18c2ecf20Sopenharmony_ci{ 28c2ecf20Sopenharmony_ci "pointer/scalar confusion in state equality check (way 1)", 38c2ecf20Sopenharmony_ci .insns = { 48c2ecf20Sopenharmony_ci BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 58c2ecf20Sopenharmony_ci BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), 68c2ecf20Sopenharmony_ci BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8), 78c2ecf20Sopenharmony_ci BPF_LD_MAP_FD(BPF_REG_1, 0), 88c2ecf20Sopenharmony_ci BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 98c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2), 108c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0), 118c2ecf20Sopenharmony_ci BPF_JMP_A(1), 128c2ecf20Sopenharmony_ci BPF_MOV64_REG(BPF_REG_0, BPF_REG_10), 138c2ecf20Sopenharmony_ci BPF_JMP_A(0), 148c2ecf20Sopenharmony_ci BPF_EXIT_INSN(), 158c2ecf20Sopenharmony_ci }, 168c2ecf20Sopenharmony_ci .fixup_map_hash_8b = { 3 }, 178c2ecf20Sopenharmony_ci .result = ACCEPT, 188c2ecf20Sopenharmony_ci .retval = POINTER_VALUE, 198c2ecf20Sopenharmony_ci .result_unpriv = REJECT, 208c2ecf20Sopenharmony_ci .errstr_unpriv = "R0 leaks addr as return value" 218c2ecf20Sopenharmony_ci}, 228c2ecf20Sopenharmony_ci{ 238c2ecf20Sopenharmony_ci "pointer/scalar confusion in state equality check (way 2)", 248c2ecf20Sopenharmony_ci .insns = { 258c2ecf20Sopenharmony_ci BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 268c2ecf20Sopenharmony_ci BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), 278c2ecf20Sopenharmony_ci BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8), 288c2ecf20Sopenharmony_ci BPF_LD_MAP_FD(BPF_REG_1, 0), 298c2ecf20Sopenharmony_ci BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 308c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2), 318c2ecf20Sopenharmony_ci BPF_MOV64_REG(BPF_REG_0, BPF_REG_10), 328c2ecf20Sopenharmony_ci BPF_JMP_A(1), 338c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0), 348c2ecf20Sopenharmony_ci BPF_EXIT_INSN(), 358c2ecf20Sopenharmony_ci }, 368c2ecf20Sopenharmony_ci .fixup_map_hash_8b = { 3 }, 378c2ecf20Sopenharmony_ci .result = ACCEPT, 388c2ecf20Sopenharmony_ci .retval = POINTER_VALUE, 398c2ecf20Sopenharmony_ci .result_unpriv = REJECT, 408c2ecf20Sopenharmony_ci .errstr_unpriv = "R0 leaks addr as return value" 418c2ecf20Sopenharmony_ci}, 428c2ecf20Sopenharmony_ci{ 438c2ecf20Sopenharmony_ci "liveness pruning and write screening", 448c2ecf20Sopenharmony_ci .insns = { 458c2ecf20Sopenharmony_ci /* Get an unknown value */ 468c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 0), 478c2ecf20Sopenharmony_ci /* branch conditions teach us nothing about R2 */ 488c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1), 498c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_0, 0), 508c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1), 518c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_0, 0), 528c2ecf20Sopenharmony_ci BPF_EXIT_INSN(), 538c2ecf20Sopenharmony_ci }, 548c2ecf20Sopenharmony_ci .errstr = "R0 !read_ok", 558c2ecf20Sopenharmony_ci .result = REJECT, 568c2ecf20Sopenharmony_ci .prog_type = BPF_PROG_TYPE_LWT_IN, 578c2ecf20Sopenharmony_ci}, 588c2ecf20Sopenharmony_ci{ 598c2ecf20Sopenharmony_ci "varlen_map_value_access pruning", 608c2ecf20Sopenharmony_ci .insns = { 618c2ecf20Sopenharmony_ci BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), 628c2ecf20Sopenharmony_ci BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), 638c2ecf20Sopenharmony_ci BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8), 648c2ecf20Sopenharmony_ci BPF_LD_MAP_FD(BPF_REG_1, 0), 658c2ecf20Sopenharmony_ci BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem), 668c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8), 678c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0), 688c2ecf20Sopenharmony_ci BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES), 