]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - tools/testing/selftests/bpf/test_verifier.c
iio: imu: inv_mpu6050: test whoami first and against all known values
[mirror_ubuntu-artful-kernel.git] / tools / testing / selftests / bpf / test_verifier.c
1 /*
2 * Testsuite for eBPF verifier
3 *
4 * Copyright (c) 2014 PLUMgrid, http://plumgrid.com
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of version 2 of the GNU General Public
8 * License as published by the Free Software Foundation.
9 */
10
11 #include <asm/types.h>
12 #include <linux/types.h>
13 #include <stdint.h>
14 #include <stdio.h>
15 #include <stdlib.h>
16 #include <unistd.h>
17 #include <errno.h>
18 #include <string.h>
19 #include <stddef.h>
20 #include <stdbool.h>
21 #include <sched.h>
22
23 #include <sys/capability.h>
24 #include <sys/resource.h>
25
26 #include <linux/unistd.h>
27 #include <linux/filter.h>
28 #include <linux/bpf_perf_event.h>
29 #include <linux/bpf.h>
30
31 #include <bpf/bpf.h>
32
33 #ifdef HAVE_GENHDR
34 # include "autoconf.h"
35 #else
36 # if defined(__i386) || defined(__x86_64) || defined(__s390x__) || defined(__aarch64__)
37 # define CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS 1
38 # endif
39 #endif
40
41 #include "../../../include/linux/filter.h"
42
43 #ifndef ARRAY_SIZE
44 # define ARRAY_SIZE(x) (sizeof(x) / sizeof((x)[0]))
45 #endif
46
47 #define MAX_INSNS 512
48 #define MAX_FIXUPS 8
49 #define MAX_NR_MAPS 4
50
51 #define F_NEEDS_EFFICIENT_UNALIGNED_ACCESS (1 << 0)
52
53 struct bpf_test {
54 const char *descr;
55 struct bpf_insn insns[MAX_INSNS];
56 int fixup_map1[MAX_FIXUPS];
57 int fixup_map2[MAX_FIXUPS];
58 int fixup_prog[MAX_FIXUPS];
59 int fixup_map_in_map[MAX_FIXUPS];
60 const char *errstr;
61 const char *errstr_unpriv;
62 enum {
63 UNDEF,
64 ACCEPT,
65 REJECT
66 } result, result_unpriv;
67 enum bpf_prog_type prog_type;
68 uint8_t flags;
69 };
70
71 /* Note we want this to be 64 bit aligned so that the end of our array is
72 * actually the end of the structure.
73 */
74 #define MAX_ENTRIES 11
75
76 struct test_val {
77 unsigned int index;
78 int foo[MAX_ENTRIES];
79 };
80
81 static struct bpf_test tests[] = {
82 {
83 "add+sub+mul",
84 .insns = {
85 BPF_MOV64_IMM(BPF_REG_1, 1),
86 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 2),
87 BPF_MOV64_IMM(BPF_REG_2, 3),
88 BPF_ALU64_REG(BPF_SUB, BPF_REG_1, BPF_REG_2),
89 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -1),
90 BPF_ALU64_IMM(BPF_MUL, BPF_REG_1, 3),
91 BPF_MOV64_REG(BPF_REG_0, BPF_REG_1),
92 BPF_EXIT_INSN(),
93 },
94 .result = ACCEPT,
95 },
96 {
97 "unreachable",
98 .insns = {
99 BPF_EXIT_INSN(),
100 BPF_EXIT_INSN(),
101 },
102 .errstr = "unreachable",
103 .result = REJECT,
104 },
105 {
106 "unreachable2",
107 .insns = {
108 BPF_JMP_IMM(BPF_JA, 0, 0, 1),
109 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
110 BPF_EXIT_INSN(),
111 },
112 .errstr = "unreachable",
113 .result = REJECT,
114 },
115 {
116 "out of range jump",
117 .insns = {
118 BPF_JMP_IMM(BPF_JA, 0, 0, 1),
119 BPF_EXIT_INSN(),
120 },
121 .errstr = "jump out of range",
122 .result = REJECT,
123 },
124 {
125 "out of range jump2",
126 .insns = {
127 BPF_JMP_IMM(BPF_JA, 0, 0, -2),
128 BPF_EXIT_INSN(),
129 },
130 .errstr = "jump out of range",
131 .result = REJECT,
132 },
133 {
134 "test1 ld_imm64",
135 .insns = {
136 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
137 BPF_LD_IMM64(BPF_REG_0, 0),
138 BPF_LD_IMM64(BPF_REG_0, 0),
139 BPF_LD_IMM64(BPF_REG_0, 1),
140 BPF_LD_IMM64(BPF_REG_0, 1),
141 BPF_MOV64_IMM(BPF_REG_0, 2),
142 BPF_EXIT_INSN(),
143 },
144 .errstr = "invalid BPF_LD_IMM insn",
145 .errstr_unpriv = "R1 pointer comparison",
146 .result = REJECT,
147 },
148 {
149 "test2 ld_imm64",
150 .insns = {
151 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
152 BPF_LD_IMM64(BPF_REG_0, 0),
153 BPF_LD_IMM64(BPF_REG_0, 0),
154 BPF_LD_IMM64(BPF_REG_0, 1),
155 BPF_LD_IMM64(BPF_REG_0, 1),
156 BPF_EXIT_INSN(),
157 },
158 .errstr = "invalid BPF_LD_IMM insn",
159 .errstr_unpriv = "R1 pointer comparison",
160 .result = REJECT,
161 },
162 {
163 "test3 ld_imm64",
164 .insns = {
165 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
166 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
167 BPF_LD_IMM64(BPF_REG_0, 0),
168 BPF_LD_IMM64(BPF_REG_0, 0),
169 BPF_LD_IMM64(BPF_REG_0, 1),
170 BPF_LD_IMM64(BPF_REG_0, 1),
171 BPF_EXIT_INSN(),
172 },
173 .errstr = "invalid bpf_ld_imm64 insn",
174 .result = REJECT,
175 },
176 {
177 "test4 ld_imm64",
178 .insns = {
179 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
180 BPF_EXIT_INSN(),
181 },
182 .errstr = "invalid bpf_ld_imm64 insn",
183 .result = REJECT,
184 },
185 {
186 "test5 ld_imm64",
187 .insns = {
188 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
189 },
190 .errstr = "invalid bpf_ld_imm64 insn",
191 .result = REJECT,
192 },
193 {
194 "test6 ld_imm64",
195 .insns = {
196 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 0),
197 BPF_RAW_INSN(0, 0, 0, 0, 0),
198 BPF_EXIT_INSN(),
199 },
200 .result = ACCEPT,
201 },
202 {
203 "test7 ld_imm64",
204 .insns = {
205 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 1),
206 BPF_RAW_INSN(0, 0, 0, 0, 1),
207 BPF_EXIT_INSN(),
208 },
209 .result = ACCEPT,
210 },
211 {
212 "test8 ld_imm64",
213 .insns = {
214 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 1, 1),
215 BPF_RAW_INSN(0, 0, 0, 0, 1),
216 BPF_EXIT_INSN(),
217 },
218 .errstr = "uses reserved fields",
219 .result = REJECT,
220 },
221 {
222 "test9 ld_imm64",
223 .insns = {
224 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 1),
225 BPF_RAW_INSN(0, 0, 0, 1, 1),
226 BPF_EXIT_INSN(),
227 },
228 .errstr = "invalid bpf_ld_imm64 insn",
229 .result = REJECT,
230 },
231 {
232 "test10 ld_imm64",
233 .insns = {
234 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 1),
235 BPF_RAW_INSN(0, BPF_REG_1, 0, 0, 1),
236 BPF_EXIT_INSN(),
237 },
238 .errstr = "invalid bpf_ld_imm64 insn",
239 .result = REJECT,
240 },
241 {
242 "test11 ld_imm64",
243 .insns = {
244 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, 0, 0, 1),
245 BPF_RAW_INSN(0, 0, BPF_REG_1, 0, 1),
246 BPF_EXIT_INSN(),
247 },
248 .errstr = "invalid bpf_ld_imm64 insn",
249 .result = REJECT,
250 },
251 {
252 "test12 ld_imm64",
253 .insns = {
254 BPF_MOV64_IMM(BPF_REG_1, 0),
255 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, BPF_REG_1, 0, 1),
256 BPF_RAW_INSN(0, 0, 0, 0, 1),
257 BPF_EXIT_INSN(),
258 },
259 .errstr = "not pointing to valid bpf_map",
260 .result = REJECT,
261 },
262 {
263 "test13 ld_imm64",
264 .insns = {
265 BPF_MOV64_IMM(BPF_REG_1, 0),
266 BPF_RAW_INSN(BPF_LD | BPF_IMM | BPF_DW, 0, BPF_REG_1, 0, 1),
267 BPF_RAW_INSN(0, 0, BPF_REG_1, 0, 1),
268 BPF_EXIT_INSN(),
269 },
270 .errstr = "invalid bpf_ld_imm64 insn",
271 .result = REJECT,
272 },
273 {
274 "no bpf_exit",
275 .insns = {
276 BPF_ALU64_REG(BPF_MOV, BPF_REG_0, BPF_REG_2),
277 },
278 .errstr = "jump out of range",
279 .result = REJECT,
280 },
281 {
282 "loop (back-edge)",
283 .insns = {
284 BPF_JMP_IMM(BPF_JA, 0, 0, -1),
285 BPF_EXIT_INSN(),
286 },
287 .errstr = "back-edge",
288 .result = REJECT,
289 },
290 {
291 "loop2 (back-edge)",
292 .insns = {
293 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
294 BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
295 BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
296 BPF_JMP_IMM(BPF_JA, 0, 0, -4),
297 BPF_EXIT_INSN(),
298 },
299 .errstr = "back-edge",
300 .result = REJECT,
301 },
302 {
303 "conditional loop",
304 .insns = {
305 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
306 BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
307 BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
308 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, -3),
309 BPF_EXIT_INSN(),
310 },
311 .errstr = "back-edge",
312 .result = REJECT,
313 },
314 {
315 "read uninitialized register",
316 .insns = {
317 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
318 BPF_EXIT_INSN(),
319 },
320 .errstr = "R2 !read_ok",
321 .result = REJECT,
322 },
323 {
324 "read invalid register",
325 .insns = {
326 BPF_MOV64_REG(BPF_REG_0, -1),
327 BPF_EXIT_INSN(),
328 },
329 .errstr = "R15 is invalid",
330 .result = REJECT,
331 },
332 {
333 "program doesn't init R0 before exit",
334 .insns = {
335 BPF_ALU64_REG(BPF_MOV, BPF_REG_2, BPF_REG_1),
336 BPF_EXIT_INSN(),
337 },
338 .errstr = "R0 !read_ok",
339 .result = REJECT,
340 },
341 {
342 "program doesn't init R0 before exit in all branches",
343 .insns = {
344 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
345 BPF_MOV64_IMM(BPF_REG_0, 1),
346 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 2),
347 BPF_EXIT_INSN(),
348 },
349 .errstr = "R0 !read_ok",
350 .errstr_unpriv = "R1 pointer comparison",
351 .result = REJECT,
352 },
353 {
354 "stack out of bounds",
355 .insns = {
356 BPF_ST_MEM(BPF_DW, BPF_REG_10, 8, 0),
357 BPF_EXIT_INSN(),
358 },
359 .errstr = "invalid stack",
360 .result = REJECT,
361 },
362 {
363 "invalid call insn1",
364 .insns = {
365 BPF_RAW_INSN(BPF_JMP | BPF_CALL | BPF_X, 0, 0, 0, 0),
366 BPF_EXIT_INSN(),
367 },
368 .errstr = "BPF_CALL uses reserved",
369 .result = REJECT,
370 },
371 {
372 "invalid call insn2",
373 .insns = {
374 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 1, 0),
375 BPF_EXIT_INSN(),
376 },
377 .errstr = "BPF_CALL uses reserved",
378 .result = REJECT,
379 },
380 {
381 "invalid function call",
382 .insns = {
383 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, 1234567),
384 BPF_EXIT_INSN(),
385 },
386 .errstr = "invalid func unknown#1234567",
387 .result = REJECT,
388 },
389 {
390 "uninitialized stack1",
391 .insns = {
392 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
393 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
394 BPF_LD_MAP_FD(BPF_REG_1, 0),
395 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
396 BPF_FUNC_map_lookup_elem),
397 BPF_EXIT_INSN(),
398 },
399 .fixup_map1 = { 2 },
400 .errstr = "invalid indirect read from stack",
401 .result = REJECT,
402 },
403 {
404 "uninitialized stack2",
405 .insns = {
406 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
407 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -8),
408 BPF_EXIT_INSN(),
409 },
410 .errstr = "invalid read from stack",
411 .result = REJECT,
412 },
413 {
414 "invalid fp arithmetic",
415 /* If this gets ever changed, make sure JITs can deal with it. */
416 .insns = {
417 BPF_MOV64_IMM(BPF_REG_0, 0),
418 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
419 BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 8),
420 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
421 BPF_EXIT_INSN(),
422 },
423 .errstr_unpriv = "R1 pointer arithmetic",
424 .result_unpriv = REJECT,
425 .errstr = "R1 invalid mem access",
426 .result = REJECT,
427 },
428 {
429 "non-invalid fp arithmetic",
430 .insns = {
431 BPF_MOV64_IMM(BPF_REG_0, 0),
432 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
433 BPF_EXIT_INSN(),
434 },
435 .result = ACCEPT,
436 },
437 {
438 "invalid argument register",
439 .insns = {
440 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
441 BPF_FUNC_get_cgroup_classid),
442 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
443 BPF_FUNC_get_cgroup_classid),
444 BPF_EXIT_INSN(),
445 },
446 .errstr = "R1 !read_ok",
447 .result = REJECT,
448 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
449 },
450 {
451 "non-invalid argument register",
452 .insns = {
453 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
454 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
455 BPF_FUNC_get_cgroup_classid),
456 BPF_ALU64_REG(BPF_MOV, BPF_REG_1, BPF_REG_6),
457 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
458 BPF_FUNC_get_cgroup_classid),
459 BPF_EXIT_INSN(),
460 },
461 .result = ACCEPT,
462 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
463 },
464 {
465 "check valid spill/fill",
466 .insns = {
467 /* spill R1(ctx) into stack */
468 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
469 /* fill it back into R2 */
470 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -8),
471 /* should be able to access R0 = *(R2 + 8) */
472 /* BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, 8), */
473 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
474 BPF_EXIT_INSN(),
475 },
476 .errstr_unpriv = "R0 leaks addr",
477 .result = ACCEPT,
478 .result_unpriv = REJECT,
479 },
480 {
481 "check valid spill/fill, skb mark",
482 .insns = {
483 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
484 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, -8),
485 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
486 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
487 offsetof(struct __sk_buff, mark)),
488 BPF_EXIT_INSN(),
489 },
490 .result = ACCEPT,
491 .result_unpriv = ACCEPT,
492 },
493 {
494 "check corrupted spill/fill",
495 .insns = {
496 /* spill R1(ctx) into stack */
497 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
498 /* mess up with R1 pointer on stack */
499 BPF_ST_MEM(BPF_B, BPF_REG_10, -7, 0x23),
500 /* fill back into R0 should fail */
501 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
502 BPF_EXIT_INSN(),
503 },
504 .errstr_unpriv = "attempt to corrupt spilled",
505 .errstr = "corrupted spill",
506 .result = REJECT,
507 },
508 {
509 "invalid src register in STX",
510 .insns = {
511 BPF_STX_MEM(BPF_B, BPF_REG_10, -1, -1),
512 BPF_EXIT_INSN(),
513 },
514 .errstr = "R15 is invalid",
515 .result = REJECT,
516 },
517 {
518 "invalid dst register in STX",
519 .insns = {
520 BPF_STX_MEM(BPF_B, 14, BPF_REG_10, -1),
521 BPF_EXIT_INSN(),
522 },
523 .errstr = "R14 is invalid",
524 .result = REJECT,
525 },
526 {
527 "invalid dst register in ST",
528 .insns = {
529 BPF_ST_MEM(BPF_B, 14, -1, -1),
530 BPF_EXIT_INSN(),
531 },
532 .errstr = "R14 is invalid",
533 .result = REJECT,
534 },
535 {
536 "invalid src register in LDX",
537 .insns = {
538 BPF_LDX_MEM(BPF_B, BPF_REG_0, 12, 0),
539 BPF_EXIT_INSN(),
540 },
541 .errstr = "R12 is invalid",
542 .result = REJECT,
543 },
544 {
545 "invalid dst register in LDX",
546 .insns = {
547 BPF_LDX_MEM(BPF_B, 11, BPF_REG_1, 0),
548 BPF_EXIT_INSN(),
549 },
550 .errstr = "R11 is invalid",
551 .result = REJECT,
552 },
553 {
554 "junk insn",
555 .insns = {
556 BPF_RAW_INSN(0, 0, 0, 0, 0),
557 BPF_EXIT_INSN(),
558 },
559 .errstr = "invalid BPF_LD_IMM",
560 .result = REJECT,
561 },
562 {
563 "junk insn2",
564 .insns = {
565 BPF_RAW_INSN(1, 0, 0, 0, 0),
566 BPF_EXIT_INSN(),
567 },
568 .errstr = "BPF_LDX uses reserved fields",
569 .result = REJECT,
570 },
571 {
572 "junk insn3",
573 .insns = {
574 BPF_RAW_INSN(-1, 0, 0, 0, 0),
575 BPF_EXIT_INSN(),
576 },
577 .errstr = "invalid BPF_ALU opcode f0",
578 .result = REJECT,
579 },
580 {
581 "junk insn4",
582 .insns = {
583 BPF_RAW_INSN(-1, -1, -1, -1, -1),
584 BPF_EXIT_INSN(),
585 },
586 .errstr = "invalid BPF_ALU opcode f0",
587 .result = REJECT,
588 },
589 {
590 "junk insn5",
591 .insns = {
592 BPF_RAW_INSN(0x7f, -1, -1, -1, -1),
593 BPF_EXIT_INSN(),
594 },
595 .errstr = "BPF_ALU uses reserved fields",
596 .result = REJECT,
597 },
598 {
599 "misaligned read from stack",
600 .insns = {
601 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
602 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, -4),
603 BPF_EXIT_INSN(),
604 },
605 .errstr = "misaligned access",
606 .result = REJECT,
607 },
608 {
609 "invalid map_fd for function call",
610 .insns = {
611 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
612 BPF_ALU64_REG(BPF_MOV, BPF_REG_2, BPF_REG_10),
613 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
614 BPF_LD_MAP_FD(BPF_REG_1, 0),
615 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
616 BPF_FUNC_map_delete_elem),
617 BPF_EXIT_INSN(),
618 },
619 .errstr = "fd 0 is not pointing to valid bpf_map",
620 .result = REJECT,
621 },
622 {
623 "don't check return value before access",
624 .insns = {
625 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
626 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
627 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
628 BPF_LD_MAP_FD(BPF_REG_1, 0),
629 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
630 BPF_FUNC_map_lookup_elem),
631 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
632 BPF_EXIT_INSN(),
633 },
634 .fixup_map1 = { 3 },
635 .errstr = "R0 invalid mem access 'map_value_or_null'",
636 .result = REJECT,
637 },
638 {
639 "access memory with incorrect alignment",
640 .insns = {
641 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
642 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
643 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
644 BPF_LD_MAP_FD(BPF_REG_1, 0),
645 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
646 BPF_FUNC_map_lookup_elem),
647 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
648 BPF_ST_MEM(BPF_DW, BPF_REG_0, 4, 0),
649 BPF_EXIT_INSN(),
650 },
651 .fixup_map1 = { 3 },
652 .errstr = "misaligned access",
653 .result = REJECT,
654 },
655 {
656 "sometimes access memory with incorrect alignment",
657 .insns = {
658 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
659 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
660 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
661 BPF_LD_MAP_FD(BPF_REG_1, 0),
662 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
663 BPF_FUNC_map_lookup_elem),
664 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
665 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 0),
666 BPF_EXIT_INSN(),
667 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 1),
668 BPF_EXIT_INSN(),
669 },
670 .fixup_map1 = { 3 },
671 .errstr = "R0 invalid mem access",
672 .errstr_unpriv = "R0 leaks addr",
673 .result = REJECT,
674 },
675 {
676 "jump test 1",
677 .insns = {
678 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
679 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -8),
680 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 1),
681 BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 0),
682 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 1),
683 BPF_ST_MEM(BPF_DW, BPF_REG_2, -16, 1),
684 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 2, 1),
685 BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 2),
686 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 3, 1),
687 BPF_ST_MEM(BPF_DW, BPF_REG_2, -16, 3),
688 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 4, 1),
689 BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 4),
690 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 5, 1),
691 BPF_ST_MEM(BPF_DW, BPF_REG_2, -32, 5),
692 BPF_MOV64_IMM(BPF_REG_0, 0),
693 BPF_EXIT_INSN(),
694 },
695 .errstr_unpriv = "R1 pointer comparison",
696 .result_unpriv = REJECT,
697 .result = ACCEPT,
698 },
699 {
700 "jump test 2",
701 .insns = {
702 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
703 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 2),
704 BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 0),
705 BPF_JMP_IMM(BPF_JA, 0, 0, 14),
706 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 2),
707 BPF_ST_MEM(BPF_DW, BPF_REG_2, -16, 0),
708 BPF_JMP_IMM(BPF_JA, 0, 0, 11),
709 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 2, 2),
710 BPF_ST_MEM(BPF_DW, BPF_REG_2, -32, 0),
711 BPF_JMP_IMM(BPF_JA, 0, 0, 8),
712 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 3, 2),
713 BPF_ST_MEM(BPF_DW, BPF_REG_2, -40, 0),
714 BPF_JMP_IMM(BPF_JA, 0, 0, 5),
715 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 4, 2),
716 BPF_ST_MEM(BPF_DW, BPF_REG_2, -48, 0),
717 BPF_JMP_IMM(BPF_JA, 0, 0, 2),
718 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 5, 1),
719 BPF_ST_MEM(BPF_DW, BPF_REG_2, -56, 0),
720 BPF_MOV64_IMM(BPF_REG_0, 0),
721 BPF_EXIT_INSN(),
722 },
723 .errstr_unpriv = "R1 pointer comparison",
724 .result_unpriv = REJECT,
725 .result = ACCEPT,
726 },
727 {
728 "jump test 3",
729 .insns = {
730 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
731 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 3),
732 BPF_ST_MEM(BPF_DW, BPF_REG_2, -8, 0),
733 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
734 BPF_JMP_IMM(BPF_JA, 0, 0, 19),
735 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 3),
736 BPF_ST_MEM(BPF_DW, BPF_REG_2, -16, 0),
737 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
738 BPF_JMP_IMM(BPF_JA, 0, 0, 15),
739 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 2, 3),
740 BPF_ST_MEM(BPF_DW, BPF_REG_2, -32, 0),
741 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -32),
742 BPF_JMP_IMM(BPF_JA, 0, 0, 11),
743 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 3, 3),
744 BPF_ST_MEM(BPF_DW, BPF_REG_2, -40, 0),
745 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -40),
746 BPF_JMP_IMM(BPF_JA, 0, 0, 7),
747 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 4, 3),
748 BPF_ST_MEM(BPF_DW, BPF_REG_2, -48, 0),
749 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -48),
750 BPF_JMP_IMM(BPF_JA, 0, 0, 3),
751 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 5, 0),
752 BPF_ST_MEM(BPF_DW, BPF_REG_2, -56, 0),
753 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -56),
754 BPF_LD_MAP_FD(BPF_REG_1, 0),
755 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
756 BPF_FUNC_map_delete_elem),
757 BPF_EXIT_INSN(),
758 },
759 .fixup_map1 = { 24 },
760 .errstr_unpriv = "R1 pointer comparison",
761 .result_unpriv = REJECT,
762 .result = ACCEPT,
763 },
764 {
765 "jump test 4",
766 .insns = {
767 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
768 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
769 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
770 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
771 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
772 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
773 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
774 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
775 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
776 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
777 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
778 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
779 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
780 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
781 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
782 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
783 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
784 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
785 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
786 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
787 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
788 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
789 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
790 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
791 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
792 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
793 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
794 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
795 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
796 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
797 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
798 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
799 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 1),
800 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 2),
801 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 3),
802 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 4),
803 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
804 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
805 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
806 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
807 BPF_MOV64_IMM(BPF_REG_0, 0),
808 BPF_EXIT_INSN(),
809 },
810 .errstr_unpriv = "R1 pointer comparison",
811 .result_unpriv = REJECT,
812 .result = ACCEPT,
813 },
814 {
815 "jump test 5",
816 .insns = {
