1 // SPDX-License-Identifier: GPL-2.0
2 /* Converted from tools/testing/selftests/bpf/verifier/runtime_jit.c */
5 #include <bpf/bpf_helpers.h>
8 void dummy_prog_42_socket(void);
9 void dummy_prog_24_socket(void);
10 void dummy_prog_loop1_socket(void);
11 void dummy_prog_loop2_socket(void);
14 __uint(type, BPF_MAP_TYPE_PROG_ARRAY);
15 __uint(max_entries, 4);
16 __uint(key_size, sizeof(int));
17 __array(values, void (void));
18 } map_prog1_socket SEC(".maps") = {
20 [0] = (void *)&dummy_prog_42_socket,
21 [1] = (void *)&dummy_prog_loop1_socket,
22 [2] = (void *)&dummy_prog_24_socket,
27 __uint(type, BPF_MAP_TYPE_PROG_ARRAY);
28 __uint(max_entries, 8);
29 __uint(key_size, sizeof(int));
30 __array(values, void (void));
31 } map_prog2_socket SEC(".maps") = {
33 [1] = (void *)&dummy_prog_loop2_socket,
34 [2] = (void *)&dummy_prog_24_socket,
35 [7] = (void *)&dummy_prog_42_socket,
40 __auxiliary __auxiliary_unpriv
41 __naked void dummy_prog_42_socket(void)
43 asm volatile ("r0 = 42; exit;");
47 __auxiliary __auxiliary_unpriv
48 __naked void dummy_prog_24_socket(void)
50 asm volatile ("r0 = 24; exit;");
54 __auxiliary __auxiliary_unpriv
55 __naked void dummy_prog_loop1_socket(void)
59 r2 = %[map_prog1_socket] ll; \
60 call %[bpf_tail_call]; \
64 : __imm(bpf_tail_call),
65 __imm_addr(map_prog1_socket)
70 __auxiliary __auxiliary_unpriv
71 __naked void dummy_prog_loop2_socket(void)
75 r2 = %[map_prog2_socket] ll; \
76 call %[bpf_tail_call]; \
80 : __imm(bpf_tail_call),
81 __imm_addr(map_prog2_socket)
86 __description("runtime/jit: tail_call within bounds, prog once")
87 __success __success_unpriv __retval(42)
88 __naked void call_within_bounds_prog_once(void)
92 r2 = %[map_prog1_socket] ll; \
93 call %[bpf_tail_call]; \
97 : __imm(bpf_tail_call),
98 __imm_addr(map_prog1_socket)
103 __description("runtime/jit: tail_call within bounds, prog loop")
104 __success __success_unpriv __retval(41)
105 __naked void call_within_bounds_prog_loop(void)
109 r2 = %[map_prog1_socket] ll; \
110 call %[bpf_tail_call]; \
114 : __imm(bpf_tail_call),
115 __imm_addr(map_prog1_socket)
120 __description("runtime/jit: tail_call within bounds, no prog")
121 __success __success_unpriv __retval(1)
122 __naked void call_within_bounds_no_prog(void)
126 r2 = %[map_prog1_socket] ll; \
127 call %[bpf_tail_call]; \
131 : __imm(bpf_tail_call),
132 __imm_addr(map_prog1_socket)
137 __description("runtime/jit: tail_call within bounds, key 2")
138 __success __success_unpriv __retval(24)
139 __naked void call_within_bounds_key_2(void)
143 r2 = %[map_prog1_socket] ll; \
144 call %[bpf_tail_call]; \
148 : __imm(bpf_tail_call),
149 __imm_addr(map_prog1_socket)
154 __description("runtime/jit: tail_call within bounds, key 2 / key 2, first branch")
155 __success __success_unpriv __retval(24)
156 __naked void _2_key_2_first_branch(void)
160 *(u8*)(r1 + %[__sk_buff_cb_0]) = r0; \
161 r0 = *(u8*)(r1 + %[__sk_buff_cb_0]); \
162 if r0 == 13 goto l0_%=; \
164 r2 = %[map_prog1_socket] ll; \
167 r2 = %[map_prog1_socket] ll; \
168 l1_%=: call %[bpf_tail_call]; \
172 : __imm(bpf_tail_call),
173 __imm_addr(map_prog1_socket),
174 __imm_const(__sk_buff_cb_0, offsetof(struct __sk_buff, cb[0]))
179 __description("runtime/jit: tail_call within bounds, key 2 / key 2, second branch")
180 __success __success_unpriv __retval(24)
181 __naked void _2_key_2_second_branch(void)
185 *(u8*)(r1 + %[__sk_buff_cb_0]) = r0; \
186 r0 = *(u8*)(r1 + %[__sk_buff_cb_0]); \
187 if r0 == 13 goto l0_%=; \