698c2ecf20Sopenharmony_ci BPF_JMP_REG(BPF_JSGT, BPF_REG_2, BPF_REG_1, 1), 708c2ecf20Sopenharmony_ci BPF_MOV32_IMM(BPF_REG_1, 0), 718c2ecf20Sopenharmony_ci BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2), 728c2ecf20Sopenharmony_ci BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1), 738c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JA, 0, 0, 0), 748c2ecf20Sopenharmony_ci BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, offsetof(struct test_val, foo)), 758c2ecf20Sopenharmony_ci BPF_EXIT_INSN(), 768c2ecf20Sopenharmony_ci }, 778c2ecf20Sopenharmony_ci .fixup_map_hash_48b = { 3 }, 788c2ecf20Sopenharmony_ci .errstr_unpriv = "R0 leaks addr", 798c2ecf20Sopenharmony_ci .errstr = "R0 unbounded memory access", 808c2ecf20Sopenharmony_ci .result_unpriv = REJECT, 818c2ecf20Sopenharmony_ci .result = REJECT, 828c2ecf20Sopenharmony_ci .flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS, 838c2ecf20Sopenharmony_ci}, 848c2ecf20Sopenharmony_ci{ 858c2ecf20Sopenharmony_ci "search pruning: all branches should be verified (nop operation)", 868c2ecf20Sopenharmony_ci .insns = { 878c2ecf20Sopenharmony_ci BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), 888c2ecf20Sopenharmony_ci BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8), 898c2ecf20Sopenharmony_ci BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0), 908c2ecf20Sopenharmony_ci BPF_LD_MAP_FD(BPF_REG_1, 0), 918c2ecf20Sopenharmony_ci BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem), 928c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11), 938c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0), 948c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2), 958c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_4, 0), 968c2ecf20Sopenharmony_ci BPF_JMP_A(1), 978c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_4, 1), 988c2ecf20Sopenharmony_ci BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16), 998c2ecf20Sopenharmony_ci BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns), 1008c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16), 1018c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JEQ, BPF_REG_5, 0, 2), 1028c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_6, 0), 1038c2ecf20Sopenharmony_ci BPF_ST_MEM(BPF_DW, BPF_REG_6, 0, 0xdead), 1048c2ecf20Sopenharmony_ci BPF_EXIT_INSN(), 1058c2ecf20Sopenharmony_ci }, 1068c2ecf20Sopenharmony_ci .fixup_map_hash_8b = { 3 }, 1078c2ecf20Sopenharmony_ci .errstr = "R6 invalid mem access 'inv'", 1088c2ecf20Sopenharmony_ci .result = REJECT, 1098c2ecf20Sopenharmony_ci .prog_type = BPF_PROG_TYPE_TRACEPOINT, 1108c2ecf20Sopenharmony_ci}, 1118c2ecf20Sopenharmony_ci{ 1128c2ecf20Sopenharmony_ci "search pruning: all branches should be verified (invalid stack access)", 1138c2ecf20Sopenharmony_ci .insns = { 1148c2ecf20Sopenharmony_ci BPF_MOV64_REG(BPF_REG_2, BPF_REG_10), 1158c2ecf20Sopenharmony_ci BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8), 1168c2ecf20Sopenharmony_ci BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0), 1178c2ecf20Sopenharmony_ci BPF_LD_MAP_FD(BPF_REG_1, 0), 1188c2ecf20Sopenharmony_ci BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem), 1198c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8), 1208c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0), 1218c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_4, 0), 1228c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2), 1238c2ecf20Sopenharmony_ci BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16), 1248c2ecf20Sopenharmony_ci BPF_JMP_A(1), 1258c2ecf20Sopenharmony_ci BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -24), 1268c2ecf20Sopenharmony_ci BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns), 1278c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16), 1288c2ecf20Sopenharmony_ci BPF_EXIT_INSN(), 1298c2ecf20Sopenharmony_ci }, 