817 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
818 BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
819 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
820 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
821 BPF_JMP_IMM(BPF_JA, 0, 0, 2),
822 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
823 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
824 BPF_MOV64_IMM(BPF_REG_0, 0),
825 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
826 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
827 BPF_JMP_IMM(BPF_JA, 0, 0, 2),
828 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
829 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
830 BPF_MOV64_IMM(BPF_REG_0, 0),
831 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
832 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
833 BPF_JMP_IMM(BPF_JA, 0, 0, 2),
834 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
835 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
836 BPF_MOV64_IMM(BPF_REG_0, 0),
837 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
838 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
839 BPF_JMP_IMM(BPF_JA, 0, 0, 2),
840 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
841 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
842 BPF_MOV64_IMM(BPF_REG_0, 0),
843 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
844 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_3, -8),
845 BPF_JMP_IMM(BPF_JA, 0, 0, 2),
846 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_2, -8),
847 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
848 BPF_MOV64_IMM(BPF_REG_0, 0),
849 BPF_EXIT_INSN(),
850 },
851 .errstr_unpriv = "R1 pointer comparison",
852 .result_unpriv = REJECT,
853 .result = ACCEPT,
854 },
855 {
856 "access skb fields ok",
857 .insns = {
858 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
859 offsetof(struct __sk_buff, len)),
860 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
861 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
862 offsetof(struct __sk_buff, mark)),
863 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
864 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
865 offsetof(struct __sk_buff, pkt_type)),
866 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
867 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
868 offsetof(struct __sk_buff, queue_mapping)),
869 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
870 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
871 offsetof(struct __sk_buff, protocol)),
872 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
873 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
874 offsetof(struct __sk_buff, vlan_present)),
875 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
876 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
877 offsetof(struct __sk_buff, vlan_tci)),
878 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
879 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
880 offsetof(struct __sk_buff, napi_id)),
881 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 0),
882 BPF_EXIT_INSN(),
883 },
884 .result = ACCEPT,
885 },
886 {
887 "access skb fields bad1",
888 .insns = {
889 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1, -4),
890 BPF_EXIT_INSN(),
891 },
892 .errstr = "invalid bpf_context access",
893 .result = REJECT,
894 },
895 {
896 "access skb fields bad2",
897 .insns = {
898 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 9),
899 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
900 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
901 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
902 BPF_LD_MAP_FD(BPF_REG_1, 0),
903 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
904 BPF_FUNC_map_lookup_elem),
905 BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
906 BPF_EXIT_INSN(),
907 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
908 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
909 offsetof(struct __sk_buff, pkt_type)),
910 BPF_EXIT_INSN(),
911 },
912 .fixup_map1 = { 4 },
913 .errstr = "different pointers",
914 .errstr_unpriv = "R1 pointer comparison",
915 .result = REJECT,
916 },
917 {
918 "access skb fields bad3",
919 .insns = {
920 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 2),
921 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
922 offsetof(struct __sk_buff, pkt_type)),
923 BPF_EXIT_INSN(),
924 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
925 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
926 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
927 BPF_LD_MAP_FD(BPF_REG_1, 0),
928 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
929 BPF_FUNC_map_lookup_elem),
930 BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
931 BPF_EXIT_INSN(),
932 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
933 BPF_JMP_IMM(BPF_JA, 0, 0, -12),
934 },
935 .fixup_map1 = { 6 },
936 .errstr = "different pointers",
937 .errstr_unpriv = "R1 pointer comparison",
938 .result = REJECT,
939 },
940 {
941 "access skb fields bad4",
942 .insns = {
943 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, 0, 3),
944 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
945 offsetof(struct __sk_buff, len)),
946 BPF_MOV64_IMM(BPF_REG_0, 0),
947 BPF_EXIT_INSN(),
948 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
949 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
950 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
951 BPF_LD_MAP_FD(BPF_REG_1, 0),
952 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
953 BPF_FUNC_map_lookup_elem),
954 BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1),
955 BPF_EXIT_INSN(),
956 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
957 BPF_JMP_IMM(BPF_JA, 0, 0, -13),
958 },
959 .fixup_map1 = { 7 },
960 .errstr = "different pointers",
961 .errstr_unpriv = "R1 pointer comparison",
962 .result = REJECT,
963 },
964 {
965 "check skb->mark is not writeable by sockets",
966 .insns = {
967 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
968 offsetof(struct __sk_buff, mark)),
969 BPF_EXIT_INSN(),
970 },
971 .errstr = "invalid bpf_context access",
972 .errstr_unpriv = "R1 leaks addr",
973 .result = REJECT,
974 },
975 {
976 "check skb->tc_index is not writeable by sockets",
977 .insns = {
978 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
979 offsetof(struct __sk_buff, tc_index)),
980 BPF_EXIT_INSN(),
981 },
982 .errstr = "invalid bpf_context access",
983 .errstr_unpriv = "R1 leaks addr",
984 .result = REJECT,
985 },
986 {
987 "check cb access: byte",
988 .insns = {
989 BPF_MOV64_IMM(BPF_REG_0, 0),
990 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
991 offsetof(struct __sk_buff, cb[0])),
992 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
993 offsetof(struct __sk_buff, cb[0]) + 1),
994 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
995 offsetof(struct __sk_buff, cb[0]) + 2),
996 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
997 offsetof(struct __sk_buff, cb[0]) + 3),
998 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
999 offsetof(struct __sk_buff, cb[1])),
1000 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1001 offsetof(struct __sk_buff, cb[1]) + 1),
1002 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1003 offsetof(struct __sk_buff, cb[1]) + 2),
1004 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1005 offsetof(struct __sk_buff, cb[1]) + 3),
1006 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1007 offsetof(struct __sk_buff, cb[2])),
1008 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1009 offsetof(struct __sk_buff, cb[2]) + 1),
1010 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1011 offsetof(struct __sk_buff, cb[2]) + 2),
1012 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1013 offsetof(struct __sk_buff, cb[2]) + 3),
1014 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1015 offsetof(struct __sk_buff, cb[3])),
1016 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1017 offsetof(struct __sk_buff, cb[3]) + 1),
1018 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1019 offsetof(struct __sk_buff, cb[3]) + 2),
1020 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1021 offsetof(struct __sk_buff, cb[3]) + 3),
1022 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1023 offsetof(struct __sk_buff, cb[4])),
1024 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1025 offsetof(struct __sk_buff, cb[4]) + 1),
1026 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1027 offsetof(struct __sk_buff, cb[4]) + 2),
1028 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1029 offsetof(struct __sk_buff, cb[4]) + 3),
1030 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1031 offsetof(struct __sk_buff, cb[0])),
1032 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1033 offsetof(struct __sk_buff, cb[0]) + 1),
1034 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1035 offsetof(struct __sk_buff, cb[0]) + 2),
1036 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1037 offsetof(struct __sk_buff, cb[0]) + 3),
1038 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1039 offsetof(struct __sk_buff, cb[1])),
1040 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1041 offsetof(struct __sk_buff, cb[1]) + 1),
1042 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1043 offsetof(struct __sk_buff, cb[1]) + 2),
1044 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1045 offsetof(struct __sk_buff, cb[1]) + 3),
1046 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1047 offsetof(struct __sk_buff, cb[2])),
1048 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1049 offsetof(struct __sk_buff, cb[2]) + 1),
1050 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1051 offsetof(struct __sk_buff, cb[2]) + 2),
1052 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1053 offsetof(struct __sk_buff, cb[2]) + 3),
1054 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1055 offsetof(struct __sk_buff, cb[3])),
1056 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1057 offsetof(struct __sk_buff, cb[3]) + 1),
1058 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1059 offsetof(struct __sk_buff, cb[3]) + 2),
1060 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1061 offsetof(struct __sk_buff, cb[3]) + 3),
1062 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1063 offsetof(struct __sk_buff, cb[4])),
1064 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1065 offsetof(struct __sk_buff, cb[4]) + 1),
1066 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1067 offsetof(struct __sk_buff, cb[4]) + 2),
1068 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1069 offsetof(struct __sk_buff, cb[4]) + 3),
1070 BPF_EXIT_INSN(),
1071 },
1072 .result = ACCEPT,
1073 },
1074 {
1075 "check cb access: byte, oob 1",
1076 .insns = {
1077 BPF_MOV64_IMM(BPF_REG_0, 0),
1078 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1079 offsetof(struct __sk_buff, cb[4]) + 4),
1080 BPF_EXIT_INSN(),
1081 },
1082 .errstr = "invalid bpf_context access",
1083 .result = REJECT,
1084 },
1085 {
1086 "check cb access: byte, oob 2",
1087 .insns = {
1088 BPF_MOV64_IMM(BPF_REG_0, 0),
1089 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1090 offsetof(struct __sk_buff, cb[0]) - 1),
1091 BPF_EXIT_INSN(),
1092 },
1093 .errstr = "invalid bpf_context access",
1094 .result = REJECT,
1095 },
1096 {
1097 "check cb access: byte, oob 3",
1098 .insns = {
1099 BPF_MOV64_IMM(BPF_REG_0, 0),
1100 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1101 offsetof(struct __sk_buff, cb[4]) + 4),
1102 BPF_EXIT_INSN(),
1103 },
1104 .errstr = "invalid bpf_context access",
1105 .result = REJECT,
1106 },
1107 {
1108 "check cb access: byte, oob 4",
1109 .insns = {
1110 BPF_MOV64_IMM(BPF_REG_0, 0),
1111 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1,
1112 offsetof(struct __sk_buff, cb[0]) - 1),
1113 BPF_EXIT_INSN(),
1114 },
1115 .errstr = "invalid bpf_context access",
1116 .result = REJECT,
1117 },
1118 {
1119 "check cb access: byte, wrong type",
1120 .insns = {
1121 BPF_MOV64_IMM(BPF_REG_0, 0),
1122 BPF_STX_MEM(BPF_B, BPF_REG_1, BPF_REG_0,
1123 offsetof(struct __sk_buff, cb[0])),
1124 BPF_EXIT_INSN(),
1125 },
1126 .errstr = "invalid bpf_context access",
1127 .result = REJECT,
1128 .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
1129 },
1130 {
1131 "check cb access: half",
1132 .insns = {
1133 BPF_MOV64_IMM(BPF_REG_0, 0),
1134 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1135 offsetof(struct __sk_buff, cb[0])),
1136 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1137 offsetof(struct __sk_buff, cb[0]) + 2),
1138 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1139 offsetof(struct __sk_buff, cb[1])),
1140 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1141 offsetof(struct __sk_buff, cb[1]) + 2),
1142 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1143 offsetof(struct __sk_buff, cb[2])),
1144 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1145 offsetof(struct __sk_buff, cb[2]) + 2),
1146 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1147 offsetof(struct __sk_buff, cb[3])),
1148 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1149 offsetof(struct __sk_buff, cb[3]) + 2),
1150 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1151 offsetof(struct __sk_buff, cb[4])),
1152 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1153 offsetof(struct __sk_buff, cb[4]) + 2),
1154 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1155 offsetof(struct __sk_buff, cb[0])),
1156 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1157 offsetof(struct __sk_buff, cb[0]) + 2),
1158 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1159 offsetof(struct __sk_buff, cb[1])),
1160 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1161 offsetof(struct __sk_buff, cb[1]) + 2),
1162 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1163 offsetof(struct __sk_buff, cb[2])),
1164 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1165 offsetof(struct __sk_buff, cb[2]) + 2),
1166 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1167 offsetof(struct __sk_buff, cb[3])),
1168 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1169 offsetof(struct __sk_buff, cb[3]) + 2),
1170 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1171 offsetof(struct __sk_buff, cb[4])),
1172 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1173 offsetof(struct __sk_buff, cb[4]) + 2),
1174 BPF_EXIT_INSN(),
1175 },
1176 .result = ACCEPT,
1177 },
1178 {
1179 "check cb access: half, unaligned",
1180 .insns = {
1181 BPF_MOV64_IMM(BPF_REG_0, 0),
1182 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1183 offsetof(struct __sk_buff, cb[0]) + 1),
1184 BPF_EXIT_INSN(),
1185 },
1186 .errstr = "misaligned access",
1187 .result = REJECT,
1188 },
1189 {
1190 "check cb access: half, oob 1",
1191 .insns = {
1192 BPF_MOV64_IMM(BPF_REG_0, 0),
1193 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1194 offsetof(struct __sk_buff, cb[4]) + 4),
1195 BPF_EXIT_INSN(),
1196 },
1197 .errstr = "invalid bpf_context access",
1198 .result = REJECT,
1199 },
1200 {
1201 "check cb access: half, oob 2",
1202 .insns = {
1203 BPF_MOV64_IMM(BPF_REG_0, 0),
1204 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1205 offsetof(struct __sk_buff, cb[0]) - 2),
1206 BPF_EXIT_INSN(),
1207 },
1208 .errstr = "invalid bpf_context access",
1209 .result = REJECT,
1210 },
1211 {
1212 "check cb access: half, oob 3",
1213 .insns = {
1214 BPF_MOV64_IMM(BPF_REG_0, 0),
1215 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1216 offsetof(struct __sk_buff, cb[4]) + 4),
1217 BPF_EXIT_INSN(),
1218 },
1219 .errstr = "invalid bpf_context access",
1220 .result = REJECT,
1221 },
1222 {
1223 "check cb access: half, oob 4",
1224 .insns = {
1225 BPF_MOV64_IMM(BPF_REG_0, 0),
1226 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_1,
1227 offsetof(struct __sk_buff, cb[0]) - 2),
1228 BPF_EXIT_INSN(),
1229 },
1230 .errstr = "invalid bpf_context access",
1231 .result = REJECT,
1232 },
1233 {
1234 "check cb access: half, wrong type",
1235 .insns = {
1236 BPF_MOV64_IMM(BPF_REG_0, 0),
1237 BPF_STX_MEM(BPF_H, BPF_REG_1, BPF_REG_0,
1238 offsetof(struct __sk_buff, cb[0])),
1239 BPF_EXIT_INSN(),
1240 },
1241 .errstr = "invalid bpf_context access",
1242 .result = REJECT,
1243 .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
1244 },
1245 {
1246 "check cb access: word",
1247 .insns = {
1248 BPF_MOV64_IMM(BPF_REG_0, 0),
1249 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1250 offsetof(struct __sk_buff, cb[0])),
1251 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1252 offsetof(struct __sk_buff, cb[1])),
1253 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1254 offsetof(struct __sk_buff, cb[2])),
1255 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1256 offsetof(struct __sk_buff, cb[3])),
1257 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1258 offsetof(struct __sk_buff, cb[4])),
1259 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1260 offsetof(struct __sk_buff, cb[0])),
1261 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1262 offsetof(struct __sk_buff, cb[1])),
1263 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1264 offsetof(struct __sk_buff, cb[2])),
1265 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1266 offsetof(struct __sk_buff, cb[3])),
1267 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1268 offsetof(struct __sk_buff, cb[4])),
1269 BPF_EXIT_INSN(),
1270 },
1271 .result = ACCEPT,
1272 },
1273 {
1274 "check cb access: word, unaligned 1",
1275 .insns = {
1276 BPF_MOV64_IMM(BPF_REG_0, 0),
1277 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1278 offsetof(struct __sk_buff, cb[0]) + 2),
1279 BPF_EXIT_INSN(),
1280 },
1281 .errstr = "misaligned access",
1282 .result = REJECT,
1283 },
1284 {
1285 "check cb access: word, unaligned 2",
1286 .insns = {
1287 BPF_MOV64_IMM(BPF_REG_0, 0),
1288 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1289 offsetof(struct __sk_buff, cb[4]) + 1),
1290 BPF_EXIT_INSN(),
1291 },
1292 .errstr = "misaligned access",
1293 .result = REJECT,
1294 },
1295 {
1296 "check cb access: word, unaligned 3",
1297 .insns = {
1298 BPF_MOV64_IMM(BPF_REG_0, 0),
1299 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1300 offsetof(struct __sk_buff, cb[4]) + 2),
1301 BPF_EXIT_INSN(),
1302 },
1303 .errstr = "misaligned access",
1304 .result = REJECT,
1305 },
1306 {
1307 "check cb access: word, unaligned 4",
1308 .insns = {
1309 BPF_MOV64_IMM(BPF_REG_0, 0),
1310 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1311 offsetof(struct __sk_buff, cb[4]) + 3),
1312 BPF_EXIT_INSN(),
1313 },
1314 .errstr = "misaligned access",
1315 .result = REJECT,
1316 },
1317 {
1318 "check cb access: double",
1319 .insns = {
1320 BPF_MOV64_IMM(BPF_REG_0, 0),
1321 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
1322 offsetof(struct __sk_buff, cb[0])),
1323 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
1324 offsetof(struct __sk_buff, cb[2])),
1325 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
1326 offsetof(struct __sk_buff, cb[0])),
1327 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
1328 offsetof(struct __sk_buff, cb[2])),
1329 BPF_EXIT_INSN(),
1330 },
1331 .result = ACCEPT,
1332 },
1333 {
1334 "check cb access: double, unaligned 1",
1335 .insns = {
1336 BPF_MOV64_IMM(BPF_REG_0, 0),
1337 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
1338 offsetof(struct __sk_buff, cb[1])),
1339 BPF_EXIT_INSN(),
1340 },
1341 .errstr = "misaligned access",
1342 .result = REJECT,
1343 },
1344 {
1345 "check cb access: double, unaligned 2",
1346 .insns = {
1347 BPF_MOV64_IMM(BPF_REG_0, 0),
1348 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
1349 offsetof(struct __sk_buff, cb[3])),
1350 BPF_EXIT_INSN(),
1351 },
1352 .errstr = "misaligned access",
1353 .result = REJECT,
1354 },
1355 {
1356 "check cb access: double, oob 1",
1357 .insns = {
1358 BPF_MOV64_IMM(BPF_REG_0, 0),
1359 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
1360 offsetof(struct __sk_buff, cb[4])),
1361 BPF_EXIT_INSN(),
1362 },
1363 .errstr = "invalid bpf_context access",
1364 .result = REJECT,
1365 },
1366 {
1367 "check cb access: double, oob 2",
1368 .insns = {
1369 BPF_MOV64_IMM(BPF_REG_0, 0),
1370 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
1371 offsetof(struct __sk_buff, cb[4]) + 8),
1372 BPF_EXIT_INSN(),
1373 },
1374 .errstr = "invalid bpf_context access",
1375 .result = REJECT,
1376 },
1377 {
1378 "check cb access: double, oob 3",
1379 .insns = {
1380 BPF_MOV64_IMM(BPF_REG_0, 0),
1381 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
1382 offsetof(struct __sk_buff, cb[0]) - 8),
1383 BPF_EXIT_INSN(),
1384 },
1385 .errstr = "invalid bpf_context access",
1386 .result = REJECT,
1387 },
1388 {
1389 "check cb access: double, oob 4",
1390 .insns = {
1391 BPF_MOV64_IMM(BPF_REG_0, 0),
1392 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
1393 offsetof(struct __sk_buff, cb[4])),
1394 BPF_EXIT_INSN(),
1395 },
1396 .errstr = "invalid bpf_context access",
1397 .result = REJECT,
1398 },
1399 {
1400 "check cb access: double, oob 5",
1401 .insns = {
1402 BPF_MOV64_IMM(BPF_REG_0, 0),
1403 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
1404 offsetof(struct __sk_buff, cb[4]) + 8),
1405 BPF_EXIT_INSN(),
1406 },
1407 .errstr = "invalid bpf_context access",
1408 .result = REJECT,
1409 },
1410 {
1411 "check cb access: double, oob 6",
1412 .insns = {
1413 BPF_MOV64_IMM(BPF_REG_0, 0),
1414 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1,
1415 offsetof(struct __sk_buff, cb[0]) - 8),
1416 BPF_EXIT_INSN(),
1417 },
1418 .errstr = "invalid bpf_context access",
1419 .result = REJECT,
1420 },
1421 {
1422 "check cb access: double, wrong type",
1423 .insns = {
1424 BPF_MOV64_IMM(BPF_REG_0, 0),
1425 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0,
1426 offsetof(struct __sk_buff, cb[0])),
1427 BPF_EXIT_INSN(),
1428 },
1429 .errstr = "invalid bpf_context access",
1430 .result = REJECT,
1431 .prog_type = BPF_PROG_TYPE_CGROUP_SOCK,
1432 },
1433 {
1434 "check out of range skb->cb access",
1435 .insns = {
1436 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1437 offsetof(struct __sk_buff, cb[0]) + 256),
1438 BPF_EXIT_INSN(),
1439 },
1440 .errstr = "invalid bpf_context access",
1441 .errstr_unpriv = "",
1442 .result = REJECT,
1443 .prog_type = BPF_PROG_TYPE_SCHED_ACT,
1444 },
1445 {
1446 "write skb fields from socket prog",
1447 .insns = {
1448 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1449 offsetof(struct __sk_buff, cb[4])),
1450 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
1451 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1452 offsetof(struct __sk_buff, mark)),
1453 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1454 offsetof(struct __sk_buff, tc_index)),
1455 BPF_JMP_IMM(BPF_JGE, BPF_REG_0, 0, 1),
1456 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
1457 offsetof(struct __sk_buff, cb[0])),
1458 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
1459 offsetof(struct __sk_buff, cb[2])),
1460 BPF_EXIT_INSN(),
1461 },
1462 .result = ACCEPT,
1463 .errstr_unpriv = "R1 leaks addr",
1464 .result_unpriv = REJECT,
1465 },
1466 {
1467 "write skb fields from tc_cls_act prog",
1468 .insns = {
1469 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1470 offsetof(struct __sk_buff, cb[0])),
1471 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1472 offsetof(struct __sk_buff, mark)),
1473 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
1474 offsetof(struct __sk_buff, tc_index)),
1475 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1476 offsetof(struct __sk_buff, tc_index)),
1477 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_0,
1478 offsetof(struct __sk_buff, cb[3])),
1479 BPF_EXIT_INSN(),
1480 },
1481 .errstr_unpriv = "",
1482 .result_unpriv = REJECT,
1483 .result = ACCEPT,
1484 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
