p2key = 1;
  12488. int mfd, p1fd, p2fd;
  12489. mfd = bpf_create_map(BPF_MAP_TYPE_PROG_ARRAY, sizeof(int),
  12490. sizeof(int), max_elem, 0);
  12491. if (mfd < 0) {
  12492. printf("Failed to create prog array '%s'!\n", strerror(errno));
  12493. return -1;
  12494. }
  12495. p1fd = create_prog_dummy1();
  12496. p2fd = create_prog_dummy2(mfd, p2key);
  12497. if (p1fd < 0 || p2fd < 0)
  12498. goto out;
  12499. if (bpf_map_update_elem(mfd, &p1key, &p1fd, BPF_ANY) < 0)
  12500. goto out;
  12501. if (bpf_map_update_elem(mfd, &p2key, &p2fd, BPF_ANY) < 0)
  12502. goto out;
  12503. close(p2fd);
  12504. close(p1fd);
  12505. return mfd;
  12506. out:
  12507. close(p2fd);
  12508. close(p1fd);
  12509. close(mfd);
  12510. return -1;
  12511. }
  12512. static int create_map_in_map(void)
  12513. {
  12514. int inner_map_fd, outer_map_fd;
  12515. inner_map_fd = bpf_create_map(BPF_MAP_TYPE_ARRAY, sizeof(int),
  12516. sizeof(int), 1, 0);
  12517. if (inner_map_fd < 0) {
  12518. printf("Failed to create array '%s'!\n", strerror(errno));
  12519. return inner_map_fd;
  12520. }
  12521. outer_map_fd = bpf_create_map_in_map(BPF_MAP_TYPE_ARRAY_OF_MAPS, NULL,
  12522. sizeof(int), inner_map_fd, 1, 0);
  12523. if (outer_map_fd < 0)
  12524. printf("Failed to create array of maps '%s'!\n",
  12525. strerror(errno));
  12526. close(inner_map_fd);
  12527. return outer_map_fd;
  12528. }
  12529. static int create_cgroup_storage(void)
  12530. {
  12531. int fd;
  12532. fd = bpf_create_map(BPF_MAP_TYPE_CGROUP_STORAGE,
  12533. sizeof(struct bpf_cgroup_storage_key),
  12534. TEST_DATA_LEN, 0, 0);
  12535. if (fd < 0)
  12536. printf("Failed to create array '%s'!\n", strerror(errno));
  12537. return fd;
  12538. }
  12539. static char bpf_vlog[UINT_MAX >> 8];
  12540. static void do_test_fixup(struct bpf_test *test, struct bpf_insn *prog,
  12541. int *map_fds)
  12542. {
  12543. int *fixup_map1 = test->fixup_map1;
  12544. int *fixup_map2 = test->fixup_map2;
  12545. int *fixup_map3 = test->fixup_map3;
  12546. int *fixup_map4 = test->fixup_map4;
  12547. int *fixup_prog1 = test->fixup_prog1;
  12548. int *fixup_prog2 = test->fixup_prog2;
  12549. int *fixup_map_in_map = test->fixup_map_in_map;
  12550. int *fixup_cgroup_storage = test->fixup_cgroup_storage;
  12551. if (test->fill_helper)
  12552. test->fill_helper(test);
  12553. /* Allocating HTs with 1 elem is fine here, since we only test
  12554. * for verifier and not do a runtime lookup, so the only thing
  12555. * that really matters is value size in this case.
  12556. */
  12557. if (*fixup_map1) {
  12558. map_fds[0] = create_map(BPF_MAP_TYPE_HASH, sizeof(long long),
  12559. sizeof(long long), 1);
  12560. do {
  12561. prog[*fixup_map1].imm = map_fds[0];
  12562. fixup_map1++;
  12563. } while (*fixup_map1);
  12564. }
  12565. if (*fixup_map2) {
  12566. map_fds[1] = create_map(BPF_MAP_TYPE_HASH, sizeof(long long),
  12567. sizeof(struct test_val), 1);
  12568. do {
  12569. prog[*fixup_map2].imm = map_fds[1];
  12570. fixup_map2++;
  12571. } while (*fixup_map2);
  12572. }
  12573. if (*fixup_map3) {
  12574. map_fds[2] = create_map(BPF_MAP_TYPE_HASH, sizeof(long long),
  12575. sizeof(struct other_val), 1);
  12576. do {
  12577. prog[*fixup_map3].imm = map_fds[2];
  12578. fixup_map3++;
  12579. } while (*fixup_map3);
  12580. }
  12581. if (*fixup_map4) {
  12582. map_fds[3] = create_map(BPF_MAP_TYPE_ARRAY, sizeof(int),
  12583. sizeof(struct test_val), 1);
  12584. do {
  12585. prog[*fixup_map4].imm = map_fds[3];
  12586. fixup_map4++;