1308c2ecf20Sopenharmony_ci .fixup_map_hash_8b = { 3 }, 1318c2ecf20Sopenharmony_ci .errstr = "invalid read from stack off -16+0 size 8", 1328c2ecf20Sopenharmony_ci .result = REJECT, 1338c2ecf20Sopenharmony_ci .prog_type = BPF_PROG_TYPE_TRACEPOINT, 1348c2ecf20Sopenharmony_ci}, 1358c2ecf20Sopenharmony_ci{ 1368c2ecf20Sopenharmony_ci "allocated_stack", 1378c2ecf20Sopenharmony_ci .insns = { 1388c2ecf20Sopenharmony_ci BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1), 1398c2ecf20Sopenharmony_ci BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_prandom_u32), 1408c2ecf20Sopenharmony_ci BPF_ALU64_REG(BPF_MOV, BPF_REG_7, BPF_REG_0), 1418c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5), 1428c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_0, 0), 1438c2ecf20Sopenharmony_ci BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, -8), 1448c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_10, -8), 1458c2ecf20Sopenharmony_ci BPF_STX_MEM(BPF_B, BPF_REG_10, BPF_REG_7, -9), 1468c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_B, BPF_REG_7, BPF_REG_10, -9), 1478c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 0), 1488c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 0), 1498c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 0), 1508c2ecf20Sopenharmony_ci BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 0), 1518c2ecf20Sopenharmony_ci BPF_EXIT_INSN(), 1528c2ecf20Sopenharmony_ci }, 1538c2ecf20Sopenharmony_ci .result = ACCEPT, 1548c2ecf20Sopenharmony_ci .result_unpriv = ACCEPT, 1558c2ecf20Sopenharmony_ci .insn_processed = 15, 1568c2ecf20Sopenharmony_ci}, 1578c2ecf20Sopenharmony_ci/* The test performs a conditional 64-bit write to a stack location 1588c2ecf20Sopenharmony_ci * fp[-8], this is followed by an unconditional 8-bit write to fp[-8], 1598c2ecf20Sopenharmony_ci * then data is read from fp[-8]. This sequence is unsafe. 1608c2ecf20Sopenharmony_ci * 1618c2ecf20Sopenharmony_ci * The test would be mistakenly marked as safe w/o dst register parent 1628c2ecf20Sopenharmony_ci * preservation in verifier.c:copy_register_state() function. 1638c2ecf20Sopenharmony_ci * 1648c2ecf20Sopenharmony_ci * Note the usage of BPF_F_TEST_STATE_FREQ to force creation of the 1658c2ecf20Sopenharmony_ci * checkpoint state after conditional 64-bit assignment. 1668c2ecf20Sopenharmony_ci */ 1678c2ecf20Sopenharmony_ci{ 1688c2ecf20Sopenharmony_ci "write tracking and register parent chain bug", 1698c2ecf20Sopenharmony_ci .insns = { 1708c2ecf20Sopenharmony_ci /* r6 = ktime_get_ns() */ 1718c2ecf20Sopenharmony_ci BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns), 1728c2ecf20Sopenharmony_ci BPF_MOV64_REG(BPF_REG_6, BPF_REG_0), 1738c2ecf20Sopenharmony_ci /* r0 = ktime_get_ns() */ 1748c2ecf20Sopenharmony_ci BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns), 1758c2ecf20Sopenharmony_ci /* if r0 > r6 goto +1 */ 1768c2ecf20Sopenharmony_ci BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_6, 1), 1778c2ecf20Sopenharmony_ci /* *(u64 *)(r10 - 8) = 0xdeadbeef */ 1788c2ecf20Sopenharmony_ci BPF_ST_MEM(BPF_DW, BPF_REG_FP, -8, 0xdeadbeef), 1798c2ecf20Sopenharmony_ci /* r1 = 42 */ 1808c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_1, 42), 1818c2ecf20Sopenharmony_ci /* *(u8 *)(r10 - 8) = r1 */ 1828c2ecf20Sopenharmony_ci BPF_STX_MEM(BPF_B, BPF_REG_FP, BPF_REG_1, -8), 1838c2ecf20Sopenharmony_ci /* r2 = *(u64 *)(r10 - 8) */ 1848c2ecf20Sopenharmony_ci BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_FP, -8), 1858c2ecf20Sopenharmony_ci /* exit(0) */ 1868c2ecf20Sopenharmony_ci BPF_MOV64_IMM(BPF_REG_0, 0), 1878c2ecf20Sopenharmony_ci BPF_EXIT_INSN(), 1888c2ecf20Sopenharmony_ci }, 1898c2ecf20Sopenharmony_ci .flags = BPF_F_TEST_STATE_FREQ, 1908c2ecf20Sopenharmony_ci .errstr = "invalid read from stack off -8+1 size 8", 1918c2ecf20Sopenharmony_ci .result = REJECT, 1928c2ecf20Sopenharmony_ci}, 193