1485 },
1486 {
1487 "PTR_TO_STACK store/load",
1488 .insns = {
1489 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
1490 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -10),
1491 BPF_ST_MEM(BPF_DW, BPF_REG_1, 2, 0xfaceb00c),
1492 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 2),
1493 BPF_EXIT_INSN(),
1494 },
1495 .result = ACCEPT,
1496 },
1497 {
1498 "PTR_TO_STACK store/load - bad alignment on off",
1499 .insns = {
1500 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
1501 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1502 BPF_ST_MEM(BPF_DW, BPF_REG_1, 2, 0xfaceb00c),
1503 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 2),
1504 BPF_EXIT_INSN(),
1505 },
1506 .result = REJECT,
1507 .errstr = "misaligned access off -6 size 8",
1508 },
1509 {
1510 "PTR_TO_STACK store/load - bad alignment on reg",
1511 .insns = {
1512 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
1513 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -10),
1514 BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
1515 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
1516 BPF_EXIT_INSN(),
1517 },
1518 .result = REJECT,
1519 .errstr = "misaligned access off -2 size 8",
1520 },
1521 {
1522 "PTR_TO_STACK store/load - out of bounds low",
1523 .insns = {
1524 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
1525 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -80000),
1526 BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
1527 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
1528 BPF_EXIT_INSN(),
1529 },
1530 .result = REJECT,
1531 .errstr = "invalid stack off=-79992 size=8",
1532 },
1533 {
1534 "PTR_TO_STACK store/load - out of bounds high",
1535 .insns = {
1536 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
1537 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1538 BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
1539 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
1540 BPF_EXIT_INSN(),
1541 },
1542 .result = REJECT,
1543 .errstr = "invalid stack off=0 size=8",
1544 },
1545 {
1546 "unpriv: return pointer",
1547 .insns = {
1548 BPF_MOV64_REG(BPF_REG_0, BPF_REG_10),
1549 BPF_EXIT_INSN(),
1550 },
1551 .result = ACCEPT,
1552 .result_unpriv = REJECT,
1553 .errstr_unpriv = "R0 leaks addr",
1554 },
1555 {
1556 "unpriv: add const to pointer",
1557 .insns = {
1558 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
1559 BPF_MOV64_IMM(BPF_REG_0, 0),
1560 BPF_EXIT_INSN(),
1561 },
1562 .result = ACCEPT,
1563 .result_unpriv = REJECT,
1564 .errstr_unpriv = "R1 pointer arithmetic",
1565 },
1566 {
1567 "unpriv: add pointer to pointer",
1568 .insns = {
1569 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_10),
1570 BPF_MOV64_IMM(BPF_REG_0, 0),
1571 BPF_EXIT_INSN(),
1572 },
1573 .result = ACCEPT,
1574 .result_unpriv = REJECT,
1575 .errstr_unpriv = "R1 pointer arithmetic",
1576 },
1577 {
1578 "unpriv: neg pointer",
1579 .insns = {
1580 BPF_ALU64_IMM(BPF_NEG, BPF_REG_1, 0),
1581 BPF_MOV64_IMM(BPF_REG_0, 0),
1582 BPF_EXIT_INSN(),
1583 },
1584 .result = ACCEPT,
1585 .result_unpriv = REJECT,
1586 .errstr_unpriv = "R1 pointer arithmetic",
1587 },
1588 {
1589 "unpriv: cmp pointer with const",
1590 .insns = {
1591 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 0),
1592 BPF_MOV64_IMM(BPF_REG_0, 0),
1593 BPF_EXIT_INSN(),
1594 },
1595 .result = ACCEPT,
1596 .result_unpriv = REJECT,
1597 .errstr_unpriv = "R1 pointer comparison",
1598 },
1599 {
1600 "unpriv: cmp pointer with pointer",
1601 .insns = {
1602 BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_10, 0),
1603 BPF_MOV64_IMM(BPF_REG_0, 0),
1604 BPF_EXIT_INSN(),
1605 },
1606 .result = ACCEPT,
1607 .result_unpriv = REJECT,
1608 .errstr_unpriv = "R10 pointer comparison",
1609 },
1610 {
1611 "unpriv: check that printk is disallowed",
1612 .insns = {
1613 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1614 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
1615 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1616 BPF_MOV64_IMM(BPF_REG_2, 8),
1617 BPF_MOV64_REG(BPF_REG_3, BPF_REG_1),
1618 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1619 BPF_FUNC_trace_printk),
1620 BPF_MOV64_IMM(BPF_REG_0, 0),
1621 BPF_EXIT_INSN(),
1622 },
1623 .errstr_unpriv = "unknown func bpf_trace_printk#6",
1624 .result_unpriv = REJECT,
1625 .result = ACCEPT,
1626 },
1627 {
1628 "unpriv: pass pointer to helper function",
1629 .insns = {
1630 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1631 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
1632 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1633 BPF_LD_MAP_FD(BPF_REG_1, 0),
1634 BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
1635 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
1636 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1637 BPF_FUNC_map_update_elem),
1638 BPF_MOV64_IMM(BPF_REG_0, 0),
1639 BPF_EXIT_INSN(),
1640 },
1641 .fixup_map1 = { 3 },
1642 .errstr_unpriv = "R4 leaks addr",
1643 .result_unpriv = REJECT,
1644 .result = ACCEPT,
1645 },
1646 {
1647 "unpriv: indirectly pass pointer on stack to helper function",
1648 .insns = {
1649 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_10, -8),
1650 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
1651 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1652 BPF_LD_MAP_FD(BPF_REG_1, 0),
1653 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1654 BPF_FUNC_map_lookup_elem),
1655 BPF_MOV64_IMM(BPF_REG_0, 0),
1656 BPF_EXIT_INSN(),
1657 },
1658 .fixup_map1 = { 3 },
1659 .errstr = "invalid indirect read from stack off -8+0 size 8",
1660 .result = REJECT,
1661 },
1662 {
1663 "unpriv: mangle pointer on stack 1",
1664 .insns = {
1665 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_10, -8),
1666 BPF_ST_MEM(BPF_W, BPF_REG_10, -8, 0),
1667 BPF_MOV64_IMM(BPF_REG_0, 0),
1668 BPF_EXIT_INSN(),
1669 },
1670 .errstr_unpriv = "attempt to corrupt spilled",
1671 .result_unpriv = REJECT,
1672 .result = ACCEPT,
1673 },
1674 {
1675 "unpriv: mangle pointer on stack 2",
1676 .insns = {
1677 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_10, -8),
1678 BPF_ST_MEM(BPF_B, BPF_REG_10, -1, 0),
1679 BPF_MOV64_IMM(BPF_REG_0, 0),
1680 BPF_EXIT_INSN(),
1681 },
1682 .errstr_unpriv = "attempt to corrupt spilled",
1683 .result_unpriv = REJECT,
1684 .result = ACCEPT,
1685 },
1686 {
1687 "unpriv: read pointer from stack in small chunks",
1688 .insns = {
1689 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_10, -8),
1690 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_10, -8),
1691 BPF_MOV64_IMM(BPF_REG_0, 0),
1692 BPF_EXIT_INSN(),
1693 },
1694 .errstr = "invalid size",
1695 .result = REJECT,
1696 },
1697 {
1698 "unpriv: write pointer into ctx",
1699 .insns = {
1700 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_1, 0),
1701 BPF_MOV64_IMM(BPF_REG_0, 0),
1702 BPF_EXIT_INSN(),
1703 },
1704 .errstr_unpriv = "R1 leaks addr",
1705 .result_unpriv = REJECT,
1706 .errstr = "invalid bpf_context access",
1707 .result = REJECT,
1708 },
1709 {
1710 "unpriv: spill/fill of ctx",
1711 .insns = {
1712 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1713 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1714 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
1715 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
1716 BPF_MOV64_IMM(BPF_REG_0, 0),
1717 BPF_EXIT_INSN(),
1718 },
1719 .result = ACCEPT,
1720 },
1721 {
1722 "unpriv: spill/fill of ctx 2",
1723 .insns = {
1724 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1725 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1726 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
1727 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
1728 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1729 BPF_FUNC_get_hash_recalc),
1730 BPF_EXIT_INSN(),
1731 },
1732 .result = ACCEPT,
1733 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
1734 },
1735 {
1736 "unpriv: spill/fill of ctx 3",
1737 .insns = {
1738 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1739 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1740 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
1741 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_10, 0),
1742 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
1743 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1744 BPF_FUNC_get_hash_recalc),
1745 BPF_EXIT_INSN(),
1746 },
1747 .result = REJECT,
1748 .errstr = "R1 type=fp expected=ctx",
1749 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
1750 },
1751 {
1752 "unpriv: spill/fill of ctx 4",
1753 .insns = {
1754 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1755 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1756 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
1757 BPF_MOV64_IMM(BPF_REG_0, 1),
1758 BPF_RAW_INSN(BPF_STX | BPF_XADD | BPF_DW, BPF_REG_10,
1759 BPF_REG_0, -8, 0),
1760 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
1761 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1762 BPF_FUNC_get_hash_recalc),
1763 BPF_EXIT_INSN(),
1764 },
1765 .result = REJECT,
1766 .errstr = "R1 type=inv expected=ctx",
1767 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
1768 },
1769 {
1770 "unpriv: spill/fill of different pointers stx",
1771 .insns = {
1772 BPF_MOV64_IMM(BPF_REG_3, 42),
1773 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1774 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1775 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 3),
1776 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
1777 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1778 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_2, 0),
1779 BPF_JMP_IMM(BPF_JNE, BPF_REG_1, 0, 1),
1780 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
1781 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
1782 BPF_STX_MEM(BPF_W, BPF_REG_1, BPF_REG_3,
1783 offsetof(struct __sk_buff, mark)),
1784 BPF_MOV64_IMM(BPF_REG_0, 0),
1785 BPF_EXIT_INSN(),
1786 },
1787 .result = REJECT,
1788 .errstr = "same insn cannot be used with different pointers",
1789 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
1790 },
1791 {
1792 "unpriv: spill/fill of different pointers ldx",
1793 .insns = {
1794 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1795 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1796 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 3),
1797 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
1798 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2,
1799 -(__s32)offsetof(struct bpf_perf_event_data,
1800 sample_period) - 8),
1801 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_2, 0),
1802 BPF_JMP_IMM(BPF_JNE, BPF_REG_1, 0, 1),
1803 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
1804 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_6, 0),
1805 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_1,
1806 offsetof(struct bpf_perf_event_data,
1807 sample_period)),
1808 BPF_MOV64_IMM(BPF_REG_0, 0),
1809 BPF_EXIT_INSN(),
1810 },
1811 .result = REJECT,
1812 .errstr = "same insn cannot be used with different pointers",
1813 .prog_type = BPF_PROG_TYPE_PERF_EVENT,
1814 },
1815 {
1816 "unpriv: write pointer into map elem value",
1817 .insns = {
1818 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1819 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
1820 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1821 BPF_LD_MAP_FD(BPF_REG_1, 0),
1822 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1823 BPF_FUNC_map_lookup_elem),
1824 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
1825 BPF_STX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0),
1826 BPF_EXIT_INSN(),
1827 },
1828 .fixup_map1 = { 3 },
1829 .errstr_unpriv = "R0 leaks addr",
1830 .result_unpriv = REJECT,
1831 .result = ACCEPT,
1832 },
1833 {
1834 "unpriv: partial copy of pointer",
1835 .insns = {
1836 BPF_MOV32_REG(BPF_REG_1, BPF_REG_10),
1837 BPF_MOV64_IMM(BPF_REG_0, 0),
1838 BPF_EXIT_INSN(),
1839 },
1840 .errstr_unpriv = "R10 partial copy",
1841 .result_unpriv = REJECT,
1842 .result = ACCEPT,
1843 },
1844 {
1845 "unpriv: pass pointer to tail_call",
1846 .insns = {
1847 BPF_MOV64_REG(BPF_REG_3, BPF_REG_1),
1848 BPF_LD_MAP_FD(BPF_REG_2, 0),
1849 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1850 BPF_FUNC_tail_call),
1851 BPF_MOV64_IMM(BPF_REG_0, 0),
1852 BPF_EXIT_INSN(),
1853 },
1854 .fixup_prog = { 1 },
1855 .errstr_unpriv = "R3 leaks addr into helper",
1856 .result_unpriv = REJECT,
1857 .result = ACCEPT,
1858 },
1859 {
1860 "unpriv: cmp map pointer with zero",
1861 .insns = {
1862 BPF_MOV64_IMM(BPF_REG_1, 0),
1863 BPF_LD_MAP_FD(BPF_REG_1, 0),
1864 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 0),
1865 BPF_MOV64_IMM(BPF_REG_0, 0),
1866 BPF_EXIT_INSN(),
1867 },
1868 .fixup_map1 = { 1 },
1869 .errstr_unpriv = "R1 pointer comparison",
1870 .result_unpriv = REJECT,
1871 .result = ACCEPT,
1872 },
1873 {
1874 "unpriv: write into frame pointer",
1875 .insns = {
1876 BPF_MOV64_REG(BPF_REG_10, BPF_REG_1),
1877 BPF_MOV64_IMM(BPF_REG_0, 0),
1878 BPF_EXIT_INSN(),
1879 },
1880 .errstr = "frame pointer is read only",
1881 .result = REJECT,
1882 },
1883 {
1884 "unpriv: spill/fill frame pointer",
1885 .insns = {
1886 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1887 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1888 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_10, 0),
1889 BPF_LDX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, 0),
1890 BPF_MOV64_IMM(BPF_REG_0, 0),
1891 BPF_EXIT_INSN(),
1892 },
1893 .errstr = "frame pointer is read only",
1894 .result = REJECT,
1895 },
1896 {
1897 "unpriv: cmp of frame pointer",
1898 .insns = {
1899 BPF_JMP_IMM(BPF_JEQ, BPF_REG_10, 0, 0),
1900 BPF_MOV64_IMM(BPF_REG_0, 0),
1901 BPF_EXIT_INSN(),
1902 },
1903 .errstr_unpriv = "R10 pointer comparison",
1904 .result_unpriv = REJECT,
1905 .result = ACCEPT,
1906 },
1907 {
1908 "unpriv: adding of fp",
1909 .insns = {
1910 BPF_MOV64_IMM(BPF_REG_0, 0),
1911 BPF_MOV64_IMM(BPF_REG_1, 0),
1912 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_10),
1913 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, -8),
1914 BPF_EXIT_INSN(),
1915 },
1916 .errstr_unpriv = "pointer arithmetic prohibited",
1917 .result_unpriv = REJECT,
1918 .errstr = "R1 invalid mem access",
1919 .result = REJECT,
1920 },
1921 {
1922 "unpriv: cmp of stack pointer",
1923 .insns = {
1924 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
1925 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1926 BPF_JMP_IMM(BPF_JEQ, BPF_REG_2, 0, 0),
1927 BPF_MOV64_IMM(BPF_REG_0, 0),
1928 BPF_EXIT_INSN(),
1929 },
1930 .errstr_unpriv = "R2 pointer comparison",
1931 .result_unpriv = REJECT,
1932 .result = ACCEPT,
1933 },
1934 {
1935 "stack pointer arithmetic",
1936 .insns = {
1937 BPF_MOV64_IMM(BPF_REG_1, 4),
1938 BPF_JMP_IMM(BPF_JA, 0, 0, 0),
1939 BPF_MOV64_REG(BPF_REG_7, BPF_REG_10),
1940 BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, -10),
1941 BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, -10),
1942 BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
1943 BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_1),
1944 BPF_ST_MEM(0, BPF_REG_2, 4, 0),
1945 BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
1946 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 8),
1947 BPF_ST_MEM(0, BPF_REG_2, 4, 0),
1948 BPF_MOV64_IMM(BPF_REG_0, 0),
1949 BPF_EXIT_INSN(),
1950 },
1951 .result = ACCEPT,
1952 },
1953 {
1954 "raw_stack: no skb_load_bytes",
1955 .insns = {
1956 BPF_MOV64_IMM(BPF_REG_2, 4),
1957 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1958 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1959 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
1960 BPF_MOV64_IMM(BPF_REG_4, 8),
1961 /* Call to skb_load_bytes() omitted. */
1962 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
1963 BPF_EXIT_INSN(),
1964 },
1965 .result = REJECT,
1966 .errstr = "invalid read from stack off -8+0 size 8",
1967 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
1968 },
1969 {
1970 "raw_stack: skb_load_bytes, negative len",
1971 .insns = {
1972 BPF_MOV64_IMM(BPF_REG_2, 4),
1973 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1974 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1975 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
1976 BPF_MOV64_IMM(BPF_REG_4, -8),
1977 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1978 BPF_FUNC_skb_load_bytes),
1979 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
1980 BPF_EXIT_INSN(),
1981 },
1982 .result = REJECT,
1983 .errstr = "invalid stack type R3",
1984 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
1985 },
1986 {
1987 "raw_stack: skb_load_bytes, negative len 2",
1988 .insns = {
1989 BPF_MOV64_IMM(BPF_REG_2, 4),
1990 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
1991 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
1992 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
1993 BPF_MOV64_IMM(BPF_REG_4, ~0),
1994 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
1995 BPF_FUNC_skb_load_bytes),
1996 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
1997 BPF_EXIT_INSN(),
1998 },
1999 .result = REJECT,
2000 .errstr = "invalid stack type R3",
2001 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2002 },
2003 {
2004 "raw_stack: skb_load_bytes, zero len",
2005 .insns = {
2006 BPF_MOV64_IMM(BPF_REG_2, 4),
2007 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2008 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
2009 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2010 BPF_MOV64_IMM(BPF_REG_4, 0),
2011 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2012 BPF_FUNC_skb_load_bytes),
2013 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2014 BPF_EXIT_INSN(),
2015 },
2016 .result = REJECT,
2017 .errstr = "invalid stack type R3",
2018 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2019 },
2020 {
2021 "raw_stack: skb_load_bytes, no init",
2022 .insns = {
2023 BPF_MOV64_IMM(BPF_REG_2, 4),
2024 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2025 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
2026 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2027 BPF_MOV64_IMM(BPF_REG_4, 8),
2028 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2029 BPF_FUNC_skb_load_bytes),
2030 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2031 BPF_EXIT_INSN(),
2032 },
2033 .result = ACCEPT,
2034 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2035 },
2036 {
2037 "raw_stack: skb_load_bytes, init",
2038 .insns = {
2039 BPF_MOV64_IMM(BPF_REG_2, 4),
2040 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2041 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
2042 BPF_ST_MEM(BPF_DW, BPF_REG_6, 0, 0xcafe),
2043 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2044 BPF_MOV64_IMM(BPF_REG_4, 8),
2045 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2046 BPF_FUNC_skb_load_bytes),
2047 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2048 BPF_EXIT_INSN(),
2049 },
2050 .result = ACCEPT,
2051 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2052 },
2053 {
2054 "raw_stack: skb_load_bytes, spilled regs around bounds",
2055 .insns = {
2056 BPF_MOV64_IMM(BPF_REG_2, 4),
2057 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2058 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -16),
2059 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, -8),
2060 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 8),
2061 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2062 BPF_MOV64_IMM(BPF_REG_4, 8),
2063 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2064 BPF_FUNC_skb_load_bytes),
2065 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, -8),
2066 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_6, 8),
2067 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
2068 offsetof(struct __sk_buff, mark)),
2069 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_2,
2070 offsetof(struct __sk_buff, priority)),
2071 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
2072 BPF_EXIT_INSN(),
2073 },
2074 .result = ACCEPT,
2075 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2076 },
2077 {
2078 "raw_stack: skb_load_bytes, spilled regs corruption",
2079 .insns = {
2080 BPF_MOV64_IMM(BPF_REG_2, 4),
2081 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2082 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -8),
2083 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
2084 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2085 BPF_MOV64_IMM(BPF_REG_4, 8),
2086 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2087 BPF_FUNC_skb_load_bytes),
2088 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2089 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
2090 offsetof(struct __sk_buff, mark)),
2091 BPF_EXIT_INSN(),
2092 },
2093 .result = REJECT,
2094 .errstr = "R0 invalid mem access 'inv'",
2095 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2096 },
2097 {
2098 "raw_stack: skb_load_bytes, spilled regs corruption 2",
2099 .insns = {
2100 BPF_MOV64_IMM(BPF_REG_2, 4),
2101 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2102 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -16),
2103 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, -8),
2104 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
2105 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 8),
2106 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2107 BPF_MOV64_IMM(BPF_REG_4, 8),
2108 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2109 BPF_FUNC_skb_load_bytes),
2110 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, -8),
2111 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_6, 8),
2112 BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_6, 0),
2113 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
2114 offsetof(struct __sk_buff, mark)),
2115 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_2,
2116 offsetof(struct __sk_buff, priority)),
2117 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
2118 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_3,
2119 offsetof(struct __sk_buff, pkt_type)),
2120 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_3),
2121 BPF_EXIT_INSN(),
2122 },
2123 .result = REJECT,
2124 .errstr = "R3 invalid mem access 'inv'",
2125 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2126 },
2127 {
2128 "raw_stack: skb_load_bytes, spilled regs + data",
2129 .insns = {
2130 BPF_MOV64_IMM(BPF_REG_2, 4),
2131 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2132 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -16),
2133 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, -8),
2134 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 0),
2135 BPF_STX_MEM(BPF_DW, BPF_REG_6, BPF_REG_1, 8),
2136 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2137 BPF_MOV64_IMM(BPF_REG_4, 8),
2138 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2139 BPF_FUNC_skb_load_bytes),
2140 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, -8),
2141 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_6, 8),
2142 BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_6, 0),
2143 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
2144 offsetof(struct __sk_buff, mark)),
2145 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_2,
2146 offsetof(struct __sk_buff, priority)),
2147 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_2),
2148 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_3),
2149 BPF_EXIT_INSN(),
2150 },
2151 .result = ACCEPT,
2152 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2153 },
2154 {
2155 "raw_stack: skb_load_bytes, invalid access 1",
2156 .insns = {
2157 BPF_MOV64_IMM(BPF_REG_2, 4),
2158 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2159 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -513),
2160 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2161 BPF_MOV64_IMM(BPF_REG_4, 8),
