1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229
|
// SPDX-License-Identifier: GPL-2.0
#include <vmlinux.h>
#include <bpf/bpf_core_read.h>
#include "bpf_misc.h"
#include "../test_kmods/bpf_testmod_kfunc.h"
SEC("tp_btf/sys_enter")
__success
__log_level(2)
__msg("r8 = *(u64 *)(r7 +0) ; R7_w=ptr_nameidata(off={{[0-9]+}}) R8_w=rdonly_untrusted_mem(sz=0)")
__msg("r9 = *(u8 *)(r8 +0) ; R8_w=rdonly_untrusted_mem(sz=0) R9_w=scalar")
int btf_id_to_ptr_mem(void *ctx)
{
struct task_struct *task;
struct nameidata *idata;
u64 ret, off;
task = bpf_get_current_task_btf();
idata = task->nameidata;
off = bpf_core_field_offset(struct nameidata, pathname);
/*
* asm block to have reliable match target for __msg, equivalent of:
* ret = task->nameidata->pathname[0];
*/
asm volatile (
"r7 = %[idata];"
"r7 += %[off];"
"r8 = *(u64 *)(r7 + 0);"
"r9 = *(u8 *)(r8 + 0);"
"%[ret] = r9;"
: [ret]"=r"(ret)
: [idata]"r"(idata),
[off]"r"(off)
: "r7", "r8", "r9");
return ret;
}
SEC("socket")
__success
__retval(0)
int ldx_is_ok_bad_addr(void *ctx)
{
char *p;
if (!bpf_core_enum_value_exists(enum bpf_features, BPF_FEAT_RDONLY_CAST_TO_VOID))
return 42;
p = bpf_rdonly_cast(0, 0);
return p[0x7fff];
}
SEC("socket")
__success
__retval(1)
int ldx_is_ok_good_addr(void *ctx)
{
int v, *p;
v = 1;
p = bpf_rdonly_cast(&v, 0);
return *p;
}
SEC("socket")
__success
int offset_not_tracked(void *ctx)
{
int *p, i, s;
p = bpf_rdonly_cast(0, 0);
s = 0;
bpf_for(i, 0, 1000 * 1000 * 1000) {
p++;
s += *p;
}
return s;
}
SEC("socket")
__failure
__msg("cannot write into rdonly_untrusted_mem")
int stx_not_ok(void *ctx)
{
int v, *p;
v = 1;
p = bpf_rdonly_cast(&v, 0);
*p = 1;
return 0;
}
SEC("socket")
__failure
__msg("cannot write into rdonly_untrusted_mem")
int atomic_not_ok(void *ctx)
{
int v, *p;
v = 1;
p = bpf_rdonly_cast(&v, 0);
__sync_fetch_and_add(p, 1);
return 0;
}
SEC("socket")
__failure
__msg("cannot write into rdonly_untrusted_mem")
int atomic_rmw_not_ok(void *ctx)
{
long v, *p;
v = 1;
p = bpf_rdonly_cast(&v, 0);
return __sync_val_compare_and_swap(p, 0, 42);
}
SEC("socket")
__failure
__msg("invalid access to memory, mem_size=0 off=0 size=4")
__msg("R1 min value is outside of the allowed memory range")
int kfunc_param_not_ok(void *ctx)
{
int *p;
p = bpf_rdonly_cast(0, 0);
bpf_kfunc_trusted_num_test(p);
return 0;
}
SEC("?fentry.s/" SYS_PREFIX "sys_getpgid")
__failure
__msg("R1 type=rdonly_untrusted_mem expected=")
int helper_param_not_ok(void *ctx)
{
char *p;
p = bpf_rdonly_cast(0, 0);
/*
* Any helper with ARG_CONST_SIZE_OR_ZERO constraint will do,
* the most permissive constraint
*/
bpf_copy_from_user(p, 0, (void *)42);
return 0;
}
static __noinline u64 *get_some_addr(void)
{
if (bpf_get_prandom_u32())
return bpf_rdonly_cast(0, bpf_core_type_id_kernel(struct sock));
else
return bpf_rdonly_cast(0, 0);
}
SEC("socket")
__success
__retval(0)
int mixed_mem_type(void *ctx)
{
u64 *p;
/* Try to avoid compiler hoisting load to if branches by using __noinline func. */
p = get_some_addr();
return *p;
}
__attribute__((__aligned__(8)))
u8 global[] = {
0x11, 0x22, 0x33, 0x44,
0x55, 0x66, 0x77, 0x88,
0x99
};
__always_inline
static u64 combine(void *p)
{
u64 acc;
acc = 0;
#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
acc |= (*(u64 *)p >> 56) << 24;
acc |= (*(u32 *)p >> 24) << 16;
acc |= (*(u16 *)p >> 8) << 8;
acc |= *(u8 *)p;
#else
acc |= (*(u64 *)p & 0xff) << 24;
acc |= (*(u32 *)p & 0xff) << 16;
acc |= (*(u16 *)p & 0xff) << 8;
acc |= *(u8 *)p;
#endif
return acc;
}
SEC("socket")
__retval(0x88442211)
int diff_size_access(void *ctx)
{
return combine(bpf_rdonly_cast(&global, 0));
}
SEC("socket")
__retval(0x99553322)
int misaligned_access(void *ctx)
{
return combine(bpf_rdonly_cast(&global, 0) + 1);
}
__weak int return_one(void)
{
return 1;
}
SEC("socket")
__success
__retval(1)
int null_check(void *ctx)
{
int *p;
p = bpf_rdonly_cast(0, 0);
if (p == 0)
/* make this a function call to avoid compiler
* moving r0 assignment before check.
*/
return return_one();
return 0;
}
char _license[] SEC("license") = "GPL";
|