xref: /linux/tools/testing/selftests/bpf/progs/verifier_subreg.c (revision fd7d598270724cc787982ea48bbe17ad383a8b7f)
1 // SPDX-License-Identifier: GPL-2.0
2 /* Converted from tools/testing/selftests/bpf/verifier/subreg.c */
3 
4 #include <linux/bpf.h>
5 #include <bpf/bpf_helpers.h>
6 #include "bpf_misc.h"
7 
8 /* This file contains sub-register zero extension checks for insns defining
9  * sub-registers, meaning:
10  *   - All insns under BPF_ALU class. Their BPF_ALU32 variants or narrow width
11  *     forms (BPF_END) could define sub-registers.
12  *   - Narrow direct loads, BPF_B/H/W | BPF_LDX.
13  *   - BPF_LD is not exposed to JIT back-ends, so no need for testing.
14  *
15  * "get_prandom_u32" is used to initialize low 32-bit of some registers to
16  * prevent potential optimizations done by verifier or JIT back-ends which could
17  * optimize register back into constant when range info shows one register is a
18  * constant.
19  */
20 
21 SEC("socket")
22 __description("add32 reg zero extend check")
23 __success __success_unpriv __retval(0)
24 __naked void add32_reg_zero_extend_check(void)
25 {
26 	asm volatile ("					\
27 	call %[bpf_get_prandom_u32];			\
28 	r1 = r0;					\
29 	r0 = 0x100000000 ll;				\
30 	w0 += w1;					\
31 	r0 >>= 32;					\
32 	exit;						\
33 "	:
34 	: __imm(bpf_get_prandom_u32)
35 	: __clobber_all);
36 }
37 
38 SEC("socket")
39 __description("add32 imm zero extend check")
40 __success __success_unpriv __retval(0)
41 __naked void add32_imm_zero_extend_check(void)
42 {
43 	asm volatile ("					\
44 	call %[bpf_get_prandom_u32];			\
45 	r1 = 0x1000000000 ll;				\
46 	r0 |= r1;					\
47 	/* An insn could have no effect on the low 32-bit, for example:\
48 	 *   a = a + 0					\
49 	 *   a = a | 0					\
50 	 *   a = a & -1					\
51 	 * But, they should still zero high 32-bit.	\
52 	 */						\
53 	w0 += 0;					\
54 	r0 >>= 32;					\
55 	r6 = r0;					\
56 	call %[bpf_get_prandom_u32];			\
57 	r1 = 0x1000000000 ll;				\
58 	r0 |= r1;					\
59 	w0 += -2;					\
60 	r0 >>= 32;					\
61 	r0 |= r6;					\
62 	exit;						\
63 "	:
64 	: __imm(bpf_get_prandom_u32)
65 	: __clobber_all);
66 }
67 
68 SEC("socket")
69 __description("sub32 reg zero extend check")
70 __success __success_unpriv __retval(0)
71 __naked void sub32_reg_zero_extend_check(void)
72 {
73 	asm volatile ("					\
74 	call %[bpf_get_prandom_u32];			\
75 	r1 = r0;					\
76 	r0 = 0x1ffffffff ll;				\
77 	w0 -= w1;					\
78 	r0 >>= 32;					\
79 	exit;						\
80 "	:
81 	: __imm(bpf_get_prandom_u32)
82 	: __clobber_all);
83 }
84 
85 SEC("socket")
86 __description("sub32 imm zero extend check")
87 __success __success_unpriv __retval(0)
88 __naked void sub32_imm_zero_extend_check(void)
89 {
90 	asm volatile ("					\
91 	call %[bpf_get_prandom_u32];			\
92 	r1 = 0x1000000000 ll;				\
93 	r0 |= r1;					\
94 	w0 -= 0;					\
95 	r0 >>= 32;					\
96 	r6 = r0;					\
97 	call %[bpf_get_prandom_u32];			\
98 	r1 = 0x1000000000 ll;				\
99 	r0 |= r1;					\
100 	w0 -= 1;					\
101 	r0 >>= 32;					\
102 	r0 |= r6;					\
103 	exit;						\
104 "	:
105 	: __imm(bpf_get_prandom_u32)
106 	: __clobber_all);
107 }
108 
109 SEC("socket")
110 __description("mul32 reg zero extend check")
111 __success __success_unpriv __retval(0)
112 __naked void mul32_reg_zero_extend_check(void)
113 {
114 	asm volatile ("					\
115 	call %[bpf_get_prandom_u32];			\
116 	r1 = r0;					\
117 	r0 = 0x100000001 ll;				\
118 	w0 *= w1;					\
119 	r0 >>= 32;					\
120 	exit;						\
121 "	:
122 	: __imm(bpf_get_prandom_u32)