2162 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2163 BPF_FUNC_skb_load_bytes),
2164 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2165 BPF_EXIT_INSN(),
2166 },
2167 .result = REJECT,
2168 .errstr = "invalid stack type R3 off=-513 access_size=8",
2169 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2170 },
2171 {
2172 "raw_stack: skb_load_bytes, invalid access 2",
2173 .insns = {
2174 BPF_MOV64_IMM(BPF_REG_2, 4),
2175 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2176 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -1),
2177 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2178 BPF_MOV64_IMM(BPF_REG_4, 8),
2179 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2180 BPF_FUNC_skb_load_bytes),
2181 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2182 BPF_EXIT_INSN(),
2183 },
2184 .result = REJECT,
2185 .errstr = "invalid stack type R3 off=-1 access_size=8",
2186 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2187 },
2188 {
2189 "raw_stack: skb_load_bytes, invalid access 3",
2190 .insns = {
2191 BPF_MOV64_IMM(BPF_REG_2, 4),
2192 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2193 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 0xffffffff),
2194 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2195 BPF_MOV64_IMM(BPF_REG_4, 0xffffffff),
2196 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2197 BPF_FUNC_skb_load_bytes),
2198 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2199 BPF_EXIT_INSN(),
2200 },
2201 .result = REJECT,
2202 .errstr = "invalid stack type R3 off=-1 access_size=-1",
2203 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2204 },
2205 {
2206 "raw_stack: skb_load_bytes, invalid access 4",
2207 .insns = {
2208 BPF_MOV64_IMM(BPF_REG_2, 4),
2209 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2210 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -1),
2211 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2212 BPF_MOV64_IMM(BPF_REG_4, 0x7fffffff),
2213 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2214 BPF_FUNC_skb_load_bytes),
2215 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2216 BPF_EXIT_INSN(),
2217 },
2218 .result = REJECT,
2219 .errstr = "invalid stack type R3 off=-1 access_size=2147483647",
2220 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2221 },
2222 {
2223 "raw_stack: skb_load_bytes, invalid access 5",
2224 .insns = {
2225 BPF_MOV64_IMM(BPF_REG_2, 4),
2226 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2227 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -512),
2228 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2229 BPF_MOV64_IMM(BPF_REG_4, 0x7fffffff),
2230 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2231 BPF_FUNC_skb_load_bytes),
2232 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2233 BPF_EXIT_INSN(),
2234 },
2235 .result = REJECT,
2236 .errstr = "invalid stack type R3 off=-512 access_size=2147483647",
2237 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2238 },
2239 {
2240 "raw_stack: skb_load_bytes, invalid access 6",
2241 .insns = {
2242 BPF_MOV64_IMM(BPF_REG_2, 4),
2243 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2244 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -512),
2245 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2246 BPF_MOV64_IMM(BPF_REG_4, 0),
2247 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2248 BPF_FUNC_skb_load_bytes),
2249 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2250 BPF_EXIT_INSN(),
2251 },
2252 .result = REJECT,
2253 .errstr = "invalid stack type R3 off=-512 access_size=0",
2254 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2255 },
2256 {
2257 "raw_stack: skb_load_bytes, large access",
2258 .insns = {
2259 BPF_MOV64_IMM(BPF_REG_2, 4),
2260 BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_10),
2261 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, -512),
2262 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2263 BPF_MOV64_IMM(BPF_REG_4, 512),
2264 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2265 BPF_FUNC_skb_load_bytes),
2266 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_6, 0),
2267 BPF_EXIT_INSN(),
2268 },
2269 .result = ACCEPT,
2270 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2271 },
2272 {
2273 "direct packet access: test1",
2274 .insns = {
2275 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2276 offsetof(struct __sk_buff, data)),
2277 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2278 offsetof(struct __sk_buff, data_end)),
2279 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2280 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2281 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
2282 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2283 BPF_MOV64_IMM(BPF_REG_0, 0),
2284 BPF_EXIT_INSN(),
2285 },
2286 .result = ACCEPT,
2287 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2288 },
2289 {
2290 "direct packet access: test2",
2291 .insns = {
2292 BPF_MOV64_IMM(BPF_REG_0, 1),
2293 BPF_LDX_MEM(BPF_W, BPF_REG_4, BPF_REG_1,
2294 offsetof(struct __sk_buff, data_end)),
2295 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2296 offsetof(struct __sk_buff, data)),
2297 BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
2298 BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 14),
2299 BPF_JMP_REG(BPF_JGT, BPF_REG_5, BPF_REG_4, 15),
2300 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_3, 7),
2301 BPF_LDX_MEM(BPF_B, BPF_REG_4, BPF_REG_3, 12),
2302 BPF_ALU64_IMM(BPF_MUL, BPF_REG_4, 14),
2303 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2304 offsetof(struct __sk_buff, data)),
2305 BPF_ALU64_REG(BPF_ADD, BPF_REG_3, BPF_REG_4),
2306 BPF_MOV64_REG(BPF_REG_2, BPF_REG_1),
2307 BPF_ALU64_IMM(BPF_LSH, BPF_REG_2, 48),
2308 BPF_ALU64_IMM(BPF_RSH, BPF_REG_2, 48),
2309 BPF_ALU64_REG(BPF_ADD, BPF_REG_3, BPF_REG_2),
2310 BPF_MOV64_REG(BPF_REG_2, BPF_REG_3),
2311 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 8),
2312 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1,
2313 offsetof(struct __sk_buff, data_end)),
2314 BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 1),
2315 BPF_LDX_MEM(BPF_B, BPF_REG_1, BPF_REG_3, 4),
2316 BPF_MOV64_IMM(BPF_REG_0, 0),
2317 BPF_EXIT_INSN(),
2318 },
2319 .result = ACCEPT,
2320 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2321 },
2322 {
2323 "direct packet access: test3",
2324 .insns = {
2325 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2326 offsetof(struct __sk_buff, data)),
2327 BPF_MOV64_IMM(BPF_REG_0, 0),
2328 BPF_EXIT_INSN(),
2329 },
2330 .errstr = "invalid bpf_context access off=76",
2331 .result = REJECT,
2332 .prog_type = BPF_PROG_TYPE_SOCKET_FILTER,
2333 },
2334 {
2335 "direct packet access: test4 (write)",
2336 .insns = {
2337 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2338 offsetof(struct __sk_buff, data)),
2339 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2340 offsetof(struct __sk_buff, data_end)),
2341 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2342 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2343 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
2344 BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
2345 BPF_MOV64_IMM(BPF_REG_0, 0),
2346 BPF_EXIT_INSN(),
2347 },
2348 .result = ACCEPT,
2349 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2350 },
2351 {
2352 "direct packet access: test5 (pkt_end >= reg, good access)",
2353 .insns = {
2354 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2355 offsetof(struct __sk_buff, data)),
2356 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2357 offsetof(struct __sk_buff, data_end)),
2358 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2359 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2360 BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 2),
2361 BPF_MOV64_IMM(BPF_REG_0, 1),
2362 BPF_EXIT_INSN(),
2363 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2364 BPF_MOV64_IMM(BPF_REG_0, 0),
2365 BPF_EXIT_INSN(),
2366 },
2367 .result = ACCEPT,
2368 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2369 },
2370 {
2371 "direct packet access: test6 (pkt_end >= reg, bad access)",
2372 .insns = {
2373 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2374 offsetof(struct __sk_buff, data)),
2375 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2376 offsetof(struct __sk_buff, data_end)),
2377 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2378 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2379 BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 3),
2380 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2381 BPF_MOV64_IMM(BPF_REG_0, 1),
2382 BPF_EXIT_INSN(),
2383 BPF_MOV64_IMM(BPF_REG_0, 0),
2384 BPF_EXIT_INSN(),
2385 },
2386 .errstr = "invalid access to packet",
2387 .result = REJECT,
2388 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2389 },
2390 {
2391 "direct packet access: test7 (pkt_end >= reg, both accesses)",
2392 .insns = {
2393 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2394 offsetof(struct __sk_buff, data)),
2395 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2396 offsetof(struct __sk_buff, data_end)),
2397 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2398 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2399 BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 3),
2400 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2401 BPF_MOV64_IMM(BPF_REG_0, 1),
2402 BPF_EXIT_INSN(),
2403 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2404 BPF_MOV64_IMM(BPF_REG_0, 0),
2405 BPF_EXIT_INSN(),
2406 },
2407 .errstr = "invalid access to packet",
2408 .result = REJECT,
2409 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2410 },
2411 {
2412 "direct packet access: test8 (double test, variant 1)",
2413 .insns = {
2414 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2415 offsetof(struct __sk_buff, data)),
2416 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2417 offsetof(struct __sk_buff, data_end)),
2418 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2419 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2420 BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 4),
2421 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
2422 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2423 BPF_MOV64_IMM(BPF_REG_0, 1),
2424 BPF_EXIT_INSN(),
2425 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2426 BPF_MOV64_IMM(BPF_REG_0, 0),
2427 BPF_EXIT_INSN(),
2428 },
2429 .result = ACCEPT,
2430 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2431 },
2432 {
2433 "direct packet access: test9 (double test, variant 2)",
2434 .insns = {
2435 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2436 offsetof(struct __sk_buff, data)),
2437 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2438 offsetof(struct __sk_buff, data_end)),
2439 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2440 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2441 BPF_JMP_REG(BPF_JGE, BPF_REG_3, BPF_REG_0, 2),
2442 BPF_MOV64_IMM(BPF_REG_0, 1),
2443 BPF_EXIT_INSN(),
2444 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
2445 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2446 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
2447 BPF_MOV64_IMM(BPF_REG_0, 0),
2448 BPF_EXIT_INSN(),
2449 },
2450 .result = ACCEPT,
2451 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2452 },
2453 {
2454 "direct packet access: test10 (write invalid)",
2455 .insns = {
2456 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2457 offsetof(struct __sk_buff, data)),
2458 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2459 offsetof(struct __sk_buff, data_end)),
2460 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2461 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2462 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 2),
2463 BPF_MOV64_IMM(BPF_REG_0, 0),
2464 BPF_EXIT_INSN(),
2465 BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
2466 BPF_MOV64_IMM(BPF_REG_0, 0),
2467 BPF_EXIT_INSN(),
2468 },
2469 .errstr = "invalid access to packet",
2470 .result = REJECT,
2471 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2472 },
2473 {
2474 "direct packet access: test11 (shift, good access)",
2475 .insns = {
2476 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2477 offsetof(struct __sk_buff, data)),
2478 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2479 offsetof(struct __sk_buff, data_end)),
2480 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2481 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 22),
2482 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 8),
2483 BPF_MOV64_IMM(BPF_REG_3, 144),
2484 BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
2485 BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 23),
2486 BPF_ALU64_IMM(BPF_RSH, BPF_REG_5, 3),
2487 BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
2488 BPF_ALU64_REG(BPF_ADD, BPF_REG_6, BPF_REG_5),
2489 BPF_MOV64_IMM(BPF_REG_0, 1),
2490 BPF_EXIT_INSN(),
2491 BPF_MOV64_IMM(BPF_REG_0, 0),
2492 BPF_EXIT_INSN(),
2493 },
2494 .result = ACCEPT,
2495 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2496 },
2497 {
2498 "direct packet access: test12 (and, good access)",
2499 .insns = {
2500 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2501 offsetof(struct __sk_buff, data)),
2502 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2503 offsetof(struct __sk_buff, data_end)),
2504 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2505 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 22),
2506 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 8),
2507 BPF_MOV64_IMM(BPF_REG_3, 144),
2508 BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
2509 BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 23),
2510 BPF_ALU64_IMM(BPF_AND, BPF_REG_5, 15),
2511 BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
2512 BPF_ALU64_REG(BPF_ADD, BPF_REG_6, BPF_REG_5),
2513 BPF_MOV64_IMM(BPF_REG_0, 1),
2514 BPF_EXIT_INSN(),
2515 BPF_MOV64_IMM(BPF_REG_0, 0),
2516 BPF_EXIT_INSN(),
2517 },
2518 .result = ACCEPT,
2519 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2520 },
2521 {
2522 "direct packet access: test13 (branches, good access)",
2523 .insns = {
2524 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2525 offsetof(struct __sk_buff, data)),
2526 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2527 offsetof(struct __sk_buff, data_end)),
2528 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2529 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 22),
2530 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 13),
2531 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2532 offsetof(struct __sk_buff, mark)),
2533 BPF_MOV64_IMM(BPF_REG_4, 1),
2534 BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_4, 2),
2535 BPF_MOV64_IMM(BPF_REG_3, 14),
2536 BPF_JMP_IMM(BPF_JA, 0, 0, 1),
2537 BPF_MOV64_IMM(BPF_REG_3, 24),
2538 BPF_MOV64_REG(BPF_REG_5, BPF_REG_3),
2539 BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 23),
2540 BPF_ALU64_IMM(BPF_AND, BPF_REG_5, 15),
2541 BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
2542 BPF_ALU64_REG(BPF_ADD, BPF_REG_6, BPF_REG_5),
2543 BPF_MOV64_IMM(BPF_REG_0, 1),
2544 BPF_EXIT_INSN(),
2545 BPF_MOV64_IMM(BPF_REG_0, 0),
2546 BPF_EXIT_INSN(),
2547 },
2548 .result = ACCEPT,
2549 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2550 },
2551 {
2552 "direct packet access: test14 (pkt_ptr += 0, CONST_IMM, good access)",
2553 .insns = {
2554 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2555 offsetof(struct __sk_buff, data)),
2556 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2557 offsetof(struct __sk_buff, data_end)),
2558 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2559 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 22),
2560 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 7),
2561 BPF_MOV64_IMM(BPF_REG_5, 12),
2562 BPF_ALU64_IMM(BPF_RSH, BPF_REG_5, 4),
2563 BPF_MOV64_REG(BPF_REG_6, BPF_REG_2),
2564 BPF_ALU64_REG(BPF_ADD, BPF_REG_6, BPF_REG_5),
2565 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_6, 0),
2566 BPF_MOV64_IMM(BPF_REG_0, 1),
2567 BPF_EXIT_INSN(),
2568 BPF_MOV64_IMM(BPF_REG_0, 0),
2569 BPF_EXIT_INSN(),
2570 },
2571 .result = ACCEPT,
2572 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2573 },
2574 {
2575 "direct packet access: test15 (spill with xadd)",
2576 .insns = {
2577 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2578 offsetof(struct __sk_buff, data)),
2579 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2580 offsetof(struct __sk_buff, data_end)),
2581 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2582 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2583 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 8),
2584 BPF_MOV64_IMM(BPF_REG_5, 4096),
2585 BPF_MOV64_REG(BPF_REG_4, BPF_REG_10),
2586 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
2587 BPF_STX_MEM(BPF_DW, BPF_REG_4, BPF_REG_2, 0),
2588 BPF_STX_XADD(BPF_DW, BPF_REG_4, BPF_REG_5, 0),
2589 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_4, 0),
2590 BPF_STX_MEM(BPF_W, BPF_REG_2, BPF_REG_5, 0),
2591 BPF_MOV64_IMM(BPF_REG_0, 0),
2592 BPF_EXIT_INSN(),
2593 },
2594 .errstr = "R2 invalid mem access 'inv'",
2595 .result = REJECT,
2596 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2597 },
2598 {
2599 "direct packet access: test16 (arith on data_end)",
2600 .insns = {
2601 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2602 offsetof(struct __sk_buff, data)),
2603 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2604 offsetof(struct __sk_buff, data_end)),
2605 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
2606 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
2607 BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, 16),
2608 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
2609 BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
2610 BPF_MOV64_IMM(BPF_REG_0, 0),
2611 BPF_EXIT_INSN(),
2612 },
2613 .errstr = "invalid access to packet",
2614 .result = REJECT,
2615 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2616 },
2617 {
2618 "helper access to packet: test1, valid packet_ptr range",
2619 .insns = {
2620 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2621 offsetof(struct xdp_md, data)),
2622 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2623 offsetof(struct xdp_md, data_end)),
2624 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
2625 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
2626 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 5),
2627 BPF_LD_MAP_FD(BPF_REG_1, 0),
2628 BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
2629 BPF_MOV64_IMM(BPF_REG_4, 0),
2630 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2631 BPF_FUNC_map_update_elem),
2632 BPF_MOV64_IMM(BPF_REG_0, 0),
2633 BPF_EXIT_INSN(),
2634 },
2635 .fixup_map1 = { 5 },
2636 .result_unpriv = ACCEPT,
2637 .result = ACCEPT,
2638 .prog_type = BPF_PROG_TYPE_XDP,
2639 },
2640 {
2641 "helper access to packet: test2, unchecked packet_ptr",
2642 .insns = {
2643 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2644 offsetof(struct xdp_md, data)),
2645 BPF_LD_MAP_FD(BPF_REG_1, 0),
2646 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2647 BPF_FUNC_map_lookup_elem),
2648 BPF_MOV64_IMM(BPF_REG_0, 0),
2649 BPF_EXIT_INSN(),
2650 },
2651 .fixup_map1 = { 1 },
2652 .result = REJECT,
2653 .errstr = "invalid access to packet",
2654 .prog_type = BPF_PROG_TYPE_XDP,
2655 },
2656 {
2657 "helper access to packet: test3, variable add",
2658 .insns = {
2659 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2660 offsetof(struct xdp_md, data)),
2661 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2662 offsetof(struct xdp_md, data_end)),
2663 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
2664 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 8),
2665 BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 10),
2666 BPF_LDX_MEM(BPF_B, BPF_REG_5, BPF_REG_2, 0),
2667 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
2668 BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_5),
2669 BPF_MOV64_REG(BPF_REG_5, BPF_REG_4),
2670 BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 8),
2671 BPF_JMP_REG(BPF_JGT, BPF_REG_5, BPF_REG_3, 4),
2672 BPF_LD_MAP_FD(BPF_REG_1, 0),
2673 BPF_MOV64_REG(BPF_REG_2, BPF_REG_4),
2674 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2675 BPF_FUNC_map_lookup_elem),
2676 BPF_MOV64_IMM(BPF_REG_0, 0),
2677 BPF_EXIT_INSN(),
2678 },
2679 .fixup_map1 = { 11 },
2680 .result = ACCEPT,
2681 .prog_type = BPF_PROG_TYPE_XDP,
2682 },
2683 {
2684 "helper access to packet: test4, packet_ptr with bad range",
2685 .insns = {
2686 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2687 offsetof(struct xdp_md, data)),
2688 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2689 offsetof(struct xdp_md, data_end)),
2690 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
2691 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 4),
2692 BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 2),
2693 BPF_MOV64_IMM(BPF_REG_0, 0),
2694 BPF_EXIT_INSN(),
2695 BPF_LD_MAP_FD(BPF_REG_1, 0),
2696 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2697 BPF_FUNC_map_lookup_elem),
2698 BPF_MOV64_IMM(BPF_REG_0, 0),
2699 BPF_EXIT_INSN(),
2700 },
2701 .fixup_map1 = { 7 },
2702 .result = REJECT,
2703 .errstr = "invalid access to packet",
2704 .prog_type = BPF_PROG_TYPE_XDP,
2705 },
2706 {
2707 "helper access to packet: test5, packet_ptr with too short range",
2708 .insns = {
2709 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2710 offsetof(struct xdp_md, data)),
2711 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2712 offsetof(struct xdp_md, data_end)),
2713 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
2714 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
2715 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 7),
2716 BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 3),
2717 BPF_LD_MAP_FD(BPF_REG_1, 0),
2718 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2719 BPF_FUNC_map_lookup_elem),
2720 BPF_MOV64_IMM(BPF_REG_0, 0),
2721 BPF_EXIT_INSN(),
2722 },
2723 .fixup_map1 = { 6 },
2724 .result = REJECT,
2725 .errstr = "invalid access to packet",
2726 .prog_type = BPF_PROG_TYPE_XDP,
2727 },
2728 {
2729 "helper access to packet: test6, cls valid packet_ptr range",
2730 .insns = {
2731 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2732 offsetof(struct __sk_buff, data)),
2733 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2734 offsetof(struct __sk_buff, data_end)),
2735 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
2736 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
2737 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 5),
2738 BPF_LD_MAP_FD(BPF_REG_1, 0),
2739 BPF_MOV64_REG(BPF_REG_3, BPF_REG_2),
2740 BPF_MOV64_IMM(BPF_REG_4, 0),
2741 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2742 BPF_FUNC_map_update_elem),
2743 BPF_MOV64_IMM(BPF_REG_0, 0),
2744 BPF_EXIT_INSN(),
2745 },
2746 .fixup_map1 = { 5 },
2747 .result = ACCEPT,
2748 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2749 },
2750 {
2751 "helper access to packet: test7, cls unchecked packet_ptr",
2752 .insns = {
2753 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2754 offsetof(struct __sk_buff, data)),
2755 BPF_LD_MAP_FD(BPF_REG_1, 0),
2756 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2757 BPF_FUNC_map_lookup_elem),
2758 BPF_MOV64_IMM(BPF_REG_0, 0),
2759 BPF_EXIT_INSN(),
2760 },
2761 .fixup_map1 = { 1 },
2762 .result = REJECT,
2763 .errstr = "invalid access to packet",
2764 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2765 },
2766 {
2767 "helper access to packet: test8, cls variable add",
2768 .insns = {
2769 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2770 offsetof(struct __sk_buff, data)),
2771 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2772 offsetof(struct __sk_buff, data_end)),