  12587. } while (*fixup_map4);
  12588. }
  12589. if (*fixup_prog1) {
  12590. map_fds[4] = create_prog_array(4, 0);
  12591. do {
  12592. prog[*fixup_prog1].imm = map_fds[4];
  12593. fixup_prog1++;
  12594. } while (*fixup_prog1);
  12595. }
  12596. if (*fixup_prog2) {
  12597. map_fds[5] = create_prog_array(8, 7);
  12598. do {
  12599. prog[*fixup_prog2].imm = map_fds[5];
  12600. fixup_prog2++;
  12601. } while (*fixup_prog2);
  12602. }
  12603. if (*fixup_map_in_map) {
  12604. map_fds[6] = create_map_in_map();
  12605. do {
  12606. prog[*fixup_map_in_map].imm = map_fds[6];
  12607. fixup_map_in_map++;
  12608. } while (*fixup_map_in_map);
  12609. }
  12610. if (*fixup_cgroup_storage) {
  12611. map_fds[7] = create_cgroup_storage();
  12612. do {
  12613. prog[*fixup_cgroup_storage].imm = map_fds[7];
  12614. fixup_cgroup_storage++;
  12615. } while (*fixup_cgroup_storage);
  12616. }
  12617. }
  12618. static void do_test_single(struct bpf_test *test, bool unpriv,
  12619. int *passes, int *errors)
  12620. {
  12621. int fd_prog, expected_ret, reject_from_alignment;
  12622. int prog_len, prog_type = test->prog_type;
  12623. struct bpf_insn *prog = test->insns;
  12624. int map_fds[MAX_NR_MAPS];
  12625. const char *expected_err;
  12626. uint32_t retval;
  12627. int i, err;
  12628. for (i = 0; i < MAX_NR_MAPS; i++)
  12629. map_fds[i] = -1;
  12630. do_test_fixup(test, prog, map_fds);
  12631. prog_len = probe_filter_length(prog);
  12632. fd_prog = bpf_verify_program(prog_type ? : BPF_PROG_TYPE_SOCKET_FILTER,
  12633. prog, prog_len, test->flags & F_LOAD_WITH_STRICT_ALIGNMENT,
  12634. "GPL", 0, bpf_vlog, sizeof(bpf_vlog), 1);
  12635. expected_ret = unpriv && test->result_unpriv != UNDEF ?
  12636. test->result_unpriv : test->result;
  12637. expected_err = unpriv && test->errstr_unpriv ?
  12638. test->errstr_unpriv : test->errstr;
  12639. reject_from_alignment = fd_prog < 0 &&
  12640. (test->flags & F_NEEDS_EFFICIENT_UNALIGNED_ACCESS) &&
  12641. strstr(bpf_vlog, "Unknown alignment.");
  12642. #ifdef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS
  12643. if (reject_from_alignment) {
  12644. printf("FAIL\nFailed due to alignment despite having efficient unaligned access: '%s'!\n",
  12645. strerror(errno));
  12646. goto fail_log;
  12647. }
  12648. #endif
  12649. if (expected_ret == ACCEPT) {
  12650. if (fd_prog < 0 && !reject_from_alignment) {
  12651. printf("FAIL\nFailed to load prog '%s'!\n",
  12652. strerror(errno));
  12653. goto fail_log;
  12654. }
  12655. } else {
  12656. if (fd_prog >= 0) {
  12657. printf("FAIL\nUnexpected success to load!\n");
  12658. goto fail_log;
  12659. }
  12660. if (!strstr(bpf_vlog, expected_err) && !reject_from_alignment) {
  12661. printf("FAIL\nUnexpected error message!\n\tEXP: %s\n\tRES: %s\n",
  12662. expected_err, bpf_vlog);
  12663. goto fail_log;
  12664. }
  12665. }
  12666. if (fd_prog >= 0) {
  12667. __u8 tmp[TEST_DATA_LEN << 2];
  12668. __u32 size_tmp = sizeof(tmp);
  12669. err = bpf_prog_test_run(fd_prog, 1, test->data,
  12670. sizeof(test->data), tmp, &size_tmp,
  12671. &retval, NULL);
  12672. if (err && errno != 524/*ENOTSUPP*/ && errno != EPERM) {
  12673. printf("Unexpected bpf_prog_test_run error\n");
  12674. goto fail_log;
  12675. }
  12676. if (!err && retval != test->retval &&
  12677. test->retval != POINTER_VALUE) {
  12678. printf("FAIL retval %d != %d\n", retval, test->retval);
  12679. goto fail_log;
  12680. }
  12681. }
  12682. (*passes)++;
  12683. printf("OK%s\n", reject_from_alignment ?