123 	: __clobber_all);
124 }
125 
126 SEC("socket")
127 __description("mul32 imm zero extend check")
128 __success __success_unpriv __retval(0)
129 __naked void mul32_imm_zero_extend_check(void)
130 {
131 	asm volatile ("					\
132 	call %[bpf_get_prandom_u32];			\
133 	r1 = 0x1000000000 ll;				\
134 	r0 |= r1;					\
135 	w0 *= 1;					\
136 	r0 >>= 32;					\
137 	r6 = r0;					\
138 	call %[bpf_get_prandom_u32];			\
139 	r1 = 0x1000000000 ll;				\
140 	r0 |= r1;					\
141 	w0 *= -1;					\
142 	r0 >>= 32;					\
143 	r0 |= r6;					\
144 	exit;						\
145 "	:
146 	: __imm(bpf_get_prandom_u32)
147 	: __clobber_all);
148 }
149 
150 SEC("socket")
151 __description("div32 reg zero extend check")
152 __success __success_unpriv __retval(0)
153 __naked void div32_reg_zero_extend_check(void)
154 {
155 	asm volatile ("					\
156 	call %[bpf_get_prandom_u32];			\
157 	r1 = r0;					\
158 	r0 = -1;					\
159 	w0 /= w1;					\
160 	r0 >>= 32;					\
161 	exit;						\
162 "	:
163 	: __imm(bpf_get_prandom_u32)
164 	: __clobber_all);
165 }
166 
167 SEC("socket")
168 __description("div32 imm zero extend check")
169 __success __success_unpriv __retval(0)
170 __naked void div32_imm_zero_extend_check(void)
171 {
172 	asm volatile ("					\
173 	call %[bpf_get_prandom_u32];			\
174 	r1 = 0x1000000000 ll;				\
175 	r0 |= r1;					\
176 	w0 /= 1;					\
177 	r0 >>= 32;					\
178 	r6 = r0;					\
179 	call %[bpf_get_prandom_u32];			\
180 	r1 = 0x1000000000 ll;				\
181 	r0 |= r1;					\
182 	w0 /= 2;					\
183 	r0 >>= 32;					\
184 	r0 |= r6;					\
185 	exit;						\
186 "	:
187 	: __imm(bpf_get_prandom_u32)
188 	: __clobber_all);
189 }
190 
191 SEC("socket")
192 __description("or32 reg zero extend check")
193 __success __success_unpriv __retval(0)
194 __naked void or32_reg_zero_extend_check(void)
195 {
196 	asm volatile ("					\
197 	call %[bpf_get_prandom_u32];			\
198 	r1 = r0;					\
199 	r0 = 0x100000001 ll;				\
200 	w0 |= w1;					\
201 	r0 >>= 32;					\
202 	exit;						\
203 "	:
204 	: __imm(bpf_get_prandom_u32)
205 	: __clobber_all);
206 }
207 
208 SEC("socket")
209 __description("or32 imm zero extend check")
210 __success __success_unpriv __retval(0)
211 __naked void or32_imm_zero_extend_check(void)
212 {
213 	asm volatile ("					\
214 	call %[bpf_get_prandom_u32];			\
215 	r1 = 0x1000000000 ll;				\
216 	r0 |= r1;					\
217 	w0 |= 0;					\
218 	r0 >>= 32;					\
219 	r6 = r0;					\
220 	call %[bpf_get_prandom_u32];			\
221 	r1 = 0x1000000000 ll;				\
222 	r0 |= r1;					\
223 	w0 |= 1;					\
224 	r0 >>= 32;					\
225 	r0 |= r6;					\
226 	exit;						\
227 "	:
228 	: __imm(bpf_get_prandom_u32)
229 	: __clobber_all);
230 }
231 
232 SEC("socket")
233 __description("and32 reg zero extend check")
234 __success __success_unpriv __retval(0)
235 __naked void and32_reg_zero_extend_check(void)
236 {
237 	asm volatile ("					\
238 	call %[bpf_get_prandom_u32];			\
239 	r1 = 0x100000000 ll;				\
240 	r1 |= r0;					\
241 	r0 = 0x1ffffffff ll;				\
242 	w0 &= w1;					\
243 	r0 >>= 32;					\
244 	exit;						\
245 "	:
246 	: __imm(bpf_get_prandom_u32)
247 	: __clobber_all);
248 }
249 
250 SEC("socket")
251 __description("and32 imm zero extend check")
252 __success __success_unpriv __retval(0)
253 __naked void and32_imm_zero_extend_check(void)
254 {
255 	asm volatile ("					\
256 	call %[bpf_get_prandom_u32];			\
257 	r1 = 0x1000000000 ll;				\
258 	r0 |= r1;					\
259 	w0 &= -1;					\
260 	r0 >>= 32;					\
261 	r6 = r0;					\
262 	call %[bpf_get_prandom_u32];			\
263 	r1 = 0x1000000000 ll;				\