2773 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
2774 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 8),
2775 BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 10),
2776 BPF_LDX_MEM(BPF_B, BPF_REG_5, BPF_REG_2, 0),
2777 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
2778 BPF_ALU64_REG(BPF_ADD, BPF_REG_4, BPF_REG_5),
2779 BPF_MOV64_REG(BPF_REG_5, BPF_REG_4),
2780 BPF_ALU64_IMM(BPF_ADD, BPF_REG_5, 8),
2781 BPF_JMP_REG(BPF_JGT, BPF_REG_5, BPF_REG_3, 4),
2782 BPF_LD_MAP_FD(BPF_REG_1, 0),
2783 BPF_MOV64_REG(BPF_REG_2, BPF_REG_4),
2784 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2785 BPF_FUNC_map_lookup_elem),
2786 BPF_MOV64_IMM(BPF_REG_0, 0),
2787 BPF_EXIT_INSN(),
2788 },
2789 .fixup_map1 = { 11 },
2790 .result = ACCEPT,
2791 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2792 },
2793 {
2794 "helper access to packet: test9, cls packet_ptr with bad range",
2795 .insns = {
2796 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2797 offsetof(struct __sk_buff, data)),
2798 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2799 offsetof(struct __sk_buff, data_end)),
2800 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
2801 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 4),
2802 BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 2),
2803 BPF_MOV64_IMM(BPF_REG_0, 0),
2804 BPF_EXIT_INSN(),
2805 BPF_LD_MAP_FD(BPF_REG_1, 0),
2806 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2807 BPF_FUNC_map_lookup_elem),
2808 BPF_MOV64_IMM(BPF_REG_0, 0),
2809 BPF_EXIT_INSN(),
2810 },
2811 .fixup_map1 = { 7 },
2812 .result = REJECT,
2813 .errstr = "invalid access to packet",
2814 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2815 },
2816 {
2817 "helper access to packet: test10, cls packet_ptr with too short range",
2818 .insns = {
2819 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
2820 offsetof(struct __sk_buff, data)),
2821 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
2822 offsetof(struct __sk_buff, data_end)),
2823 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
2824 BPF_MOV64_REG(BPF_REG_4, BPF_REG_2),
2825 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, 7),
2826 BPF_JMP_REG(BPF_JGT, BPF_REG_4, BPF_REG_3, 3),
2827 BPF_LD_MAP_FD(BPF_REG_1, 0),
2828 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2829 BPF_FUNC_map_lookup_elem),
2830 BPF_MOV64_IMM(BPF_REG_0, 0),
2831 BPF_EXIT_INSN(),
2832 },
2833 .fixup_map1 = { 6 },
2834 .result = REJECT,
2835 .errstr = "invalid access to packet",
2836 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2837 },
2838 {
2839 "helper access to packet: test11, cls unsuitable helper 1",
2840 .insns = {
2841 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
2842 offsetof(struct __sk_buff, data)),
2843 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
2844 offsetof(struct __sk_buff, data_end)),
2845 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
2846 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2847 BPF_ALU64_IMM(BPF_ADD, BPF_REG_3, 7),
2848 BPF_JMP_REG(BPF_JGT, BPF_REG_3, BPF_REG_7, 4),
2849 BPF_MOV64_IMM(BPF_REG_2, 0),
2850 BPF_MOV64_IMM(BPF_REG_4, 42),
2851 BPF_MOV64_IMM(BPF_REG_5, 0),
2852 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2853 BPF_FUNC_skb_store_bytes),
2854 BPF_MOV64_IMM(BPF_REG_0, 0),
2855 BPF_EXIT_INSN(),
2856 },
2857 .result = REJECT,
2858 .errstr = "helper access to the packet",
2859 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2860 },
2861 {
2862 "helper access to packet: test12, cls unsuitable helper 2",
2863 .insns = {
2864 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
2865 offsetof(struct __sk_buff, data)),
2866 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
2867 offsetof(struct __sk_buff, data_end)),
2868 BPF_MOV64_REG(BPF_REG_3, BPF_REG_6),
2869 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 8),
2870 BPF_JMP_REG(BPF_JGT, BPF_REG_6, BPF_REG_7, 3),
2871 BPF_MOV64_IMM(BPF_REG_2, 0),
2872 BPF_MOV64_IMM(BPF_REG_4, 4),
2873 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2874 BPF_FUNC_skb_load_bytes),
2875 BPF_MOV64_IMM(BPF_REG_0, 0),
2876 BPF_EXIT_INSN(),
2877 },
2878 .result = REJECT,
2879 .errstr = "helper access to the packet",
2880 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2881 },
2882 {
2883 "helper access to packet: test13, cls helper ok",
2884 .insns = {
2885 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
2886 offsetof(struct __sk_buff, data)),
2887 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
2888 offsetof(struct __sk_buff, data_end)),
2889 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
2890 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2891 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
2892 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
2893 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2894 BPF_MOV64_IMM(BPF_REG_2, 4),
2895 BPF_MOV64_IMM(BPF_REG_3, 0),
2896 BPF_MOV64_IMM(BPF_REG_4, 0),
2897 BPF_MOV64_IMM(BPF_REG_5, 0),
2898 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2899 BPF_FUNC_csum_diff),
2900 BPF_MOV64_IMM(BPF_REG_0, 0),
2901 BPF_EXIT_INSN(),
2902 },
2903 .result = ACCEPT,
2904 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2905 },
2906 {
2907 "helper access to packet: test14, cls helper fail sub",
2908 .insns = {
2909 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
2910 offsetof(struct __sk_buff, data)),
2911 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
2912 offsetof(struct __sk_buff, data_end)),
2913 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
2914 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2915 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
2916 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
2917 BPF_ALU64_IMM(BPF_SUB, BPF_REG_1, 4),
2918 BPF_MOV64_IMM(BPF_REG_2, 4),
2919 BPF_MOV64_IMM(BPF_REG_3, 0),
2920 BPF_MOV64_IMM(BPF_REG_4, 0),
2921 BPF_MOV64_IMM(BPF_REG_5, 0),
2922 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2923 BPF_FUNC_csum_diff),
2924 BPF_MOV64_IMM(BPF_REG_0, 0),
2925 BPF_EXIT_INSN(),
2926 },
2927 .result = REJECT,
2928 .errstr = "type=inv expected=fp",
2929 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2930 },
2931 {
2932 "helper access to packet: test15, cls helper fail range 1",
2933 .insns = {
2934 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
2935 offsetof(struct __sk_buff, data)),
2936 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
2937 offsetof(struct __sk_buff, data_end)),
2938 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
2939 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2940 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
2941 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
2942 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2943 BPF_MOV64_IMM(BPF_REG_2, 8),
2944 BPF_MOV64_IMM(BPF_REG_3, 0),
2945 BPF_MOV64_IMM(BPF_REG_4, 0),
2946 BPF_MOV64_IMM(BPF_REG_5, 0),
2947 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2948 BPF_FUNC_csum_diff),
2949 BPF_MOV64_IMM(BPF_REG_0, 0),
2950 BPF_EXIT_INSN(),
2951 },
2952 .result = REJECT,
2953 .errstr = "invalid access to packet",
2954 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2955 },
2956 {
2957 "helper access to packet: test16, cls helper fail range 2",
2958 .insns = {
2959 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
2960 offsetof(struct __sk_buff, data)),
2961 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
2962 offsetof(struct __sk_buff, data_end)),
2963 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
2964 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2965 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
2966 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
2967 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2968 BPF_MOV64_IMM(BPF_REG_2, -9),
2969 BPF_MOV64_IMM(BPF_REG_3, 0),
2970 BPF_MOV64_IMM(BPF_REG_4, 0),
2971 BPF_MOV64_IMM(BPF_REG_5, 0),
2972 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2973 BPF_FUNC_csum_diff),
2974 BPF_MOV64_IMM(BPF_REG_0, 0),
2975 BPF_EXIT_INSN(),
2976 },
2977 .result = REJECT,
2978 .errstr = "invalid access to packet",
2979 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
2980 },
2981 {
2982 "helper access to packet: test17, cls helper fail range 3",
2983 .insns = {
2984 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
2985 offsetof(struct __sk_buff, data)),
2986 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
2987 offsetof(struct __sk_buff, data_end)),
2988 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
2989 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2990 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
2991 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
2992 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
2993 BPF_MOV64_IMM(BPF_REG_2, ~0),
2994 BPF_MOV64_IMM(BPF_REG_3, 0),
2995 BPF_MOV64_IMM(BPF_REG_4, 0),
2996 BPF_MOV64_IMM(BPF_REG_5, 0),
2997 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
2998 BPF_FUNC_csum_diff),
2999 BPF_MOV64_IMM(BPF_REG_0, 0),
3000 BPF_EXIT_INSN(),
3001 },
3002 .result = REJECT,
3003 .errstr = "invalid access to packet",
3004 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
3005 },
3006 {
3007 "helper access to packet: test18, cls helper fail range zero",
3008 .insns = {
3009 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
3010 offsetof(struct __sk_buff, data)),
3011 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
3012 offsetof(struct __sk_buff, data_end)),
3013 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
3014 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
3015 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
3016 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
3017 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
3018 BPF_MOV64_IMM(BPF_REG_2, 0),
3019 BPF_MOV64_IMM(BPF_REG_3, 0),
3020 BPF_MOV64_IMM(BPF_REG_4, 0),
3021 BPF_MOV64_IMM(BPF_REG_5, 0),
3022 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3023 BPF_FUNC_csum_diff),
3024 BPF_MOV64_IMM(BPF_REG_0, 0),
3025 BPF_EXIT_INSN(),
3026 },
3027 .result = REJECT,
3028 .errstr = "invalid access to packet",
3029 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
3030 },
3031 {
3032 "helper access to packet: test19, pkt end as input",
3033 .insns = {
3034 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
3035 offsetof(struct __sk_buff, data)),
3036 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
3037 offsetof(struct __sk_buff, data_end)),
3038 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
3039 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
3040 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
3041 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
3042 BPF_MOV64_REG(BPF_REG_1, BPF_REG_7),
3043 BPF_MOV64_IMM(BPF_REG_2, 4),
3044 BPF_MOV64_IMM(BPF_REG_3, 0),
3045 BPF_MOV64_IMM(BPF_REG_4, 0),
3046 BPF_MOV64_IMM(BPF_REG_5, 0),
3047 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3048 BPF_FUNC_csum_diff),
3049 BPF_MOV64_IMM(BPF_REG_0, 0),
3050 BPF_EXIT_INSN(),
3051 },
3052 .result = REJECT,
3053 .errstr = "R1 type=pkt_end expected=fp",
3054 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
3055 },
3056 {
3057 "helper access to packet: test20, wrong reg",
3058 .insns = {
3059 BPF_LDX_MEM(BPF_W, BPF_REG_6, BPF_REG_1,
3060 offsetof(struct __sk_buff, data)),
3061 BPF_LDX_MEM(BPF_W, BPF_REG_7, BPF_REG_1,
3062 offsetof(struct __sk_buff, data_end)),
3063 BPF_ALU64_IMM(BPF_ADD, BPF_REG_6, 1),
3064 BPF_MOV64_REG(BPF_REG_1, BPF_REG_6),
3065 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 7),
3066 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_7, 6),
3067 BPF_MOV64_IMM(BPF_REG_2, 4),
3068 BPF_MOV64_IMM(BPF_REG_3, 0),
3069 BPF_MOV64_IMM(BPF_REG_4, 0),
3070 BPF_MOV64_IMM(BPF_REG_5, 0),
3071 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3072 BPF_FUNC_csum_diff),
3073 BPF_MOV64_IMM(BPF_REG_0, 0),
3074 BPF_EXIT_INSN(),
3075 },
3076 .result = REJECT,
3077 .errstr = "invalid access to packet",
3078 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
3079 },
3080 {
3081 "valid map access into an array with a constant",
3082 .insns = {
3083 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3084 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3085 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3086 BPF_LD_MAP_FD(BPF_REG_1, 0),
3087 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3088 BPF_FUNC_map_lookup_elem),
3089 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
3090 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
3091 offsetof(struct test_val, foo)),
3092 BPF_EXIT_INSN(),
3093 },
3094 .fixup_map2 = { 3 },
3095 .errstr_unpriv = "R0 leaks addr",
3096 .result_unpriv = REJECT,
3097 .result = ACCEPT,
3098 },
3099 {
3100 "valid map access into an array with a register",
3101 .insns = {
3102 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3103 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3104 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3105 BPF_LD_MAP_FD(BPF_REG_1, 0),
3106 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3107 BPF_FUNC_map_lookup_elem),
3108 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
3109 BPF_MOV64_IMM(BPF_REG_1, 4),
3110 BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
3111 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
3112 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
3113 offsetof(struct test_val, foo)),
3114 BPF_EXIT_INSN(),
3115 },
3116 .fixup_map2 = { 3 },
3117 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3118 .result_unpriv = REJECT,
3119 .result = ACCEPT,
3120 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3121 },
3122 {
3123 "valid map access into an array with a variable",
3124 .insns = {
3125 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3126 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3127 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3128 BPF_LD_MAP_FD(BPF_REG_1, 0),
3129 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3130 BPF_FUNC_map_lookup_elem),
3131 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
3132 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
3133 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, MAX_ENTRIES, 3),
3134 BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
3135 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
3136 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
3137 offsetof(struct test_val, foo)),
3138 BPF_EXIT_INSN(),
3139 },
3140 .fixup_map2 = { 3 },
3141 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3142 .result_unpriv = REJECT,
3143 .result = ACCEPT,
3144 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3145 },
3146 {
3147 "valid map access into an array with a signed variable",
3148 .insns = {
3149 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3150 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3151 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3152 BPF_LD_MAP_FD(BPF_REG_1, 0),
3153 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3154 BPF_FUNC_map_lookup_elem),
3155 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 9),
3156 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
3157 BPF_JMP_IMM(BPF_JSGT, BPF_REG_1, 0xffffffff, 1),
3158 BPF_MOV32_IMM(BPF_REG_1, 0),
3159 BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES),
3160 BPF_JMP_REG(BPF_JSGT, BPF_REG_2, BPF_REG_1, 1),
3161 BPF_MOV32_IMM(BPF_REG_1, 0),
3162 BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2),
3163 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
3164 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
3165 offsetof(struct test_val, foo)),
3166 BPF_EXIT_INSN(),
3167 },
3168 .fixup_map2 = { 3 },
3169 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3170 .result_unpriv = REJECT,
3171 .result = ACCEPT,
3172 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3173 },
3174 {
3175 "invalid map access into an array with a constant",
3176 .insns = {
3177 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3178 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3179 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3180 BPF_LD_MAP_FD(BPF_REG_1, 0),
3181 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3182 BPF_FUNC_map_lookup_elem),
3183 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
3184 BPF_ST_MEM(BPF_DW, BPF_REG_0, (MAX_ENTRIES + 1) << 2,
3185 offsetof(struct test_val, foo)),
3186 BPF_EXIT_INSN(),
3187 },
3188 .fixup_map2 = { 3 },
3189 .errstr = "invalid access to map value, value_size=48 off=48 size=8",
3190 .result = REJECT,
3191 },
3192 {
3193 "invalid map access into an array with a register",
3194 .insns = {
3195 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3196 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3197 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3198 BPF_LD_MAP_FD(BPF_REG_1, 0),
3199 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3200 BPF_FUNC_map_lookup_elem),
3201 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
3202 BPF_MOV64_IMM(BPF_REG_1, MAX_ENTRIES + 1),
3203 BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
3204 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
3205 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
3206 offsetof(struct test_val, foo)),
3207 BPF_EXIT_INSN(),
3208 },
3209 .fixup_map2 = { 3 },
3210 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3211 .errstr = "R0 min value is outside of the array range",
3212 .result_unpriv = REJECT,
3213 .result = REJECT,
3214 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3215 },
3216 {
3217 "invalid map access into an array with a variable",
3218 .insns = {
3219 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3220 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3221 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3222 BPF_LD_MAP_FD(BPF_REG_1, 0),
3223 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3224 BPF_FUNC_map_lookup_elem),
3225 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
3226 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
3227 BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
3228 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
3229 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
3230 offsetof(struct test_val, foo)),
3231 BPF_EXIT_INSN(),
3232 },
3233 .fixup_map2 = { 3 },
3234 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3235 .errstr = "R0 min value is negative, either use unsigned index or do a if (index >=0) check.",
3236 .result_unpriv = REJECT,
3237 .result = REJECT,
3238 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3239 },
3240 {
3241 "invalid map access into an array with no floor check",
3242 .insns = {
3243 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3244 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3245 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3246 BPF_LD_MAP_FD(BPF_REG_1, 0),
3247 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3248 BPF_FUNC_map_lookup_elem),
3249 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
3250 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
3251 BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES),
3252 BPF_JMP_REG(BPF_JSGT, BPF_REG_2, BPF_REG_1, 1),
3253 BPF_MOV32_IMM(BPF_REG_1, 0),
3254 BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2),
3255 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
3256 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
3257 offsetof(struct test_val, foo)),
3258 BPF_EXIT_INSN(),
3259 },
3260 .fixup_map2 = { 3 },
3261 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3262 .errstr = "R0 min value is negative, either use unsigned index or do a if (index >=0) check.",
3263 .result_unpriv = REJECT,
3264 .result = REJECT,
3265 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3266 },
3267 {
3268 "invalid map access into an array with a invalid max check",
3269 .insns = {
3270 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3271 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3272 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3273 BPF_LD_MAP_FD(BPF_REG_1, 0),
3274 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3275 BPF_FUNC_map_lookup_elem),
3276 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
3277 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
3278 BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES + 1),
3279 BPF_JMP_REG(BPF_JGT, BPF_REG_2, BPF_REG_1, 1),
3280 BPF_MOV32_IMM(BPF_REG_1, 0),
3281 BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2),
3282 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
3283 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
3284 offsetof(struct test_val, foo)),
3285 BPF_EXIT_INSN(),
3286 },
3287 .fixup_map2 = { 3 },
3288 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3289 .errstr = "invalid access to map value, value_size=48 off=44 size=8",
3290 .result_unpriv = REJECT,
3291 .result = REJECT,
3292 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3293 },
3294 {
3295 "invalid map access into an array with a invalid max check",
3296 .insns = {
3297 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3298 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3299 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3300 BPF_LD_MAP_FD(BPF_REG_1, 0),
3301 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3302 BPF_FUNC_map_lookup_elem),
3303 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 10),
3304 BPF_MOV64_REG(BPF_REG_8, BPF_REG_0),
3305 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3306 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3307 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3308 BPF_LD_MAP_FD(BPF_REG_1, 0),
3309 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3310 BPF_FUNC_map_lookup_elem),
3311 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
3312 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_8),
3313 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_0,
3314 offsetof(struct test_val, foo)),
3315 BPF_EXIT_INSN(),
3316 },
3317 .fixup_map2 = { 3, 11 },
3318 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3319 .errstr = "R0 min value is negative, either use unsigned index or do a if (index >=0) check.",
3320 .result_unpriv = REJECT,
3321 .result = REJECT,
3322 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3323 },
3324 {
3325 "multiple registers share map_lookup_elem result",
3326 .insns = {
3327 BPF_MOV64_IMM(BPF_REG_1, 10),
3328 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
3329 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3330 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3331 BPF_LD_MAP_FD(BPF_REG_1, 0),
3332 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3333 BPF_FUNC_map_lookup_elem),
3334 BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
3335 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
3336 BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
3337 BPF_EXIT_INSN(),
3338 },
3339 .fixup_map1 = { 4 },
3340 .result = ACCEPT,
3341 .prog_type = BPF_PROG_TYPE_SCHED_CLS
3342 },
3343 {
3344 "invalid memory access with multiple map_lookup_elem calls",
3345 .insns = {
3346 BPF_MOV64_IMM(BPF_REG_1, 10),
3347 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
3348 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3349 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3350 BPF_LD_MAP_FD(BPF_REG_1, 0),
3351 BPF_MOV64_REG(BPF_REG_8, BPF_REG_1),
3352 BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
3353 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3354 BPF_FUNC_map_lookup_elem),
3355 BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
3356 BPF_MOV64_REG(BPF_REG_1, BPF_REG_8),
3357 BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
3358 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3359 BPF_FUNC_map_lookup_elem),