  12684. " (NOTE: reject due to unknown alignment)" : "");
  12685. close_fds:
  12686. close(fd_prog);
  12687. for (i = 0; i < MAX_NR_MAPS; i++)
  12688. close(map_fds[i]);
  12689. sched_yield();
  12690. return;
  12691. fail_log:
  12692. (*errors)++;
  12693. printf("%s", bpf_vlog);
  12694. goto close_fds;
  12695. }
  12696. static bool is_admin(void)
  12697. {
  12698. cap_t caps;
  12699. cap_flag_value_t sysadmin = CAP_CLEAR;
  12700. const cap_value_t cap_val = CAP_SYS_ADMIN;
  12701. #ifdef CAP_IS_SUPPORTED
  12702. if (!CAP_IS_SUPPORTED(CAP_SETFCAP)) {
  12703. perror("cap_get_flag");
  12704. return false;
  12705. }
  12706. #endif
  12707. caps = cap_get_proc();
  12708. if (!caps) {
  12709. perror("cap_get_proc");
  12710. return false;
  12711. }
  12712. if (cap_get_flag(caps, cap_val, CAP_EFFECTIVE, &sysadmin))
  12713. perror("cap_get_flag");
  12714. if (cap_free(caps))
  12715. perror("cap_free");
  12716. return (sysadmin == CAP_SET);
  12717. }
  12718. static int set_admin(bool admin)
  12719. {
  12720. cap_t caps;
  12721. const cap_value_t cap_val = CAP_SYS_ADMIN;
  12722. int ret = -1;
  12723. caps = cap_get_proc();
  12724. if (!caps) {
  12725. perror("cap_get_proc");
  12726. return -1;
  12727. }
  12728. if (cap_set_flag(caps, CAP_EFFECTIVE, 1, &cap_val,
  12729. admin ? CAP_SET : CAP_CLEAR)) {
  12730. perror("cap_set_flag");
  12731. goto out;
  12732. }
  12733. if (cap_set_proc(caps)) {
  12734. perror("cap_set_proc");
  12735. goto out;
  12736. }
  12737. ret = 0;
  12738. out:
  12739. if (cap_free(caps))
  12740. perror("cap_free");
  12741. return ret;
  12742. }
  12743. static void get_unpriv_disabled()
  12744. {
  12745. char buf[2];
  12746. FILE *fd;
  12747. fd = fopen("/proc/sys/"UNPRIV_SYSCTL, "r");
  12748. if (!fd) {
  12749. perror("fopen /proc/sys/"UNPRIV_SYSCTL);
  12750. unpriv_disabled = true;
  12751. return;
  12752. }
  12753. if (fgets(buf, 2, fd) == buf && atoi(buf))
  12754. unpriv_disabled = true;
  12755. fclose(fd);
  12756. }
  12757. static int do_test(bool unpriv, unsigned int from, unsigned int to)
  12758. {
  12759. int i, passes = 0, errors = 0, skips = 0;
  12760. for (i = from; i < to; i++) {
  12761. struct bpf_test *test = &tests[i];
  12762. /* Program types that are not supported by non-root we
  12763. * skip right away.
  12764. */
  12765. if (!test->prog_type && unpriv_disabled) {
  12766. printf("#%d/u %s SKIP\n", i, test->descr);
  12767. skips++;
  12768. } else if (!test->prog_type) {
  12769. if (!unpriv)
  12770. set_admin(false);
  12771. printf("#%d/u %s ", i, test->descr);
  12772. do_test_single(test, true, &passes, &errors);
  12773. if (!unpriv)
  12774. set_admin(true);
  12775. }
  12776. if (unpriv) {
  12777. printf("#%d/p %s SKIP\n", i, test->descr);
  12778. skips++;
  12779. } else {
  12780. printf("#%d/p %s ", i, test->descr);
  12781. do_test_single(test, false, &passes, &errors);
  12782. }
  12783. }
  12784. printf("Summary: %d PASSED, %d SKIPPED, %d FAILED\n", passes,
  12785. skips, errors);
  12786. return errors ? EXIT_FAILURE : EXIT_SUCCESS;
  12787. }
  12788. int main(int argc, char **argv)
  12789. {
  12790. unsigned int from = 0, to = ARRAY_SIZE(tests);
  12791. bool unpriv = !is_admin();
  12792. if (argc == 3) {
  12793. unsigned int l = atoi(argv[argc - 2]);
  12794. unsigned int u = atoi(argv[argc - 1]);
  12795. if (l < to && u < to) {
  12796. from = l;
  12797. to = u + 1;
  12798. }
  12799. } else if (argc == 2) {
  12800. unsigned int t = atoi(argv[argc - 1]);
  12801. if (t < to) {
  12802. from = t;
  12803. to = t + 1;
  12804. }
  12805. }
  12806. get_unpriv_disabled();
  12807. if (unpriv && unpriv_disabled) {
  12808. printf("Cannot run as unprivileged user with sysctl %s.\n",
  12809. UNPRIV_SYSCTL);
  12810. return EXIT_FAILURE;
  12811. }
  12812. bpf_semi_rand_init();
  12813. return do_test(unpriv, from, to);
  12814. }