summaryrefslogblamecommitdiffstats
path: root/tools/testing/selftests/bpf/verifier/stack_ptr.c
blob: 7276620ef242a4b3ae40eea1b2288d0b5e78c4d7 (plain) (tree)




























































































































































































































































































































                                                                         
{
	"PTR_TO_STACK store/load",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -10),
	BPF_ST_MEM(BPF_DW, BPF_REG_1, 2, 0xfaceb00c),
	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 2),
	BPF_EXIT_INSN(),
	},
	.result = ACCEPT,
	.retval = 0xfaceb00c,
},
{
	"PTR_TO_STACK store/load - bad alignment on off",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
	BPF_ST_MEM(BPF_DW, BPF_REG_1, 2, 0xfaceb00c),
	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 2),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "misaligned stack access off (0x0; 0x0)+-8+2 size 8",
},
{
	"PTR_TO_STACK store/load - bad alignment on reg",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -10),
	BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "misaligned stack access off (0x0; 0x0)+-10+8 size 8",
},
{
	"PTR_TO_STACK store/load - out of bounds low",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -80000),
	BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "invalid stack off=-79992 size=8",
	.errstr_unpriv = "R1 stack pointer arithmetic goes out of range",
},
{
	"PTR_TO_STACK store/load - out of bounds high",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
	BPF_ST_MEM(BPF_DW, BPF_REG_1, 8, 0xfaceb00c),
	BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_1, 8),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "invalid stack off=0 size=8",
},
{
	"PTR_TO_STACK check high 1",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -1),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.result = ACCEPT,
	.retval = 42,
},
{
	"PTR_TO_STACK check high 2",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ST_MEM(BPF_B, BPF_REG_1, -1, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, -1),
	BPF_EXIT_INSN(),
	},
	.result = ACCEPT,
	.retval = 42,
},
{
	"PTR_TO_STACK check high 3",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0),
	BPF_ST_MEM(BPF_B, BPF_REG_1, -1, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, -1),
	BPF_EXIT_INSN(),
	},
	.errstr_unpriv = "R1 stack pointer arithmetic goes out of range",
	.result_unpriv = REJECT,
	.result = ACCEPT,
	.retval = 42,
},
{
	"PTR_TO_STACK check high 4",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.errstr_unpriv = "R1 stack pointer arithmetic goes out of range",
	.errstr = "invalid stack off=0 size=1",
	.result = REJECT,
},
{
	"PTR_TO_STACK check high 5",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, (1 << 29) - 1),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "invalid stack off",
},
{
	"PTR_TO_STACK check high 6",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, (1 << 29) - 1),
	BPF_ST_MEM(BPF_B, BPF_REG_1, SHRT_MAX, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, SHRT_MAX),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "invalid stack off",
},
{
	"PTR_TO_STACK check high 7",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, (1 << 29) - 1),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, (1 << 29) - 1),
	BPF_ST_MEM(BPF_B, BPF_REG_1, SHRT_MAX, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, SHRT_MAX),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr_unpriv = "R1 stack pointer arithmetic goes out of range",
	.errstr = "fp pointer offset",
},
{
	"PTR_TO_STACK check low 1",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -512),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.result = ACCEPT,
	.retval = 42,
},
{
	"PTR_TO_STACK check low 2",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -513),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 1, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 1),
	BPF_EXIT_INSN(),
	},
	.result_unpriv = REJECT,
	.errstr_unpriv = "R1 stack pointer arithmetic goes out of range",
	.result = ACCEPT,
	.retval = 42,
},
{
	"PTR_TO_STACK check low 3",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -513),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.errstr_unpriv = "R1 stack pointer arithmetic goes out of range",
	.errstr = "invalid stack off=-513 size=1",
	.result = REJECT,
},
{
	"PTR_TO_STACK check low 4",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, INT_MIN),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "math between fp pointer",
},
{
	"PTR_TO_STACK check low 5",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -((1 << 29) - 1)),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "invalid stack off",
},
{
	"PTR_TO_STACK check low 6",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -((1 << 29) - 1)),
	BPF_ST_MEM(BPF_B, BPF_REG_1, SHRT_MIN, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, SHRT_MIN),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr = "invalid stack off",
},
{
	"PTR_TO_STACK check low 7",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -((1 << 29) - 1)),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -((1 << 29) - 1)),
	BPF_ST_MEM(BPF_B, BPF_REG_1, SHRT_MIN, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, SHRT_MIN),
	BPF_EXIT_INSN(),
	},
	.result = REJECT,
	.errstr_unpriv = "R1 stack pointer arithmetic goes out of range",
	.errstr = "fp pointer offset",
},
{
	"PTR_TO_STACK mixed reg/k, 1",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -3),
	BPF_MOV64_IMM(BPF_REG_2, -3),
	BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.result = ACCEPT,
	.retval = 42,
},
{
	"PTR_TO_STACK mixed reg/k, 2",
	.insns = {
	BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
	BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, 0),
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -3),
	BPF_MOV64_IMM(BPF_REG_2, -3),
	BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_MOV64_REG(BPF_REG_5, BPF_REG_10),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_5, -6),
	BPF_EXIT_INSN(),
	},
	.result = ACCEPT,
	.retval = 42,
},
{
	"PTR_TO_STACK mixed reg/k, 3",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -3),
	BPF_MOV64_IMM(BPF_REG_2, -3),
	BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_MOV64_REG(BPF_REG_0, BPF_REG_2),
	BPF_EXIT_INSN(),
	},
	.result = ACCEPT,
	.retval = -3,
},
{
	"PTR_TO_STACK reg",
	.insns = {
	BPF_MOV64_REG(BPF_REG_1, BPF_REG_10),
	BPF_MOV64_IMM(BPF_REG_2, -3),
	BPF_ALU64_REG(BPF_ADD, BPF_REG_1, BPF_REG_2),
	BPF_ST_MEM(BPF_B, BPF_REG_1, 0, 42),
	BPF_LDX_MEM(BPF_B, BPF_REG_0, BPF_REG_1, 0),
	BPF_EXIT_INSN(),
	},
	.result_unpriv = REJECT,
	.errstr_unpriv = "invalid stack off=0 size=1",
	.result = ACCEPT,
	.retval = 42,
},
{
	"stack pointer arithmetic",
	.insns = {
	BPF_MOV64_IMM(BPF_REG_1, 4),
	BPF_JMP_IMM(BPF_JA, 0, 0, 0),
	BPF_MOV64_REG(BPF_REG_7, BPF_REG_10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, -10),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, -10),
	BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
	BPF_ALU64_REG(BPF_ADD, BPF_REG_2, BPF_REG_1),
	BPF_ST_MEM(0, BPF_REG_2, 4, 0),
	BPF_MOV64_REG(BPF_REG_2, BPF_REG_7),
	BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, 8),
	BPF_ST_MEM(0, BPF_REG_2, 4, 0),
	BPF_MOV64_IMM(BPF_REG_0, 0),
	BPF_EXIT_INSN(),
	},
	.result = ACCEPT,
},