3360 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
3361 BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
3362 BPF_EXIT_INSN(),
3363 },
3364 .fixup_map1 = { 4 },
3365 .result = REJECT,
3366 .errstr = "R4 !read_ok",
3367 .prog_type = BPF_PROG_TYPE_SCHED_CLS
3368 },
3369 {
3370 "valid indirect map_lookup_elem access with 2nd lookup in branch",
3371 .insns = {
3372 BPF_MOV64_IMM(BPF_REG_1, 10),
3373 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
3374 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3375 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3376 BPF_LD_MAP_FD(BPF_REG_1, 0),
3377 BPF_MOV64_REG(BPF_REG_8, BPF_REG_1),
3378 BPF_MOV64_REG(BPF_REG_7, BPF_REG_2),
3379 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3380 BPF_FUNC_map_lookup_elem),
3381 BPF_MOV64_IMM(BPF_REG_2, 10),
3382 BPF_JMP_IMM(BPF_JNE, BPF_REG_2, 0, 3),
3383 BPF_MOV64_REG(BPF_REG_1, BPF_REG_8),
3384 BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
3385 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3386 BPF_FUNC_map_lookup_elem),
3387 BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
3388 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
3389 BPF_ST_MEM(BPF_DW, BPF_REG_4, 0, 0),
3390 BPF_EXIT_INSN(),
3391 },
3392 .fixup_map1 = { 4 },
3393 .result = ACCEPT,
3394 .prog_type = BPF_PROG_TYPE_SCHED_CLS
3395 },
3396 {
3397 "multiple registers share map_lookup_elem bad reg type",
3398 .insns = {
3399 BPF_MOV64_IMM(BPF_REG_1, 10),
3400 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_1, -8),
3401 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3402 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3403 BPF_LD_MAP_FD(BPF_REG_1, 0),
3404 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
3405 BPF_FUNC_map_lookup_elem),
3406 BPF_MOV64_REG(BPF_REG_2, BPF_REG_0),
3407 BPF_MOV64_REG(BPF_REG_3, BPF_REG_0),
3408 BPF_MOV64_REG(BPF_REG_4, BPF_REG_0),
3409 BPF_MOV64_REG(BPF_REG_5, BPF_REG_0),
3410 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
3411 BPF_MOV64_IMM(BPF_REG_1, 1),
3412 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
3413 BPF_MOV64_IMM(BPF_REG_1, 2),
3414 BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0, 1),
3415 BPF_ST_MEM(BPF_DW, BPF_REG_3, 0, 0),
3416 BPF_MOV64_IMM(BPF_REG_1, 3),
3417 BPF_EXIT_INSN(),
3418 },
3419 .fixup_map1 = { 4 },
3420 .result = REJECT,
3421 .errstr = "R3 invalid mem access 'inv'",
3422 .prog_type = BPF_PROG_TYPE_SCHED_CLS
3423 },
3424 {
3425 "invalid map access from else condition",
3426 .insns = {
3427 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
3428 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3429 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3430 BPF_LD_MAP_FD(BPF_REG_1, 0),
3431 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
3432 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
3433 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
3434 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, MAX_ENTRIES-1, 1),
3435 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 1),
3436 BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
3437 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
3438 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, offsetof(struct test_val, foo)),
3439 BPF_EXIT_INSN(),
3440 },
3441 .fixup_map2 = { 3 },
3442 .errstr = "R0 unbounded memory access, make sure to bounds check any array access into a map",
3443 .result = REJECT,
3444 .errstr_unpriv = "R0 pointer arithmetic prohibited",
3445 .result_unpriv = REJECT,
3446 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
3447 },
3448 {
3449 "constant register |= constant should keep constant type",
3450 .insns = {
3451 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
3452 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -48),
3453 BPF_MOV64_IMM(BPF_REG_2, 34),
3454 BPF_ALU64_IMM(BPF_OR, BPF_REG_2, 13),
3455 BPF_MOV64_IMM(BPF_REG_3, 0),
3456 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3457 BPF_EXIT_INSN(),
3458 },
3459 .result = ACCEPT,
3460 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3461 },
3462 {
3463 "constant register |= constant should not bypass stack boundary checks",
3464 .insns = {
3465 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
3466 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -48),
3467 BPF_MOV64_IMM(BPF_REG_2, 34),
3468 BPF_ALU64_IMM(BPF_OR, BPF_REG_2, 24),
3469 BPF_MOV64_IMM(BPF_REG_3, 0),
3470 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3471 BPF_EXIT_INSN(),
3472 },
3473 .errstr = "invalid stack type R1 off=-48 access_size=58",
3474 .result = REJECT,
3475 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3476 },
3477 {
3478 "constant register |= constant register should keep constant type",
3479 .insns = {
3480 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
3481 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -48),
3482 BPF_MOV64_IMM(BPF_REG_2, 34),
3483 BPF_MOV64_IMM(BPF_REG_4, 13),
3484 BPF_ALU64_REG(BPF_OR, BPF_REG_2, BPF_REG_4),
3485 BPF_MOV64_IMM(BPF_REG_3, 0),
3486 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3487 BPF_EXIT_INSN(),
3488 },
3489 .result = ACCEPT,
3490 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3491 },
3492 {
3493 "constant register |= constant register should not bypass stack boundary checks",
3494 .insns = {
3495 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
3496 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -48),
3497 BPF_MOV64_IMM(BPF_REG_2, 34),
3498 BPF_MOV64_IMM(BPF_REG_4, 24),
3499 BPF_ALU64_REG(BPF_OR, BPF_REG_2, BPF_REG_4),
3500 BPF_MOV64_IMM(BPF_REG_3, 0),
3501 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3502 BPF_EXIT_INSN(),
3503 },
3504 .errstr = "invalid stack type R1 off=-48 access_size=58",
3505 .result = REJECT,
3506 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3507 },
3508 {
3509 "invalid direct packet write for LWT_IN",
3510 .insns = {
3511 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
3512 offsetof(struct __sk_buff, data)),
3513 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
3514 offsetof(struct __sk_buff, data_end)),
3515 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
3516 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
3517 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
3518 BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
3519 BPF_MOV64_IMM(BPF_REG_0, 0),
3520 BPF_EXIT_INSN(),
3521 },
3522 .errstr = "cannot write into packet",
3523 .result = REJECT,
3524 .prog_type = BPF_PROG_TYPE_LWT_IN,
3525 },
3526 {
3527 "invalid direct packet write for LWT_OUT",
3528 .insns = {
3529 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
3530 offsetof(struct __sk_buff, data)),
3531 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
3532 offsetof(struct __sk_buff, data_end)),
3533 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
3534 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
3535 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
3536 BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
3537 BPF_MOV64_IMM(BPF_REG_0, 0),
3538 BPF_EXIT_INSN(),
3539 },
3540 .errstr = "cannot write into packet",
3541 .result = REJECT,
3542 .prog_type = BPF_PROG_TYPE_LWT_OUT,
3543 },
3544 {
3545 "direct packet write for LWT_XMIT",
3546 .insns = {
3547 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
3548 offsetof(struct __sk_buff, data)),
3549 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
3550 offsetof(struct __sk_buff, data_end)),
3551 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
3552 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
3553 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
3554 BPF_STX_MEM(BPF_B, BPF_REG_2, BPF_REG_2, 0),
3555 BPF_MOV64_IMM(BPF_REG_0, 0),
3556 BPF_EXIT_INSN(),
3557 },
3558 .result = ACCEPT,
3559 .prog_type = BPF_PROG_TYPE_LWT_XMIT,
3560 },
3561 {
3562 "direct packet read for LWT_IN",
3563 .insns = {
3564 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
3565 offsetof(struct __sk_buff, data)),
3566 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
3567 offsetof(struct __sk_buff, data_end)),
3568 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
3569 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
3570 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
3571 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
3572 BPF_MOV64_IMM(BPF_REG_0, 0),
3573 BPF_EXIT_INSN(),
3574 },
3575 .result = ACCEPT,
3576 .prog_type = BPF_PROG_TYPE_LWT_IN,
3577 },
3578 {
3579 "direct packet read for LWT_OUT",
3580 .insns = {
3581 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
3582 offsetof(struct __sk_buff, data)),
3583 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
3584 offsetof(struct __sk_buff, data_end)),
3585 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
3586 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
3587 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
3588 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
3589 BPF_MOV64_IMM(BPF_REG_0, 0),
3590 BPF_EXIT_INSN(),
3591 },
3592 .result = ACCEPT,
3593 .prog_type = BPF_PROG_TYPE_LWT_OUT,
3594 },
3595 {
3596 "direct packet read for LWT_XMIT",
3597 .insns = {
3598 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
3599 offsetof(struct __sk_buff, data)),
3600 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
3601 offsetof(struct __sk_buff, data_end)),
3602 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
3603 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
3604 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 1),
3605 BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_2, 0),
3606 BPF_MOV64_IMM(BPF_REG_0, 0),
3607 BPF_EXIT_INSN(),
3608 },
3609 .result = ACCEPT,
3610 .prog_type = BPF_PROG_TYPE_LWT_XMIT,
3611 },
3612 {
3613 "overlapping checks for direct packet access",
3614 .insns = {
3615 BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1,
3616 offsetof(struct __sk_buff, data)),
3617 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_1,
3618 offsetof(struct __sk_buff, data_end)),
3619 BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
3620 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 8),
3621 BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_3, 4),
3622 BPF_MOV64_REG(BPF_REG_1, BPF_REG_2),
3623 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 6),
3624 BPF_JMP_REG(BPF_JGT, BPF_REG_1, BPF_REG_3, 1),
3625 BPF_LDX_MEM(BPF_H, BPF_REG_0, BPF_REG_2, 6),
3626 BPF_MOV64_IMM(BPF_REG_0, 0),
3627 BPF_EXIT_INSN(),
3628 },
3629 .result = ACCEPT,
3630 .prog_type = BPF_PROG_TYPE_LWT_XMIT,
3631 },
3632 {
3633 "invalid access of tc_classid for LWT_IN",
3634 .insns = {
3635 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
3636 offsetof(struct __sk_buff, tc_classid)),
3637 BPF_EXIT_INSN(),
3638 },
3639 .result = REJECT,
3640 .errstr = "invalid bpf_context access",
3641 },
3642 {
3643 "invalid access of tc_classid for LWT_OUT",
3644 .insns = {
3645 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
3646 offsetof(struct __sk_buff, tc_classid)),
3647 BPF_EXIT_INSN(),
3648 },
3649 .result = REJECT,
3650 .errstr = "invalid bpf_context access",
3651 },
3652 {
3653 "invalid access of tc_classid for LWT_XMIT",
3654 .insns = {
3655 BPF_LDX_MEM(BPF_W, BPF_REG_0, BPF_REG_1,
3656 offsetof(struct __sk_buff, tc_classid)),
3657 BPF_EXIT_INSN(),
3658 },
3659 .result = REJECT,
3660 .errstr = "invalid bpf_context access",
3661 },
3662 {
3663 "helper access to map: full range",
3664 .insns = {
3665 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3666 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3667 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3668 BPF_LD_MAP_FD(BPF_REG_1, 0),
3669 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3670 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
3671 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3672 BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
3673 BPF_MOV64_IMM(BPF_REG_3, 0),
3674 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3675 BPF_EXIT_INSN(),
3676 },
3677 .fixup_map2 = { 3 },
3678 .result = ACCEPT,
3679 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3680 },
3681 {
3682 "helper access to map: partial range",
3683 .insns = {
3684 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3685 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3686 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3687 BPF_LD_MAP_FD(BPF_REG_1, 0),
3688 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3689 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
3690 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3691 BPF_MOV64_IMM(BPF_REG_2, 8),
3692 BPF_MOV64_IMM(BPF_REG_3, 0),
3693 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3694 BPF_EXIT_INSN(),
3695 },
3696 .fixup_map2 = { 3 },
3697 .result = ACCEPT,
3698 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3699 },
3700 {
3701 "helper access to map: empty range",
3702 .insns = {
3703 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3704 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3705 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3706 BPF_LD_MAP_FD(BPF_REG_1, 0),
3707 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3708 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
3709 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3710 BPF_MOV64_IMM(BPF_REG_2, 0),
3711 BPF_MOV64_IMM(BPF_REG_3, 0),
3712 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3713 BPF_EXIT_INSN(),
3714 },
3715 .fixup_map2 = { 3 },
3716 .errstr = "invalid access to map value, value_size=48 off=0 size=0",
3717 .result = REJECT,
3718 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3719 },
3720 {
3721 "helper access to map: out-of-bound range",
3722 .insns = {
3723 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3724 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3725 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3726 BPF_LD_MAP_FD(BPF_REG_1, 0),
3727 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3728 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
3729 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3730 BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val) + 8),
3731 BPF_MOV64_IMM(BPF_REG_3, 0),
3732 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3733 BPF_EXIT_INSN(),
3734 },
3735 .fixup_map2 = { 3 },
3736 .errstr = "invalid access to map value, value_size=48 off=0 size=56",
3737 .result = REJECT,
3738 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3739 },
3740 {
3741 "helper access to map: negative range",
3742 .insns = {
3743 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3744 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3745 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3746 BPF_LD_MAP_FD(BPF_REG_1, 0),
3747 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3748 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
3749 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3750 BPF_MOV64_IMM(BPF_REG_2, -8),
3751 BPF_MOV64_IMM(BPF_REG_3, 0),
3752 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3753 BPF_EXIT_INSN(),
3754 },
3755 .fixup_map2 = { 3 },
3756 .errstr = "invalid access to map value, value_size=48 off=0 size=-8",
3757 .result = REJECT,
3758 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3759 },
3760 {
3761 "helper access to adjusted map (via const imm): full range",
3762 .insns = {
3763 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3764 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3765 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3766 BPF_LD_MAP_FD(BPF_REG_1, 0),
3767 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3768 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
3769 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3770 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
3771 offsetof(struct test_val, foo)),
3772 BPF_MOV64_IMM(BPF_REG_2,
3773 sizeof(struct test_val) -
3774 offsetof(struct test_val, foo)),
3775 BPF_MOV64_IMM(BPF_REG_3, 0),
3776 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3777 BPF_EXIT_INSN(),
3778 },
3779 .fixup_map2 = { 3 },
3780 .result = ACCEPT,
3781 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3782 },
3783 {
3784 "helper access to adjusted map (via const imm): partial range",
3785 .insns = {
3786 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3787 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3788 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3789 BPF_LD_MAP_FD(BPF_REG_1, 0),
3790 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3791 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
3792 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3793 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
3794 offsetof(struct test_val, foo)),
3795 BPF_MOV64_IMM(BPF_REG_2, 8),
3796 BPF_MOV64_IMM(BPF_REG_3, 0),
3797 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3798 BPF_EXIT_INSN(),
3799 },
3800 .fixup_map2 = { 3 },
3801 .result = ACCEPT,
3802 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3803 },
3804 {
3805 "helper access to adjusted map (via const imm): empty range",
3806 .insns = {
3807 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3808 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3809 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3810 BPF_LD_MAP_FD(BPF_REG_1, 0),
3811 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3812 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
3813 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3814 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
3815 offsetof(struct test_val, foo)),
3816 BPF_MOV64_IMM(BPF_REG_2, 0),
3817 BPF_MOV64_IMM(BPF_REG_3, 0),
3818 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3819 BPF_EXIT_INSN(),
3820 },
3821 .fixup_map2 = { 3 },
3822 .errstr = "R1 min value is outside of the array range",
3823 .result = REJECT,
3824 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3825 },
3826 {
3827 "helper access to adjusted map (via const imm): out-of-bound range",
3828 .insns = {
3829 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3830 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3831 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3832 BPF_LD_MAP_FD(BPF_REG_1, 0),
3833 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3834 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
3835 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3836 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
3837 offsetof(struct test_val, foo)),
3838 BPF_MOV64_IMM(BPF_REG_2,
3839 sizeof(struct test_val) -
3840 offsetof(struct test_val, foo) + 8),
3841 BPF_MOV64_IMM(BPF_REG_3, 0),
3842 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3843 BPF_EXIT_INSN(),
3844 },
3845 .fixup_map2 = { 3 },
3846 .errstr = "invalid access to map value, value_size=48 off=4 size=52",
3847 .result = REJECT,
3848 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3849 },
3850 {
3851 "helper access to adjusted map (via const imm): negative range (> adjustment)",
3852 .insns = {
3853 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3854 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3855 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3856 BPF_LD_MAP_FD(BPF_REG_1, 0),
3857 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3858 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
3859 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3860 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
3861 offsetof(struct test_val, foo)),
3862 BPF_MOV64_IMM(BPF_REG_2, -8),
3863 BPF_MOV64_IMM(BPF_REG_3, 0),
3864 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3865 BPF_EXIT_INSN(),
3866 },
3867 .fixup_map2 = { 3 },
3868 .errstr = "invalid access to map value, value_size=48 off=4 size=-8",
3869 .result = REJECT,
3870 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3871 },
3872 {
3873 "helper access to adjusted map (via const imm): negative range (< adjustment)",
3874 .insns = {
3875 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3876 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3877 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3878 BPF_LD_MAP_FD(BPF_REG_1, 0),
3879 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3880 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
3881 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3882 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1,
3883 offsetof(struct test_val, foo)),
3884 BPF_MOV64_IMM(BPF_REG_2, -1),
3885 BPF_MOV64_IMM(BPF_REG_3, 0),
3886 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3887 BPF_EXIT_INSN(),
3888 },
3889 .fixup_map2 = { 3 },
3890 .errstr = "R1 min value is outside of the array range",
3891 .result = REJECT,
3892 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3893 },
3894 {
3895 "helper access to adjusted map (via const reg): full range",
3896 .insns = {
3897 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3898 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3899 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3900 BPF_LD_MAP_FD(BPF_REG_1, 0),
3901 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3902 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
3903 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3904 BPF_MOV64_IMM(BPF_REG_3,
3905 offsetof(struct test_val, foo)),
3906 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
3907 BPF_MOV64_IMM(BPF_REG_2,
3908 sizeof(struct test_val) -
3909 offsetof(struct test_val, foo)),
3910 BPF_MOV64_IMM(BPF_REG_3, 0),
3911 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3912 BPF_EXIT_INSN(),
3913 },
3914 .fixup_map2 = { 3 },
3915 .result = ACCEPT,
3916 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3917 },
3918 {
3919 "helper access to adjusted map (via const reg): partial range",
3920 .insns = {
3921 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3922 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3923 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3924 BPF_LD_MAP_FD(BPF_REG_1, 0),
3925 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3926 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
3927 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3928 BPF_MOV64_IMM(BPF_REG_3,
3929 offsetof(struct test_val, foo)),
3930 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
3931 BPF_MOV64_IMM(BPF_REG_2, 8),
3932 BPF_MOV64_IMM(BPF_REG_3, 0),
3933 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3934 BPF_EXIT_INSN(),
3935 },
3936 .fixup_map2 = { 3 },
3937 .result = ACCEPT,
3938 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3939 },
3940 {
3941 "helper access to adjusted map (via const reg): empty range",
3942 .insns = {
3943 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3944 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3945 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3946 BPF_LD_MAP_FD(BPF_REG_1, 0),
3947 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3948 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
3949 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3950 BPF_MOV64_IMM(BPF_REG_3, 0),
3951 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
3952 BPF_MOV64_IMM(BPF_REG_2, 0),
3953 BPF_MOV64_IMM(BPF_REG_3, 0),
3954 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3955 BPF_EXIT_INSN(),
3956 },
3957 .fixup_map2 = { 3 },
3958 .errstr = "R1 min value is outside of the array range",
3959 .result = REJECT,
3960 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3961 },
3962 {
3963 "helper access to adjusted map (via const reg): out-of-bound range",
3964 .insns = {
3965 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3966 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3967 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3968 BPF_LD_MAP_FD(BPF_REG_1, 0),
3969 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3970 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
