18c2ecf20Sopenharmony_ci{
28c2ecf20Sopenharmony_ci	"pointer/scalar confusion in state equality check (way 1)",
38c2ecf20Sopenharmony_ci	.insns = {
48c2ecf20Sopenharmony_ci	BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
58c2ecf20Sopenharmony_ci	BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
68c2ecf20Sopenharmony_ci	BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
78c2ecf20Sopenharmony_ci	BPF_LD_MAP_FD(BPF_REG_1, 0),
88c2ecf20Sopenharmony_ci	BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
98c2ecf20Sopenharmony_ci	BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 2),
108c2ecf20Sopenharmony_ci	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0),
118c2ecf20Sopenharmony_ci	BPF_JMP_A(1),
128c2ecf20Sopenharmony_ci	BPF_MOV64_REG(BPF_REG_0, BPF_REG_10),
138c2ecf20Sopenharmony_ci	BPF_JMP_A(0),
148c2ecf20Sopenharmony_ci	BPF_EXIT_INSN(),
158c2ecf20Sopenharmony_ci	},
168c2ecf20Sopenharmony_ci	.fixup_map_hash_8b = { 3 },
178c2ecf20Sopenharmony_ci	.result = ACCEPT,
188c2ecf20Sopenharmony_ci	.retval = POINTER_VALUE,
198c2ecf20Sopenharmony_ci	.result_unpriv = REJECT,
208c2ecf20Sopenharmony_ci	.errstr_unpriv = "R0 leaks addr as return value"
218c2ecf20Sopenharmony_ci},
228c2ecf20Sopenharmony_ci{
238c2ecf20Sopenharmony_ci	"pointer/scalar confusion in state equality check (way 2)",
248c2ecf20Sopenharmony_ci	.insns = {
258c2ecf20Sopenharmony_ci	BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
268c2ecf20Sopenharmony_ci	BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
278c2ecf20Sopenharmony_ci	BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
288c2ecf20Sopenharmony_ci	BPF_LD_MAP_FD(BPF_REG_1, 0),
298c2ecf20Sopenharmony_ci	BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
308c2ecf20Sopenharmony_ci	BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 2),
318c2ecf20Sopenharmony_ci	BPF_MOV64_REG(BPF_REG_0, BPF_REG_10),
328c2ecf20Sopenharmony_ci	BPF_JMP_A(1),
338c2ecf20Sopenharmony_ci	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_0, 0),
348c2ecf20Sopenharmony_ci	BPF_EXIT_INSN(),
358c2ecf20Sopenharmony_ci	},
368c2ecf20Sopenharmony_ci	.fixup_map_hash_8b = { 3 },
378c2ecf20Sopenharmony_ci	.result = ACCEPT,
388c2ecf20Sopenharmony_ci	.retval = POINTER_VALUE,
398c2ecf20Sopenharmony_ci	.result_unpriv = REJECT,
408c2ecf20Sopenharmony_ci	.errstr_unpriv = "R0 leaks addr as return value"
418c2ecf20Sopenharmony_ci},
428c2ecf20Sopenharmony_ci{
438c2ecf20Sopenharmony_ci	"liveness pruning and write screening",
448c2ecf20Sopenharmony_ci	.insns = {
458c2ecf20Sopenharmony_ci	/* Get an unknown value */
468c2ecf20Sopenharmony_ci	BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 0),
478c2ecf20Sopenharmony_ci	/* branch conditions teach us nothing about R2 */
488c2ecf20Sopenharmony_ci	BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1),
498c2ecf20Sopenharmony_ci	BPF_MOV64_IMM(BPF_REG_0, 0),
508c2ecf20Sopenharmony_ci	BPF_JMP_IMM(BPF_JGE, BPF_REG_2, 0, 1),
518c2ecf20Sopenharmony_ci	BPF_MOV64_IMM(BPF_REG_0, 0),
528c2ecf20Sopenharmony_ci	BPF_EXIT_INSN(),
538c2ecf20Sopenharmony_ci	},
548c2ecf20Sopenharmony_ci	.errstr = "R0 !read_ok",
558c2ecf20Sopenharmony_ci	.result = REJECT,
568c2ecf20Sopenharmony_ci	.prog_type = BPF_PROG_TYPE_LWT_IN,
578c2ecf20Sopenharmony_ci},
