|
| 1 | +// SPDX-License-Identifier: GPL-2.0 |
| 2 | + |
| 3 | +#include <vmlinux.h> |
| 4 | +#include <bpf/bpf_core_read.h> |
| 5 | +#include "bpf_misc.h" |
| 6 | +#include "../test_kmods/bpf_testmod_kfunc.h" |
| 7 | + |
| 8 | +SEC("socket") |
| 9 | +__success |
| 10 | +__retval(0) |
| 11 | +int ldx_is_ok_bad_addr(void *ctx) |
| 12 | +{ |
| 13 | + char *p; |
| 14 | + |
| 15 | + if (!bpf_core_enum_value_exists(enum bpf_features, BPF_FEAT_RDONLY_CAST_TO_VOID)) |
| 16 | + return 42; |
| 17 | + |
| 18 | + p = bpf_rdonly_cast(0, 0); |
| 19 | + return p[0x7fff]; |
| 20 | +} |
| 21 | + |
| 22 | +SEC("socket") |
| 23 | +__success |
| 24 | +__retval(1) |
| 25 | +int ldx_is_ok_good_addr(void *ctx) |
| 26 | +{ |
| 27 | + int v, *p; |
| 28 | + |
| 29 | + v = 1; |
| 30 | + p = bpf_rdonly_cast(&v, 0); |
| 31 | + return *p; |
| 32 | +} |
| 33 | + |
| 34 | +SEC("socket") |
| 35 | +__success |
| 36 | +int offset_not_tracked(void *ctx) |
| 37 | +{ |
| 38 | + int *p, i, s; |
| 39 | + |
| 40 | + p = bpf_rdonly_cast(0, 0); |
| 41 | + s = 0; |
| 42 | + bpf_for(i, 0, 1000 * 1000 * 1000) { |
| 43 | + p++; |
| 44 | + s += *p; |
| 45 | + } |
| 46 | + return s; |
| 47 | +} |
| 48 | + |
| 49 | +SEC("socket") |
| 50 | +__failure |
| 51 | +__msg("cannot write into rdonly_untrusted_mem") |
| 52 | +int stx_not_ok(void *ctx) |
| 53 | +{ |
| 54 | + int v, *p; |
| 55 | + |
| 56 | + p = bpf_rdonly_cast(&v, 0); |
| 57 | + *p = 1; |
| 58 | + return 0; |
| 59 | +} |
| 60 | + |
| 61 | +SEC("socket") |
| 62 | +__failure |
| 63 | +__msg("cannot write into rdonly_untrusted_mem") |
| 64 | +int atomic_not_ok(void *ctx) |
| 65 | +{ |
| 66 | + int v, *p; |
| 67 | + |
| 68 | + p = bpf_rdonly_cast(&v, 0); |
| 69 | + __sync_fetch_and_add(p, 1); |
| 70 | + return 0; |
| 71 | +} |
| 72 | + |
| 73 | +SEC("socket") |
| 74 | +__failure |
| 75 | +__msg("cannot write into rdonly_untrusted_mem") |
| 76 | +int atomic_rmw_not_ok(void *ctx) |
| 77 | +{ |
| 78 | + long v, *p; |
| 79 | + |
| 80 | + p = bpf_rdonly_cast(&v, 0); |
| 81 | + return __sync_val_compare_and_swap(p, 0, 42); |
| 82 | +} |
| 83 | + |
| 84 | +SEC("socket") |
| 85 | +__failure |
| 86 | +__msg("invalid access to memory, mem_size=0 off=0 size=4") |
| 87 | +__msg("R1 min value is outside of the allowed memory range") |
| 88 | +int kfunc_param_not_ok(void *ctx) |
| 89 | +{ |
| 90 | + int *p; |
| 91 | + |
| 92 | + p = bpf_rdonly_cast(0, 0); |
| 93 | + bpf_kfunc_trusted_num_test(p); |
| 94 | + return 0; |
| 95 | +} |
| 96 | + |
| 97 | +SEC("?fentry.s/" SYS_PREFIX "sys_getpgid") |
| 98 | +__failure |
| 99 | +__msg("R1 type=rdonly_untrusted_mem expected=") |
| 100 | +int helper_param_not_ok(void *ctx) |
| 101 | +{ |
| 102 | + char *p; |
| 103 | + |
| 104 | + p = bpf_rdonly_cast(0, 0); |
| 105 | + /* |
| 106 | + * Any helper with ARG_CONST_SIZE_OR_ZERO constraint will do, |
| 107 | + * the most permissive constraint |
| 108 | + */ |
| 109 | + bpf_copy_from_user(p, 0, (void *)42); |
| 110 | + return 0; |
| 111 | +} |
| 112 | + |
| 113 | +static __noinline u64 *get_some_addr(void) |
| 114 | +{ |
| 115 | + if (bpf_get_prandom_u32()) |
| 116 | + return bpf_rdonly_cast(0, bpf_core_type_id_kernel(struct sock)); |
| 117 | + else |
| 118 | + return bpf_rdonly_cast(0, 0); |
| 119 | +} |
| 120 | + |
| 121 | +SEC("socket") |
| 122 | +__success |
| 123 | +__retval(0) |
| 124 | +int mixed_mem_type(void *ctx) |
| 125 | +{ |
| 126 | + u64 *p; |
| 127 | + |
| 128 | + /* Try to avoid compiler hoisting load to if branches by using __noinline func. */ |
| 129 | + p = get_some_addr(); |
| 130 | + return *p; |
| 131 | +} |
| 132 | + |
| 133 | +char _license[] SEC("license") = "GPL"; |
0 commit comments