3971 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3972 BPF_MOV64_IMM(BPF_REG_3,
3973 offsetof(struct test_val, foo)),
3974 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
3975 BPF_MOV64_IMM(BPF_REG_2,
3976 sizeof(struct test_val) -
3977 offsetof(struct test_val, foo) + 8),
3978 BPF_MOV64_IMM(BPF_REG_3, 0),
3979 BPF_EMIT_CALL(BPF_FUNC_probe_read),
3980 BPF_EXIT_INSN(),
3981 },
3982 .fixup_map2 = { 3 },
3983 .errstr = "invalid access to map value, value_size=48 off=4 size=52",
3984 .result = REJECT,
3985 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
3986 },
3987 {
3988 "helper access to adjusted map (via const reg): negative range (> adjustment)",
3989 .insns = {
3990 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
3991 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
3992 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
3993 BPF_LD_MAP_FD(BPF_REG_1, 0),
3994 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
3995 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
3996 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
3997 BPF_MOV64_IMM(BPF_REG_3,
3998 offsetof(struct test_val, foo)),
3999 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
4000 BPF_MOV64_IMM(BPF_REG_2, -8),
4001 BPF_MOV64_IMM(BPF_REG_3, 0),
4002 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4003 BPF_EXIT_INSN(),
4004 },
4005 .fixup_map2 = { 3 },
4006 .errstr = "invalid access to map value, value_size=48 off=4 size=-8",
4007 .result = REJECT,
4008 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4009 },
4010 {
4011 "helper access to adjusted map (via const reg): negative range (< adjustment)",
4012 .insns = {
4013 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4014 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4015 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4016 BPF_LD_MAP_FD(BPF_REG_1, 0),
4017 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4018 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
4019 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4020 BPF_MOV64_IMM(BPF_REG_3,
4021 offsetof(struct test_val, foo)),
4022 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
4023 BPF_MOV64_IMM(BPF_REG_2, -1),
4024 BPF_MOV64_IMM(BPF_REG_3, 0),
4025 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4026 BPF_EXIT_INSN(),
4027 },
4028 .fixup_map2 = { 3 },
4029 .errstr = "R1 min value is outside of the array range",
4030 .result = REJECT,
4031 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4032 },
4033 {
4034 "helper access to adjusted map (via variable): full range",
4035 .insns = {
4036 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4037 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4038 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4039 BPF_LD_MAP_FD(BPF_REG_1, 0),
4040 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4041 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
4042 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4043 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
4044 BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
4045 offsetof(struct test_val, foo), 4),
4046 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
4047 BPF_MOV64_IMM(BPF_REG_2,
4048 sizeof(struct test_val) -
4049 offsetof(struct test_val, foo)),
4050 BPF_MOV64_IMM(BPF_REG_3, 0),
4051 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4052 BPF_EXIT_INSN(),
4053 },
4054 .fixup_map2 = { 3 },
4055 .result = ACCEPT,
4056 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4057 },
4058 {
4059 "helper access to adjusted map (via variable): partial range",
4060 .insns = {
4061 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4062 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4063 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4064 BPF_LD_MAP_FD(BPF_REG_1, 0),
4065 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4066 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
4067 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4068 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
4069 BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
4070 offsetof(struct test_val, foo), 4),
4071 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
4072 BPF_MOV64_IMM(BPF_REG_2, 8),
4073 BPF_MOV64_IMM(BPF_REG_3, 0),
4074 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4075 BPF_EXIT_INSN(),
4076 },
4077 .fixup_map2 = { 3 },
4078 .result = ACCEPT,
4079 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4080 },
4081 {
4082 "helper access to adjusted map (via variable): empty range",
4083 .insns = {
4084 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4085 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4086 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4087 BPF_LD_MAP_FD(BPF_REG_1, 0),
4088 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4089 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
4090 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4091 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
4092 BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
4093 offsetof(struct test_val, foo), 4),
4094 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
4095 BPF_MOV64_IMM(BPF_REG_2, 0),
4096 BPF_MOV64_IMM(BPF_REG_3, 0),
4097 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4098 BPF_EXIT_INSN(),
4099 },
4100 .fixup_map2 = { 3 },
4101 .errstr = "R1 min value is outside of the array range",
4102 .result = REJECT,
4103 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4104 },
4105 {
4106 "helper access to adjusted map (via variable): no max check",
4107 .insns = {
4108 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4109 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4110 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4111 BPF_LD_MAP_FD(BPF_REG_1, 0),
4112 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4113 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
4114 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4115 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
4116 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
4117 BPF_MOV64_IMM(BPF_REG_2, 0),
4118 BPF_MOV64_IMM(BPF_REG_3, 0),
4119 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4120 BPF_EXIT_INSN(),
4121 },
4122 .fixup_map2 = { 3 },
4123 .errstr = "R1 min value is negative, either use unsigned index or do a if (index >=0) check",
4124 .result = REJECT,
4125 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4126 },
4127 {
4128 "helper access to adjusted map (via variable): wrong max check",
4129 .insns = {
4130 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4131 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4132 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4133 BPF_LD_MAP_FD(BPF_REG_1, 0),
4134 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4135 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
4136 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4137 BPF_LDX_MEM(BPF_W, BPF_REG_3, BPF_REG_0, 0),
4138 BPF_JMP_IMM(BPF_JGT, BPF_REG_3,
4139 offsetof(struct test_val, foo), 4),
4140 BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_3),
4141 BPF_MOV64_IMM(BPF_REG_2,
4142 sizeof(struct test_val) -
4143 offsetof(struct test_val, foo) + 1),
4144 BPF_MOV64_IMM(BPF_REG_3, 0),
4145 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4146 BPF_EXIT_INSN(),
4147 },
4148 .fixup_map2 = { 3 },
4149 .errstr = "invalid access to map value, value_size=48 off=4 size=45",
4150 .result = REJECT,
4151 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4152 },
4153 {
4154 "map element value is preserved across register spilling",
4155 .insns = {
4156 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4157 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4158 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4159 BPF_LD_MAP_FD(BPF_REG_1, 0),
4160 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4161 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
4162 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 42),
4163 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4164 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -184),
4165 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
4166 BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1, 0),
4167 BPF_ST_MEM(BPF_DW, BPF_REG_3, 0, 42),
4168 BPF_EXIT_INSN(),
4169 },
4170 .fixup_map2 = { 3 },
4171 .errstr_unpriv = "R0 leaks addr",
4172 .result = ACCEPT,
4173 .result_unpriv = REJECT,
4174 },
4175 {
4176 "map element value or null is marked on register spilling",
4177 .insns = {
4178 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4179 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4180 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4181 BPF_LD_MAP_FD(BPF_REG_1, 0),
4182 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4183 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4184 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -152),
4185 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
4186 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
4187 BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1, 0),
4188 BPF_ST_MEM(BPF_DW, BPF_REG_3, 0, 42),
4189 BPF_EXIT_INSN(),
4190 },
4191 .fixup_map2 = { 3 },
4192 .errstr_unpriv = "R0 leaks addr",
4193 .result = ACCEPT,
4194 .result_unpriv = REJECT,
4195 },
4196 {
4197 "map element value store of cleared call register",
4198 .insns = {
4199 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4200 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4201 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4202 BPF_LD_MAP_FD(BPF_REG_1, 0),
4203 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4204 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
4205 BPF_STX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 0),
4206 BPF_EXIT_INSN(),
4207 },
4208 .fixup_map2 = { 3 },
4209 .errstr_unpriv = "R1 !read_ok",
4210 .errstr = "R1 !read_ok",
4211 .result = REJECT,
4212 .result_unpriv = REJECT,
4213 },
4214 {
4215 "map element value with unaligned store",
4216 .insns = {
4217 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4218 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4219 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4220 BPF_LD_MAP_FD(BPF_REG_1, 0),
4221 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4222 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 17),
4223 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 3),
4224 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 42),
4225 BPF_ST_MEM(BPF_DW, BPF_REG_0, 2, 43),
4226 BPF_ST_MEM(BPF_DW, BPF_REG_0, -2, 44),
4227 BPF_MOV64_REG(BPF_REG_8, BPF_REG_0),
4228 BPF_ST_MEM(BPF_DW, BPF_REG_8, 0, 32),
4229 BPF_ST_MEM(BPF_DW, BPF_REG_8, 2, 33),
4230 BPF_ST_MEM(BPF_DW, BPF_REG_8, -2, 34),
4231 BPF_ALU64_IMM(BPF_ADD, BPF_REG_8, 5),
4232 BPF_ST_MEM(BPF_DW, BPF_REG_8, 0, 22),
4233 BPF_ST_MEM(BPF_DW, BPF_REG_8, 4, 23),
4234 BPF_ST_MEM(BPF_DW, BPF_REG_8, -7, 24),
4235 BPF_MOV64_REG(BPF_REG_7, BPF_REG_8),
4236 BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, 3),
4237 BPF_ST_MEM(BPF_DW, BPF_REG_7, 0, 22),
4238 BPF_ST_MEM(BPF_DW, BPF_REG_7, 4, 23),
4239 BPF_ST_MEM(BPF_DW, BPF_REG_7, -4, 24),
4240 BPF_EXIT_INSN(),
4241 },
4242 .fixup_map2 = { 3 },
4243 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4244 .result = ACCEPT,
4245 .result_unpriv = REJECT,
4246 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
4247 },
4248 {
4249 "map element value with unaligned load",
4250 .insns = {
4251 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4252 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4253 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4254 BPF_LD_MAP_FD(BPF_REG_1, 0),
4255 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4256 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
4257 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
4258 BPF_JMP_IMM(BPF_JGE, BPF_REG_1, MAX_ENTRIES, 9),
4259 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 3),
4260 BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
4261 BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 2),
4262 BPF_MOV64_REG(BPF_REG_8, BPF_REG_0),
4263 BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_8, 0),
4264 BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_8, 2),
4265 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, 5),
4266 BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 0),
4267 BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_0, 4),
4268 BPF_EXIT_INSN(),
4269 },
4270 .fixup_map2 = { 3 },
4271 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4272 .result = ACCEPT,
4273 .result_unpriv = REJECT,
4274 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
4275 },
4276 {
4277 "map element value illegal alu op, 1",
4278 .insns = {
4279 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4280 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4281 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4282 BPF_LD_MAP_FD(BPF_REG_1, 0),
4283 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4284 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
4285 BPF_ALU64_IMM(BPF_AND, BPF_REG_0, 8),
4286 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
4287 BPF_EXIT_INSN(),
4288 },
4289 .fixup_map2 = { 3 },
4290 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4291 .errstr = "invalid mem access 'inv'",
4292 .result = REJECT,
4293 .result_unpriv = REJECT,
4294 },
4295 {
4296 "map element value illegal alu op, 2",
4297 .insns = {
4298 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4299 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4300 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4301 BPF_LD_MAP_FD(BPF_REG_1, 0),
4302 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4303 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
4304 BPF_ALU32_IMM(BPF_ADD, BPF_REG_0, 0),
4305 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
4306 BPF_EXIT_INSN(),
4307 },
4308 .fixup_map2 = { 3 },
4309 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4310 .errstr = "invalid mem access 'inv'",
4311 .result = REJECT,
4312 .result_unpriv = REJECT,
4313 },
4314 {
4315 "map element value illegal alu op, 3",
4316 .insns = {
4317 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4318 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4319 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4320 BPF_LD_MAP_FD(BPF_REG_1, 0),
4321 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4322 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
4323 BPF_ALU64_IMM(BPF_DIV, BPF_REG_0, 42),
4324 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
4325 BPF_EXIT_INSN(),
4326 },
4327 .fixup_map2 = { 3 },
4328 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4329 .errstr = "invalid mem access 'inv'",
4330 .result = REJECT,
4331 .result_unpriv = REJECT,
4332 },
4333 {
4334 "map element value illegal alu op, 4",
4335 .insns = {
4336 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4337 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4338 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4339 BPF_LD_MAP_FD(BPF_REG_1, 0),
4340 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4341 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
4342 BPF_ENDIAN(BPF_FROM_BE, BPF_REG_0, 64),
4343 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
4344 BPF_EXIT_INSN(),
4345 },
4346 .fixup_map2 = { 3 },
4347 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4348 .errstr = "invalid mem access 'inv'",
4349 .result = REJECT,
4350 .result_unpriv = REJECT,
4351 },
4352 {
4353 "map element value illegal alu op, 5",
4354 .insns = {
4355 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4356 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4357 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4358 BPF_LD_MAP_FD(BPF_REG_1, 0),
4359 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4360 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
4361 BPF_MOV64_IMM(BPF_REG_3, 4096),
4362 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4363 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4364 BPF_STX_MEM(BPF_DW, BPF_REG_2, BPF_REG_0, 0),
4365 BPF_STX_XADD(BPF_DW, BPF_REG_2, BPF_REG_3, 0),
4366 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_2, 0),
4367 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 22),
4368 BPF_EXIT_INSN(),
4369 },
4370 .fixup_map2 = { 3 },
4371 .errstr_unpriv = "R0 invalid mem access 'inv'",
4372 .errstr = "R0 invalid mem access 'inv'",
4373 .result = REJECT,
4374 .result_unpriv = REJECT,
4375 },
4376 {
4377 "map element value is preserved across register spilling",
4378 .insns = {
4379 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4380 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4381 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4382 BPF_LD_MAP_FD(BPF_REG_1, 0),
4383 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4384 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7),
4385 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0,
4386 offsetof(struct test_val, foo)),
4387 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, 42),
4388 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4389 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -184),
4390 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
4391 BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_1, 0),
4392 BPF_ST_MEM(BPF_DW, BPF_REG_3, 0, 42),
4393 BPF_EXIT_INSN(),
4394 },
4395 .fixup_map2 = { 3 },
4396 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4397 .result = ACCEPT,
4398 .result_unpriv = REJECT,
4399 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
4400 },
4401 {
4402 "helper access to variable memory: stack, bitwise AND + JMP, correct bounds",
4403 .insns = {
4404 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4405 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4406 BPF_MOV64_IMM(BPF_REG_0, 0),
4407 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
4408 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
4409 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
4410 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
4411 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -32),
4412 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
4413 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
4414 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
4415 BPF_MOV64_IMM(BPF_REG_2, 16),
4416 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4417 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4418 BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 64),
4419 BPF_MOV64_IMM(BPF_REG_4, 0),
4420 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4421 BPF_MOV64_IMM(BPF_REG_3, 0),
4422 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4423 BPF_MOV64_IMM(BPF_REG_0, 0),
4424 BPF_EXIT_INSN(),
4425 },
4426 .result = ACCEPT,
4427 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4428 },
4429 {
4430 "helper access to variable memory: stack, bitwise AND, zero included",
4431 .insns = {
4432 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4433 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4434 BPF_MOV64_IMM(BPF_REG_2, 16),
4435 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4436 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4437 BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 64),
4438 BPF_MOV64_IMM(BPF_REG_3, 0),
4439 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4440 BPF_EXIT_INSN(),
4441 },
4442 .errstr = "invalid stack type R1 off=-64 access_size=0",
4443 .result = REJECT,
4444 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4445 },
4446 {
4447 "helper access to variable memory: stack, bitwise AND + JMP, wrong max",
4448 .insns = {
4449 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4450 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4451 BPF_MOV64_IMM(BPF_REG_2, 16),
4452 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4453 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4454 BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 65),
4455 BPF_MOV64_IMM(BPF_REG_4, 0),
4456 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4457 BPF_MOV64_IMM(BPF_REG_3, 0),
4458 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4459 BPF_MOV64_IMM(BPF_REG_0, 0),
4460 BPF_EXIT_INSN(),
4461 },
4462 .errstr = "invalid stack type R1 off=-64 access_size=65",
4463 .result = REJECT,
4464 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4465 },
4466 {
4467 "helper access to variable memory: stack, JMP, correct bounds",
4468 .insns = {
4469 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4470 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4471 BPF_MOV64_IMM(BPF_REG_0, 0),
4472 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
4473 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
4474 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
4475 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
4476 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -32),
4477 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
4478 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
4479 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
4480 BPF_MOV64_IMM(BPF_REG_2, 16),
4481 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4482 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4483 BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 64, 4),
4484 BPF_MOV64_IMM(BPF_REG_4, 0),
4485 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4486 BPF_MOV64_IMM(BPF_REG_3, 0),
4487 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4488 BPF_MOV64_IMM(BPF_REG_0, 0),
4489 BPF_EXIT_INSN(),
4490 },
4491 .result = ACCEPT,
4492 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4493 },
4494 {
4495 "helper access to variable memory: stack, JMP (signed), correct bounds",
4496 .insns = {
4497 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4498 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4499 BPF_MOV64_IMM(BPF_REG_0, 0),
4500 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
4501 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
4502 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
4503 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
4504 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -32),
4505 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
4506 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
4507 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
4508 BPF_MOV64_IMM(BPF_REG_2, 16),
4509 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4510 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4511 BPF_JMP_IMM(BPF_JSGT, BPF_REG_2, 64, 4),
4512 BPF_MOV64_IMM(BPF_REG_4, 0),
4513 BPF_JMP_REG(BPF_JSGE, BPF_REG_4, BPF_REG_2, 2),
4514 BPF_MOV64_IMM(BPF_REG_3, 0),
4515 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4516 BPF_MOV64_IMM(BPF_REG_0, 0),
4517 BPF_EXIT_INSN(),
4518 },
4519 .result = ACCEPT,
4520 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4521 },
4522 {
4523 "helper access to variable memory: stack, JMP, bounds + offset",
4524 .insns = {
4525 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4526 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4527 BPF_MOV64_IMM(BPF_REG_2, 16),
4528 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4529 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4530 BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 64, 5),
4531 BPF_MOV64_IMM(BPF_REG_4, 0),
4532 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 3),
4533 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
4534 BPF_MOV64_IMM(BPF_REG_3, 0),
4535 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4536 BPF_MOV64_IMM(BPF_REG_0, 0),
4537 BPF_EXIT_INSN(),
4538 },
4539 .errstr = "invalid stack type R1 off=-64 access_size=65",