588c2ecf20Sopenharmony_ci{
598c2ecf20Sopenharmony_ci	"varlen_map_value_access pruning",
608c2ecf20Sopenharmony_ci	.insns = {
618c2ecf20Sopenharmony_ci	BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
628c2ecf20Sopenharmony_ci	BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
638c2ecf20Sopenharmony_ci	BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
648c2ecf20Sopenharmony_ci	BPF_LD_MAP_FD(BPF_REG_1, 0),
658c2ecf20Sopenharmony_ci	BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_map_lookup_elem),
668c2ecf20Sopenharmony_ci	BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
678c2ecf20Sopenharmony_ci	BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_0, 0),
688c2ecf20Sopenharmony_ci	BPF_MOV32_IMM(BPF_REG_2, MAX_ENTRIES),
698c2ecf20Sopenharmony_ci	BPF_JMP_REG(BPF_JSGT, BPF_REG_2, BPF_REG_1, 1),
708c2ecf20Sopenharmony_ci	BPF_MOV32_IMM(BPF_REG_1, 0),
718c2ecf20Sopenharmony_ci	BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 2),
728c2ecf20Sopenharmony_ci	BPF_ALU64_REG(BPF_ADD, BPF_REG_0, BPF_REG_1),
738c2ecf20Sopenharmony_ci	BPF_JMP_IMM(BPF_JA, 0, 0, 0),
748c2ecf20Sopenharmony_ci	BPF_ST_MEM(BPF_DW, BPF_REG_0, 0, offsetof(struct test_val, foo)),
758c2ecf20Sopenharmony_ci	BPF_EXIT_INSN(),
768c2ecf20Sopenharmony_ci	},
778c2ecf20Sopenharmony_ci	.fixup_map_hash_48b = { 3 },
788c2ecf20Sopenharmony_ci	.errstr_unpriv = "R0 leaks addr",
798c2ecf20Sopenharmony_ci	.errstr = "R0 unbounded memory access",
808c2ecf20Sopenharmony_ci	.result_unpriv = REJECT,
818c2ecf20Sopenharmony_ci	.result = REJECT,
828c2ecf20Sopenharmony_ci	.flags = F_NEEDS_EFFICIENT_UNALIGNED_ACCESS,
838c2ecf20Sopenharmony_ci},
848c2ecf20Sopenharmony_ci{
858c2ecf20Sopenharmony_ci	"search pruning: all branches should be verified (nop operation)",
868c2ecf20Sopenharmony_ci	.insns = {
878c2ecf20Sopenharmony_ci		BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
888c2ecf20Sopenharmony_ci		BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
898c2ecf20Sopenharmony_ci		BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
908c2ecf20Sopenharmony_ci		BPF_LD_MAP_FD(BPF_REG_1, 0),
918c2ecf20Sopenharmony_ci		BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
928c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 11),
938c2ecf20Sopenharmony_ci		BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
948c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2),
958c2ecf20Sopenharmony_ci		BPF_MOV64_IMM(BPF_REG_4, 0),
968c2ecf20Sopenharmony_ci		BPF_JMP_A(1),
978c2ecf20Sopenharmony_ci		BPF_MOV64_IMM(BPF_REG_4, 1),
988c2ecf20Sopenharmony_ci		BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16),
998c2ecf20Sopenharmony_ci		BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
1008c2ecf20Sopenharmony_ci		BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16),
1018c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JEQ, BPF_REG_5, 0, 2),
1028c2ecf20Sopenharmony_ci		BPF_MOV64_IMM(BPF_REG_6, 0),
1038c2ecf20Sopenharmony_ci		BPF_ST_MEM(BPF_DW, BPF_REG_6, 0, 0xdead),
1048c2ecf20Sopenharmony_ci		BPF_EXIT_INSN(),
1058c2ecf20Sopenharmony_ci	},
1068c2ecf20Sopenharmony_ci	.fixup_map_hash_8b = { 3 },
1078c2ecf20Sopenharmony_ci	.errstr = "R6 invalid mem access 'inv'",
1088c2ecf20Sopenharmony_ci	.result = REJECT,
