{ "ringbuf: invalid reservation offset 1", .insns = { /* reserve 8 byte ringbuf memory */ BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), BPF_LD_MAP_FD(BPF_REG_1, 0), BPF_MOV64_IMM(BPF_REG_2, 8), BPF_MOV64_IMM(BPF_REG_3, 0), BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_ringbuf_reserve), /* store a pointer to the reserved memory in R6 */ BPF_MOV64_REG(BPF_REG_6, BPF_REG_0), /* check whether the reservation was successful */ BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7), /* spill R6(mem) into the stack */ BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, -8), /* fill it back in R7 */ BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_10, -8), /* should be able to access *(R7) = 0 */ BPF_ST_MEM(BPF_DW, BPF_REG_7, 0, 0), /* submit the reserved ringbuf memory */ BPF_MOV64_REG(BPF_REG_1, BPF_REG_7), /* add invalid offset to reserved ringbuf memory */ BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, 0xcafe), BPF_MOV64_IMM(BPF_REG_2, 0), BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_ringbuf_submit), BPF_MOV64_IMM(BPF_REG_0, 0), BPF_EXIT_INSN(), }, .fixup_map_ringbuf = { 1 }, .result = REJECT, .errstr = "dereference of modified alloc_mem ptr R1", }, { "ringbuf: invalid reservation offset 2", .insns = { /* reserve 8 byte ringbuf memory */ BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), BPF_LD_MAP_FD(BPF_REG_1, 0), BPF_MOV64_IMM(BPF_REG_2, 8), BPF_MOV64_IMM(BPF_REG_3, 0), BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_ringbuf_reserve), /* store a pointer to the reserved memory in R6 */ BPF_MOV64_REG(BPF_REG_6, BPF_REG_0), /* check whether the reservation was successful */ BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 7), /* spill R6(mem) into the stack */ BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_6, -8), /* fill it back in R7 */ BPF_LDX_MEM(BPF_DW, BPF_REG_7, BPF_REG_10, -8), /* add invalid offset to reserved ringbuf memory */ BPF_ALU64_IMM(BPF_ADD, BPF_REG_7, 0xcafe), /* should be able to access *(R7) = 0 */ BPF_ST_MEM(BPF_DW, BPF_REG_7, 0, 0), /* submit the reserved ringbuf memory */ BPF_MOV64_REG(BPF_REG_1, BPF_REG_7), BPF_MOV64_IMM(BPF_REG_2, 0), BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_ringbuf_submit), BPF_MOV64_IMM(BPF_REG_0, 0), BPF_EXIT_INSN(), }, .fixup_map_ringbuf = { 1 }, .result = REJECT, .errstr = "R7 min value is outside of the allowed memory range", }, { "ringbuf: check passing rb mem to helpers", .insns = { BPF_MOV64_REG(BPF_REG_6, BPF_REG_1), /* reserve 8 byte ringbuf memory */ BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0), BPF_LD_MAP_FD(BPF_REG_1, 0), BPF_MOV64_IMM(BPF_REG_2, 8), BPF_MOV64_IMM(BPF_REG_3, 0), BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_ringbuf_reserve), BPF_MOV64_REG(BPF_REG_7, BPF_REG_0), /* check whether the reservation was successful */ BPF_JMP_IMM(BPF_JNE, BPF_REG_0, 0, 1), BPF_EXIT_INSN(), /* pass allocated ring buffer memory to fib lookup */ BPF_MOV64_REG(BPF_REG_1, BPF_REG_6), BPF_MOV64_REG(BPF_REG_2, BPF_REG_0), BPF_MOV64_IMM(BPF_REG_3, 8), BPF_MOV64_IMM(BPF_REG_4, 0), BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_fib_lookup), /* submit the ringbuf memory */ BPF_MOV64_REG(BPF_REG_1, BPF_REG_7), BPF_MOV64_IMM(BPF_REG_2, 0), BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 0, 0, BPF_FUNC_ringbuf_submit), BPF_MOV64_IMM(BPF_REG_0, 0), BPF_EXIT_INSN(), }, .fixup_map_ringbuf = { 2 }, .prog_type = BPF_PROG_TYPE_XDP, .result = ACCEPT, },