4540 .result = REJECT,
4541 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4542 },
4543 {
4544 "helper access to variable memory: stack, JMP, wrong max",
4545 .insns = {
4546 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4547 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4548 BPF_MOV64_IMM(BPF_REG_2, 16),
4549 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4550 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4551 BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 65, 4),
4552 BPF_MOV64_IMM(BPF_REG_4, 0),
4553 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4554 BPF_MOV64_IMM(BPF_REG_3, 0),
4555 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4556 BPF_MOV64_IMM(BPF_REG_0, 0),
4557 BPF_EXIT_INSN(),
4558 },
4559 .errstr = "invalid stack type R1 off=-64 access_size=65",
4560 .result = REJECT,
4561 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4562 },
4563 {
4564 "helper access to variable memory: stack, JMP, no max check",
4565 .insns = {
4566 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4567 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4568 BPF_MOV64_IMM(BPF_REG_2, 16),
4569 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4570 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4571 BPF_MOV64_IMM(BPF_REG_4, 0),
4572 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4573 BPF_MOV64_IMM(BPF_REG_3, 0),
4574 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4575 BPF_MOV64_IMM(BPF_REG_0, 0),
4576 BPF_EXIT_INSN(),
4577 },
4578 .errstr = "R2 unbounded memory access",
4579 .result = REJECT,
4580 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4581 },
4582 {
4583 "helper access to variable memory: stack, JMP, no min check",
4584 .insns = {
4585 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4586 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4587 BPF_MOV64_IMM(BPF_REG_2, 16),
4588 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4589 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4590 BPF_JMP_IMM(BPF_JGT, BPF_REG_2, 64, 3),
4591 BPF_MOV64_IMM(BPF_REG_3, 0),
4592 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4593 BPF_MOV64_IMM(BPF_REG_0, 0),
4594 BPF_EXIT_INSN(),
4595 },
4596 .errstr = "invalid stack type R1 off=-64 access_size=0",
4597 .result = REJECT,
4598 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4599 },
4600 {
4601 "helper access to variable memory: stack, JMP (signed), no min check",
4602 .insns = {
4603 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4604 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4605 BPF_MOV64_IMM(BPF_REG_2, 16),
4606 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, -128),
4607 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_1, -128),
4608 BPF_JMP_IMM(BPF_JSGT, BPF_REG_2, 64, 3),
4609 BPF_MOV64_IMM(BPF_REG_3, 0),
4610 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4611 BPF_MOV64_IMM(BPF_REG_0, 0),
4612 BPF_EXIT_INSN(),
4613 },
4614 .errstr = "R2 min value is negative",
4615 .result = REJECT,
4616 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4617 },
4618 {
4619 "helper access to variable memory: map, JMP, correct bounds",
4620 .insns = {
4621 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4622 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4623 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4624 BPF_LD_MAP_FD(BPF_REG_1, 0),
4625 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4626 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 10),
4627 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4628 BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
4629 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
4630 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
4631 BPF_JMP_IMM(BPF_JSGT, BPF_REG_2,
4632 sizeof(struct test_val), 4),
4633 BPF_MOV64_IMM(BPF_REG_4, 0),
4634 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4635 BPF_MOV64_IMM(BPF_REG_3, 0),
4636 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4637 BPF_MOV64_IMM(BPF_REG_0, 0),
4638 BPF_EXIT_INSN(),
4639 },
4640 .fixup_map2 = { 3 },
4641 .result = ACCEPT,
4642 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4643 },
4644 {
4645 "helper access to variable memory: map, JMP, wrong max",
4646 .insns = {
4647 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4648 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4649 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4650 BPF_LD_MAP_FD(BPF_REG_1, 0),
4651 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4652 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 10),
4653 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4654 BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
4655 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
4656 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
4657 BPF_JMP_IMM(BPF_JSGT, BPF_REG_2,
4658 sizeof(struct test_val) + 1, 4),
4659 BPF_MOV64_IMM(BPF_REG_4, 0),
4660 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4661 BPF_MOV64_IMM(BPF_REG_3, 0),
4662 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4663 BPF_MOV64_IMM(BPF_REG_0, 0),
4664 BPF_EXIT_INSN(),
4665 },
4666 .fixup_map2 = { 3 },
4667 .errstr = "invalid access to map value, value_size=48 off=0 size=49",
4668 .result = REJECT,
4669 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4670 },
4671 {
4672 "helper access to variable memory: map adjusted, JMP, correct bounds",
4673 .insns = {
4674 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4675 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4676 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4677 BPF_LD_MAP_FD(BPF_REG_1, 0),
4678 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4679 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
4680 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4681 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 20),
4682 BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
4683 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
4684 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
4685 BPF_JMP_IMM(BPF_JSGT, BPF_REG_2,
4686 sizeof(struct test_val) - 20, 4),
4687 BPF_MOV64_IMM(BPF_REG_4, 0),
4688 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4689 BPF_MOV64_IMM(BPF_REG_3, 0),
4690 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4691 BPF_MOV64_IMM(BPF_REG_0, 0),
4692 BPF_EXIT_INSN(),
4693 },
4694 .fixup_map2 = { 3 },
4695 .result = ACCEPT,
4696 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4697 },
4698 {
4699 "helper access to variable memory: map adjusted, JMP, wrong max",
4700 .insns = {
4701 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4702 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4703 BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
4704 BPF_LD_MAP_FD(BPF_REG_1, 0),
4705 BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
4706 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
4707 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4708 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 20),
4709 BPF_MOV64_IMM(BPF_REG_2, sizeof(struct test_val)),
4710 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
4711 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
4712 BPF_JMP_IMM(BPF_JSGT, BPF_REG_2,
4713 sizeof(struct test_val) - 19, 4),
4714 BPF_MOV64_IMM(BPF_REG_4, 0),
4715 BPF_JMP_REG(BPF_JGE, BPF_REG_4, BPF_REG_2, 2),
4716 BPF_MOV64_IMM(BPF_REG_3, 0),
4717 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4718 BPF_MOV64_IMM(BPF_REG_0, 0),
4719 BPF_EXIT_INSN(),
4720 },
4721 .fixup_map2 = { 3 },
4722 .errstr = "R1 min value is outside of the array range",
4723 .result = REJECT,
4724 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4725 },
4726 {
4727 "helper access to variable memory: size > 0 not allowed on NULL",
4728 .insns = {
4729 BPF_MOV64_IMM(BPF_REG_1, 0),
4730 BPF_MOV64_IMM(BPF_REG_2, 0),
4731 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
4732 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
4733 BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 64),
4734 BPF_MOV64_IMM(BPF_REG_3, 0),
4735 BPF_MOV64_IMM(BPF_REG_4, 0),
4736 BPF_MOV64_IMM(BPF_REG_5, 0),
4737 BPF_EMIT_CALL(BPF_FUNC_csum_diff),
4738 BPF_EXIT_INSN(),
4739 },
4740 .errstr = "R1 type=imm expected=fp",
4741 .result = REJECT,
4742 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
4743 },
4744 {
4745 "helper access to variable memory: size = 0 not allowed on != NULL",
4746 .insns = {
4747 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4748 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
4749 BPF_MOV64_IMM(BPF_REG_2, 0),
4750 BPF_STX_MEM(BPF_DW, BPF_REG_1, BPF_REG_2, 0),
4751 BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 8),
4752 BPF_MOV64_IMM(BPF_REG_3, 0),
4753 BPF_MOV64_IMM(BPF_REG_4, 0),
4754 BPF_MOV64_IMM(BPF_REG_5, 0),
4755 BPF_EMIT_CALL(BPF_FUNC_csum_diff),
4756 BPF_EXIT_INSN(),
4757 },
4758 .errstr = "invalid stack type R1 off=-8 access_size=0",
4759 .result = REJECT,
4760 .prog_type = BPF_PROG_TYPE_SCHED_CLS,
4761 },
4762 {
4763 "helper access to variable memory: 8 bytes leak",
4764 .insns = {
4765 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4766 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4767 BPF_MOV64_IMM(BPF_REG_0, 0),
4768 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
4769 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
4770 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
4771 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
4772 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
4773 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
4774 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
4775 BPF_MOV64_IMM(BPF_REG_2, 0),
4776 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_2, -128),
4777 BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_10, -128),
4778 BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 63),
4779 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 1),
4780 BPF_MOV64_IMM(BPF_REG_3, 0),
4781 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4782 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
4783 BPF_EXIT_INSN(),
4784 },
4785 .errstr = "invalid indirect read from stack off -64+32 size 64",
4786 .result = REJECT,
4787 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4788 },
4789 {
4790 "helper access to variable memory: 8 bytes no leak (init memory)",
4791 .insns = {
4792 BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
4793 BPF_MOV64_IMM(BPF_REG_0, 0),
4794 BPF_MOV64_IMM(BPF_REG_0, 0),
4795 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -64),
4796 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -56),
4797 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -48),
4798 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -40),
4799 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -32),
4800 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -24),
4801 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -16),
4802 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
4803 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -64),
4804 BPF_MOV64_IMM(BPF_REG_2, 0),
4805 BPF_ALU64_IMM(BPF_AND, BPF_REG_2, 32),
4806 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 32),
4807 BPF_MOV64_IMM(BPF_REG_3, 0),
4808 BPF_EMIT_CALL(BPF_FUNC_probe_read),
4809 BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_10, -16),
4810 BPF_EXIT_INSN(),
4811 },
4812 .result = ACCEPT,
4813 .prog_type = BPF_PROG_TYPE_TRACEPOINT,
4814 },
4815 {
4816 "invalid and of negative number",
4817 .insns = {
4818 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
4819 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4820 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4821 BPF_LD_MAP_FD(BPF_REG_1, 0),
4822 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
4823 BPF_FUNC_map_lookup_elem),
4824 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 4),
4825 BPF_MOV64_IMM(BPF_REG_1, 6),
4826 BPF_ALU64_IMM(BPF_AND, BPF_REG_1, -4),
4827 BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 2),
4828 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
4829 BPF_ST_MEM(BPF_DW, BPF_REG_0, 0,
4830 offsetof(struct test_val, foo)),
4831 BPF_EXIT_INSN(),
4832 },
4833 .fixup_map2 = { 3 },
4834 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4835 .errstr = "R0 min value is negative, either use unsigned index or do a if (index >=0) check.",
4836 .result = REJECT,
4837 .result_unpriv = REJECT,
4838 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
4839 },
4840 {
4841 "invalid range check",
4842 .insns = {
4843 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
4844 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4845 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
4846 BPF_LD_MAP_FD(BPF_REG_1, 0),
4847 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
4848 BPF_FUNC_map_lookup_elem),
4849 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 12),
4850 BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_0, 0),
4851 BPF_MOV64_IMM(BPF_REG_9, 1),
4852 BPF_ALU32_IMM(BPF_MOD, BPF_REG_1, 2),
4853 BPF_ALU32_IMM(BPF_ADD, BPF_REG_1, 1),
4854 BPF_ALU32_REG(BPF_AND, BPF_REG_9, BPF_REG_1),
4855 BPF_ALU32_IMM(BPF_ADD, BPF_REG_9, 1),
4856 BPF_ALU32_IMM(BPF_RSH, BPF_REG_9, 1),
4857 BPF_MOV32_IMM(BPF_REG_3, 1),
4858 BPF_ALU32_REG(BPF_SUB, BPF_REG_3, BPF_REG_9),
4859 BPF_ALU32_IMM(BPF_MUL, BPF_REG_3, 0x10000000),
4860 BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_3),
4861 BPF_STX_MEM(BPF_W, BPF_REG_0, BPF_REG_3, 0),
4862 BPF_MOV64_REG(BPF_REG_0, 0),
4863 BPF_EXIT_INSN(),
4864 },
4865 .fixup_map2 = { 3 },
4866 .errstr_unpriv = "R0 pointer arithmetic prohibited",
4867 .errstr = "R0 min value is negative, either use unsigned index or do a if (index >=0) check.",
4868 .result = REJECT,
4869 .result_unpriv = REJECT,
4870 .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
4871 },
4872 {
4873 "map in map access",
4874 .insns = {
4875 BPF_ST_MEM(0, BPF_REG_10, -4, 0),
4876 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4877 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
4878 BPF_LD_MAP_FD(BPF_REG_1, 0),
4879 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
4880 BPF_FUNC_map_lookup_elem),
4881 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
4882 BPF_ST_MEM(0, BPF_REG_10, -4, 0),
4883 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4884 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
4885 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4886 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
4887 BPF_FUNC_map_lookup_elem),
4888 BPF_MOV64_REG(BPF_REG_0, 0),
4889 BPF_EXIT_INSN(),
4890 },
4891 .fixup_map_in_map = { 3 },
4892 .result = ACCEPT,
4893 },
4894 {
4895 "invalid inner map pointer",
4896 .insns = {
4897 BPF_ST_MEM(0, BPF_REG_10, -4, 0),
4898 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4899 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
4900 BPF_LD_MAP_FD(BPF_REG_1, 0),
4901 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
4902 BPF_FUNC_map_lookup_elem),
4903 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 6),
4904 BPF_ST_MEM(0, BPF_REG_10, -4, 0),
4905 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4906 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
4907 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4908 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 8),
4909 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
4910 BPF_FUNC_map_lookup_elem),
4911 BPF_MOV64_REG(BPF_REG_0, 0),
4912 BPF_EXIT_INSN(),
4913 },
4914 .fixup_map_in_map = { 3 },
4915 .errstr = "R1 type=inv expected=map_ptr",
4916 .errstr_unpriv = "R1 pointer arithmetic prohibited",
4917 .result = REJECT,
4918 },
4919 {
4920 "forgot null checking on the inner map pointer",
4921 .insns = {
4922 BPF_ST_MEM(0, BPF_REG_10, -4, 0),
4923 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4924 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
4925 BPF_LD_MAP_FD(BPF_REG_1, 0),
4926 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
4927 BPF_FUNC_map_lookup_elem),
4928 BPF_ST_MEM(0, BPF_REG_10, -4, 0),
4929 BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
4930 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
4931 BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
4932 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0,
4933 BPF_FUNC_map_lookup_elem),
4934 BPF_MOV64_REG(BPF_REG_0, 0),
4935 BPF_EXIT_INSN(),
4936 },
4937 .fixup_map_in_map = { 3 },
4938 .errstr = "R1 type=map_value_or_null expected=map_ptr",
4939 .result = REJECT,
4940 }
4941 };
4942
4943 static int probe_filter_length(const struct bpf_insn *fp)
4944 {
4945 int len;
4946
4947 for (len = MAX_INSNS - 1; len > 0; --len)
4948 if (fp[len].code != 0 || fp[len].imm != 0)
4949 break;
4950 return len + 1;
4951 }
4952
4953 static int create_map(uint32_t size_value, uint32_t max_elem)
4954 {
4955 int fd;
4956
4957 fd = bpf_create_map(BPF_MAP_TYPE_HASH, sizeof(long long),
4958 size_value, max_elem, BPF_F_NO_PREALLOC);
4959 if (fd < 0)
4960 printf("Failed to create hash map '%s'!\n", strerror(errno));
4961
4962 return fd;
4963 }
4964
4965 static int create_prog_array(void)
4966 {
4967 int fd;
4968
4969 fd = bpf_create_map(BPF_MAP_TYPE_PROG_ARRAY, sizeof(int),
4970 sizeof(int), 4, 0);
4971 if (fd < 0)
4972 printf("Failed to create prog array '%s'!\n", strerror(errno));
4973
4974 return fd;
4975 }
4976
4977 static int create_map_in_map(void)
4978 {
4979 int inner_map_fd, outer_map_fd;
4980
4981 inner_map_fd = bpf_create_map(BPF_MAP_TYPE_ARRAY, sizeof(int),
4982 sizeof(int), 1, 0);
4983 if (inner_map_fd < 0) {
4984 printf("Failed to create array '%s'!\n", strerror(errno));
4985 return inner_map_fd;
4986 }
4987
4988 outer_map_fd = bpf_create_map_in_map(BPF_MAP_TYPE_ARRAY_OF_MAPS,
4989 sizeof(int), inner_map_fd, 1, 0);
4990 if (outer_map_fd < 0)
4991 printf("Failed to create array of maps '%s'!\n",
4992 strerror(errno));
4993
4994 close(inner_map_fd);
4995
4996 return outer_map_fd;
4997 }
4998
4999 static char bpf_vlog[32768];
5000
5001 static void do_test_fixup(struct bpf_test *test, struct bpf_insn *prog,
5002 int *map_fds)
5003 {
5004 int *fixup_map1 = test->fixup_map1;
5005 int *fixup_map2 = test->fixup_map2;
5006 int *fixup_prog = test->fixup_prog;
5007 int *fixup_map_in_map = test->fixup_map_in_map;
5008
5009 /* Allocating HTs with 1 elem is fine here, since we only test
5010 * for verifier and not do a runtime lookup, so the only thing
5011 * that really matters is value size in this case.
5012 */
5013 if (*fixup_map1) {
5014 map_fds[0] = create_map(sizeof(long long), 1);
5015 do {
5016 prog[*fixup_map1].imm = map_fds[0];
5017 fixup_map1++;
5018 } while (*fixup_map1);
5019 }
5020
5021 if (*fixup_map2) {
5022 map_fds[1] = create_map(sizeof(struct test_val), 1);
5023 do {
5024 prog[*fixup_map2].imm = map_fds[1];
5025 fixup_map2++;
5026 } while (*fixup_map2);
5027 }
5028
5029 if (*fixup_prog) {
5030 map_fds[2] = create_prog_array();
5031 do {
5032 prog[*fixup_prog].imm = map_fds[2];
5033 fixup_prog++;
5034 } while (*fixup_prog);
5035 }
5036
5037 if (*fixup_map_in_map) {
5038 map_fds[3] = create_map_in_map();
5039 do {
5040 prog[*fixup_map_in_map].imm = map_fds[3];
5041 fixup_map_in_map++;
5042 } while (*fixup_map_in_map);
5043 }
5044 }
5045
5046 static void do_test_single(struct bpf_test *test, bool unpriv,
5047 int *passes, int *errors)
5048 {
5049 int fd_prog, expected_ret, reject_from_alignment;
5050 struct bpf_insn *prog = test->insns;
5051 int prog_len = probe_filter_length(prog);
5052 int prog_type = test->prog_type;
5053 int map_fds[MAX_NR_MAPS];
5054 const char *expected_err;
5055 int i;
5056
5057 for (i = 0; i < MAX_NR_MAPS; i++)
5058 map_fds[i] = -1;
5059
5060 do_test_fixup(test, prog, map_fds);
5061
5062 fd_prog = bpf_load_program(prog_type ? : BPF_PROG_TYPE_SOCKET_FILTER,
5063 prog, prog_len, "GPL", 0, bpf_vlog,
5064 sizeof(bpf_vlog));
5065
5066 expected_ret = unpriv && test->result_unpriv != UNDEF ?
5067 test->result_unpriv : test->result;
5068 expected_err = unpriv && test->errstr_unpriv ?
5069 test->errstr_unpriv : test->errstr;
5070
5071 reject_from_alignment = fd_prog < 0 &&
5072 (test->flags & F_NEEDS_EFFICIENT_UNALIGNED_ACCESS) &&
5073 strstr(bpf_vlog, "Unknown alignment.");
5074 #ifdef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS
5075 if (reject_from_alignment) {
5076 printf("FAIL\nFailed due to alignment despite having efficient unaligned access: '%s'!\n",
5077 strerror(errno));
5078 goto fail_log;
5079 }
5080 #endif
5081 if (expected_ret == ACCEPT) {
5082 if (fd_prog < 0 && !reject_from_alignment) {
5083 printf("FAIL\nFailed to load prog '%s'!\n",
5084 strerror(errno));
5085 goto fail_log;
5086 }
5087 } else {
5088 if (fd_prog >= 0) {
5089 printf("FAIL\nUnexpected success to load!\n");
5090 goto fail_log;
5091 }
5092 if (!strstr(bpf_vlog, expected_err) && !reject_from_alignment) {
5093 printf("FAIL\nUnexpected error message!\n");
5094 goto fail_log;
5095 }
5096 }
5097
5098 (*passes)++;
5099 printf("OK%s\n", reject_from_alignment ?
5100 " (NOTE: reject due to unknown alignment)" : "");
5101 close_fds:
5102 close(fd_prog);
5103 for (i = 0; i < MAX_NR_MAPS; i++)
5104 close(map_fds[i]);
5105 sched_yield();
5106 return;
5107 fail_log:
5108 (*errors)++;
5109 printf("%s", bpf_vlog);
5110 goto close_fds;
5111 }
5112
5113 static bool is_admin(void)
5114 {
5115 cap_t caps;
5116 cap_flag_value_t sysadmin = CAP_CLEAR;
5117 const cap_value_t cap_val = CAP_SYS_ADMIN;
5118
5119 #ifdef CAP_IS_SUPPORTED
5120 if (!CAP_IS_SUPPORTED(CAP_SETFCAP)) {
5121 perror("cap_get_flag");
5122 return false;
5123 }
5124 #endif
5125 caps = cap_get_proc();
5126 if (!caps) {
5127 perror("cap_get_proc");
5128 return false;
5129 }
5130 if (cap_get_flag(caps, cap_val, CAP_EFFECTIVE, &sysadmin))
5131 perror("cap_get_flag");
5132 if (cap_free(caps))
5133 perror("cap_free");
5134 return (sysadmin == CAP_SET);
5135 }
5136
5137 static int set_admin(bool admin)
5138 {
5139 cap_t caps;
5140 const cap_value_t cap_val = CAP_SYS_ADMIN;
5141 int ret = -1;
5142
5143 caps = cap_get_proc();
5144 if (!caps) {
5145 perror("cap_get_proc");
5146 return -1;
5147 }
5148 if (cap_set_flag(caps, CAP_EFFECTIVE, 1, &cap_val,
5149 admin ? CAP_SET : CAP_CLEAR)) {
5150 perror("cap_set_flag");
5151 goto out;
5152 }
5153 if (cap_set_proc(caps)) {
5154 perror("cap_set_proc");
5155 goto out;
5156 }
5157 ret = 0;
5158 out:
5159 if (cap_free(caps))
5160 perror("cap_free");
5161 return ret;
5162 }
5163
5164 static int do_test(bool unpriv, unsigned int from, unsigned int to)
5165 {
5166 int i, passes = 0, errors = 0;
5167
5168 for (i = from; i < to; i++) {
5169 struct bpf_test *test = &tests[i];
5170
5171 /* Program types that are not supported by non-root we
5172 * skip right away.
5173 */
5174 if (!test->prog_type) {
5175 if (!unpriv)
5176 set_admin(false);
5177 printf("#%d/u %s ", i, test->descr);
5178 do_test_single(test, true, &passes, &errors);
5179 if (!unpriv)
5180 set_admin(true);
5181 }
5182
5183 if (!unpriv) {
5184 printf("#%d/p %s ", i, test->descr);
5185 do_test_single(test, false, &passes, &errors);
5186 }
5187 }
5188
5189 printf("Summary: %d PASSED, %d FAILED\n", passes, errors);
5190 return errors ? -errors : 0;
5191 }
5192
5193 int main(int argc, char **argv)
5194 {
5195 struct rlimit rinf = { RLIM_INFINITY, RLIM_INFINITY };
5196 struct rlimit rlim = { 1 << 20, 1 << 20 };
5197 unsigned int from = 0, to = ARRAY_SIZE(tests);
5198 bool unpriv = !is_admin();
5199
5200 if (argc == 3) {
5201 unsigned int l = atoi(argv[argc - 2]);
5202 unsigned int u = atoi(argv[argc - 1]);
5203
5204 if (l < to && u < to) {
5205 from = l;
5206 to = u + 1;
5207 }
5208 } else if (argc == 2) {
5209 unsigned int t = atoi(argv[argc - 1]);
5210
5211 if (t < to) {
5212 from = t;
5213 to = t + 1;
5214 }
5215 }
5216
5217 setrlimit(RLIMIT_MEMLOCK, unpriv ? &rlim : &rinf);
5218 return do_test(unpriv, from, to);
5219 }