1098c2ecf20Sopenharmony_ci	.prog_type = BPF_PROG_TYPE_TRACEPOINT,
1108c2ecf20Sopenharmony_ci},
1118c2ecf20Sopenharmony_ci{
1128c2ecf20Sopenharmony_ci	"search pruning: all branches should be verified (invalid stack access)",
1138c2ecf20Sopenharmony_ci	.insns = {
1148c2ecf20Sopenharmony_ci		BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
1158c2ecf20Sopenharmony_ci		BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1168c2ecf20Sopenharmony_ci		BPF_ST_MEM(BPF_DW, BPF_REG_2, 0, 0),
1178c2ecf20Sopenharmony_ci		BPF_LD_MAP_FD(BPF_REG_1, 0),
1188c2ecf20Sopenharmony_ci		BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
1198c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 8),
1208c2ecf20Sopenharmony_ci		BPF_LDX_MEM(BPF_DW, BPF_REG_3, BPF_REG_0, 0),
1218c2ecf20Sopenharmony_ci		BPF_MOV64_IMM(BPF_REG_4, 0),
1228c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JEQ, BPF_REG_3, 0xbeef, 2),
1238c2ecf20Sopenharmony_ci		BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -16),
1248c2ecf20Sopenharmony_ci		BPF_JMP_A(1),
1258c2ecf20Sopenharmony_ci		BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_4, -24),
1268c2ecf20Sopenharmony_ci		BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
1278c2ecf20Sopenharmony_ci		BPF_LDX_MEM(BPF_DW, BPF_REG_5, BPF_REG_10, -16),
1288c2ecf20Sopenharmony_ci		BPF_EXIT_INSN(),
1298c2ecf20Sopenharmony_ci	},
1308c2ecf20Sopenharmony_ci	.fixup_map_hash_8b = { 3 },
1318c2ecf20Sopenharmony_ci	.errstr = "invalid read from stack off -16+0 size 8",
1328c2ecf20Sopenharmony_ci	.result = REJECT,
1338c2ecf20Sopenharmony_ci	.prog_type = BPF_PROG_TYPE_TRACEPOINT,
1348c2ecf20Sopenharmony_ci},
1358c2ecf20Sopenharmony_ci{
1368c2ecf20Sopenharmony_ci	"allocated_stack",
1378c2ecf20Sopenharmony_ci	.insns = {
1388c2ecf20Sopenharmony_ci		BPF_ALU64_REG(BPF_MOV, BPF_REG_6, BPF_REG_1),
1398c2ecf20Sopenharmony_ci		BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_get_prandom_u32),
1408c2ecf20Sopenharmony_ci		BPF_ALU64_REG(BPF_MOV, BPF_REG_7, BPF_REG_0),
1418c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 5),
1428c2ecf20Sopenharmony_ci		BPF_MOV64_IMM(BPF_REG_0, 0),
1438c2ecf20Sopenharmony_ci		BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, -8),
1448c2ecf20Sopenharmony_ci		BPF_LDX_MEM(BPF_DW, BPF_REG_6, BPF_REG_10, -8),
1458c2ecf20Sopenharmony_ci		BPF_STX_MEM(BPF_B, BPF_REG_10, BPF_REG_7, -9),
1468c2ecf20Sopenharmony_ci		BPF_LDX_MEM(BPF_B, BPF_REG_7, BPF_REG_10, -9),
1478c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 0),
1488c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 0),
1498c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 0),
1508c2ecf20Sopenharmony_ci		BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 0),
1518c2ecf20Sopenharmony_ci		BPF_EXIT_INSN(),
1528c2ecf20Sopenharmony_ci	},
1538c2ecf20Sopenharmony_ci	.result = ACCEPT,
1548c2ecf20Sopenharmony_ci	.result_unpriv = ACCEPT,
1558c2ecf20Sopenharmony_ci	.insn_processed = 15,
1568c2ecf20Sopenharmony_ci},
1578c2ecf20Sopenharmony_ci/* The test performs a conditional 64-bit write to a stack location
1588c2ecf20Sopenharmony_ci * fp[-8], this is followed by an unconditional 8-bit write to fp[-8],
1598c2ecf20Sopenharmony_ci * then data is read from fp[-8]. This sequence is unsafe.