189 r2 = %[map_prog1_socket] ll; \
192 r2 = %[map_prog1_socket] ll; \
193 l1_%=: call %[bpf_tail_call]; \
197 : __imm(bpf_tail_call),
198 __imm_addr(map_prog1_socket),
199 __imm_const(__sk_buff_cb_0, offsetof(struct __sk_buff, cb[0]))
204 __description("runtime/jit: tail_call within bounds, key 0 / key 2, first branch")
205 __success __success_unpriv __retval(24)
206 __naked void _0_key_2_first_branch(void)
210 *(u8*)(r1 + %[__sk_buff_cb_0]) = r0; \
211 r0 = *(u8*)(r1 + %[__sk_buff_cb_0]); \
212 if r0 == 13 goto l0_%=; \
214 r2 = %[map_prog1_socket] ll; \
217 r2 = %[map_prog1_socket] ll; \
218 l1_%=: call %[bpf_tail_call]; \
222 : __imm(bpf_tail_call),
223 __imm_addr(map_prog1_socket),
224 __imm_const(__sk_buff_cb_0, offsetof(struct __sk_buff, cb[0]))
229 __description("runtime/jit: tail_call within bounds, key 0 / key 2, second branch")
230 __success __success_unpriv __retval(42)
231 __naked void _0_key_2_second_branch(void)
235 *(u8*)(r1 + %[__sk_buff_cb_0]) = r0; \
236 r0 = *(u8*)(r1 + %[__sk_buff_cb_0]); \
237 if r0 == 13 goto l0_%=; \
239 r2 = %[map_prog1_socket] ll; \
242 r2 = %[map_prog1_socket] ll; \
243 l1_%=: call %[bpf_tail_call]; \
247 : __imm(bpf_tail_call),
248 __imm_addr(map_prog1_socket),
249 __imm_const(__sk_buff_cb_0, offsetof(struct __sk_buff, cb[0]))
254 __description("runtime/jit: tail_call within bounds, different maps, first branch")
255 __success __failure_unpriv __msg_unpriv("tail_call abusing map_ptr")
257 __naked void bounds_different_maps_first_branch(void)
261 *(u8*)(r1 + %[__sk_buff_cb_0]) = r0; \
262 r0 = *(u8*)(r1 + %[__sk_buff_cb_0]); \
263 if r0 == 13 goto l0_%=; \
265 r2 = %[map_prog1_socket] ll; \
268 r2 = %[map_prog2_socket] ll; \
269 l1_%=: call %[bpf_tail_call]; \
273 : __imm(bpf_tail_call),
274 __imm_addr(map_prog1_socket),
275 __imm_addr(map_prog2_socket),
276 __imm_const(__sk_buff_cb_0, offsetof(struct __sk_buff, cb[0]))
281 __description("runtime/jit: tail_call within bounds, different maps, second branch")
282 __success __failure_unpriv __msg_unpriv("tail_call abusing map_ptr")
284 __naked void bounds_different_maps_second_branch(void)
288 *(u8*)(r1 + %[__sk_buff_cb_0]) = r0; \
289 r0 = *(u8*)(r1 + %[__sk_buff_cb_0]); \
290 if r0 == 13 goto l0_%=; \
292 r2 = %[map_prog1_socket] ll; \
295 r2 = %[map_prog2_socket] ll; \
296 l1_%=: call %[bpf_tail_call]; \
300 : __imm(bpf_tail_call),
301 __imm_addr(map_prog1_socket),
302 __imm_addr(map_prog2_socket),
303 __imm_const(__sk_buff_cb_0, offsetof(struct __sk_buff, cb[0]))
308 __description("runtime/jit: tail_call out of bounds")
309 __success __success_unpriv __retval(2)
310 __naked void tail_call_out_of_bounds(void)
314 r2 = %[map_prog1_socket] ll; \
315 call %[bpf_tail_call]; \
319 : __imm(bpf_tail_call),
320 __imm_addr(map_prog1_socket)
325 __description("runtime/jit: pass negative index to tail_call")
326 __success __success_unpriv __retval(2)
327 __naked void negative_index_to_tail_call(void)
331 r2 = %[map_prog1_socket] ll; \
332 call %[bpf_tail_call]; \
336 : __imm(bpf_tail_call),
337 __imm_addr(map_prog1_socket)
342 __description("runtime/jit: pass > 32bit index to tail_call")
343 __success __success_unpriv __retval(42)
344 /* Verifier rewrite for unpriv skips tail call here. */
346 __naked void _32bit_index_to_tail_call(void)
349 r3 = 0x100000000 ll; \
350 r2 = %[map_prog1_socket] ll; \
351 call %[bpf_tail_call]; \
355 : __imm(bpf_tail_call),
356 __imm_addr(map_prog1_socket)
360 char _license[] SEC("license") = "GPL";