1608c2ecf20Sopenharmony_ci *
1618c2ecf20Sopenharmony_ci * The test would be mistakenly marked as safe w/o dst register parent
1628c2ecf20Sopenharmony_ci * preservation in verifier.c:copy_register_state() function.
1638c2ecf20Sopenharmony_ci *
1648c2ecf20Sopenharmony_ci * Note the usage of BPF_F_TEST_STATE_FREQ to force creation of the
1658c2ecf20Sopenharmony_ci * checkpoint state after conditional 64-bit assignment.
1668c2ecf20Sopenharmony_ci */
1678c2ecf20Sopenharmony_ci{
1688c2ecf20Sopenharmony_ci	"write tracking and register parent chain bug",
1698c2ecf20Sopenharmony_ci	.insns = {
1708c2ecf20Sopenharmony_ci	/* r6 = ktime_get_ns() */
1718c2ecf20Sopenharmony_ci	BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
1728c2ecf20Sopenharmony_ci	BPF_MOV64_REG(BPF_REG_6, BPF_REG_0),
1738c2ecf20Sopenharmony_ci	/* r0 = ktime_get_ns() */
1748c2ecf20Sopenharmony_ci	BPF_EMIT_CALL(BPF_FUNC_ktime_get_ns),
1758c2ecf20Sopenharmony_ci	/* if r0 > r6 goto +1 */
1768c2ecf20Sopenharmony_ci	BPF_JMP_REG(BPF_JGT, BPF_REG_0, BPF_REG_6, 1),
1778c2ecf20Sopenharmony_ci	/* *(u64 *)(r10 - 8) = 0xdeadbeef */
1788c2ecf20Sopenharmony_ci	BPF_ST_MEM(BPF_DW, BPF_REG_FP, -8, 0xdeadbeef),
1798c2ecf20Sopenharmony_ci	/* r1 = 42 */
1808c2ecf20Sopenharmony_ci	BPF_MOV64_IMM(BPF_REG_1, 42),
1818c2ecf20Sopenharmony_ci	/* *(u8 *)(r10 - 8) = r1 */
1828c2ecf20Sopenharmony_ci	BPF_STX_MEM(BPF_B, BPF_REG_FP, BPF_REG_1, -8),
1838c2ecf20Sopenharmony_ci	/* r2 = *(u64 *)(r10 - 8) */
1848c2ecf20Sopenharmony_ci	BPF_LDX_MEM(BPF_DW, BPF_REG_2, BPF_REG_FP, -8),
1858c2ecf20Sopenharmony_ci	/* exit(0) */
1868c2ecf20Sopenharmony_ci	BPF_MOV64_IMM(BPF_REG_0, 0),
1878c2ecf20Sopenharmony_ci	BPF_EXIT_INSN(),
1888c2ecf20Sopenharmony_ci	},
1898c2ecf20Sopenharmony_ci	.flags = BPF_F_TEST_STATE_FREQ,
1908c2ecf20Sopenharmony_ci	.errstr = "invalid read from stack off -8+1 size 8",
1918c2ecf20Sopenharmony_ci	.result = REJECT,
1928c2ecf20Sopenharmony_ci},
193