264 	r0 |= r1;					\
265 	w0 &= -2;					\
266 	r0 >>= 32;					\
267 	r0 |= r6;					\
268 	exit;						\
269 "	:
270 	: __imm(bpf_get_prandom_u32)
271 	: __clobber_all);
272 }
273 
274 SEC("socket")
275 __description("lsh32 reg zero extend check")
276 __success __success_unpriv __retval(0)
277 __naked void lsh32_reg_zero_extend_check(void)
278 {
279 	asm volatile ("					\
280 	call %[bpf_get_prandom_u32];			\
281 	r1 = 0x100000000 ll;				\
282 	r0 |= r1;					\
283 	r1 = 1;						\
284 	w0 <<= w1;					\
285 	r0 >>= 32;					\
286 	exit;						\
287 "	:
288 	: __imm(bpf_get_prandom_u32)
289 	: __clobber_all);
290 }
291 
292 SEC("socket")
293 __description("lsh32 imm zero extend check")
294 __success __success_unpriv __retval(0)
295 __naked void lsh32_imm_zero_extend_check(void)
296 {
297 	asm volatile ("					\
298 	call %[bpf_get_prandom_u32];			\
299 	r1 = 0x1000000000 ll;				\
300 	r0 |= r1;					\
301 	w0 <<= 0;					\
302 	r0 >>= 32;					\
303 	r6 = r0;					\
304 	call %[bpf_get_prandom_u32];			\
305 	r1 = 0x1000000000 ll;				\
306 	r0 |= r1;					\
307 	w0 <<= 1;					\
308 	r0 >>= 32;					\
309 	r0 |= r6;					\
310 	exit;						\
311 "	:
312 	: __imm(bpf_get_prandom_u32)
313 	: __clobber_all);
314 }
315 
316 SEC("socket")
317 __description("rsh32 reg zero extend check")
318 __success __success_unpriv __retval(0)
319 __naked void rsh32_reg_zero_extend_check(void)
320 {
321 	asm volatile ("					\
322 	call %[bpf_get_prandom_u32];			\
323 	r1 = 0x1000000000 ll;				\
324 	r0 |= r1;					\
325 	r1 = 1;						\
326 	w0 >>= w1;					\
327 	r0 >>= 32;					\
328 	exit;						\
329 "	:
330 	: __imm(bpf_get_prandom_u32)
331 	: __clobber_all);
332 }
333 
334 SEC("socket")
335 __description("rsh32 imm zero extend check")
336 __success __success_unpriv __retval(0)
337 __naked void rsh32_imm_zero_extend_check(void)
338 {
339 	asm volatile ("					\
340 	call %[bpf_get_prandom_u32];			\
341 	r1 = 0x1000000000 ll;				\
342 	r0 |= r1;					\
343 	w0 >>= 0;					\
344 	r0 >>= 32;					\
345 	r6 = r0;					\
346 	call %[bpf_get_prandom_u32];			\
347 	r1 = 0x1000000000 ll;				\
348 	r0 |= r1;					\
349 	w0 >>= 1;					\
350 	r0 >>= 32;					\
351 	r0 |= r6;					\
352 	exit;						\
353 "	:
354 	: __imm(bpf_get_prandom_u32)
355 	: __clobber_all);
356 }
357 
358 SEC("socket")
359 __description("neg32 reg zero extend check")
360 __success __success_unpriv __retval(0)
361 __naked void neg32_reg_zero_extend_check(void)
362 {
363 	asm volatile ("					\
364 	call %[bpf_get_prandom_u32];			\
365 	r1 = 0x1000000000 ll;				\
366 	r0 |= r1;					\
367 	w0 = -w0;					\
368 	r0 >>= 32;					\
369 	exit;						\
370 "	:
371 	: __imm(bpf_get_prandom_u32)
372 	: __clobber_all);
373 }
374 
375 SEC("socket")
376 __description("mod32 reg zero extend check")
377 __success __success_unpriv __retval(0)
378 __naked void mod32_reg_zero_extend_check(void)
379 {
380 	asm volatile ("					\
381 	call %[bpf_get_prandom_u32];			\
382 	r1 = r0;					\
383 	r0 = -1;					\
384 	w0 %%= w1;					\
385 	r0 >>= 32;					\
386 	exit;						\
387 "	:
388 	: __imm(bpf_get_prandom_u32)
389 	: __clobber_all);
390 }
391 
392 SEC("socket")
393 __description("mod32 imm zero extend check")
394 __success __success_unpriv __retval(0)
395 __naked void mod32_imm_zero_extend_check(void)
396 {
397 	asm volatile ("					\
398 	call %[bpf_get_prandom_u32];			\
399 	r1 = 0x1000000000 ll;				\
400 	r0 |= r1;					\
401 	w0 %%= 1;					\
402 	r0 >>= 32;					\
403 	r6 = r0;					\
404 	call %[bpf_get_prandom_u32];			\
405 	r1 = 0x1000000000 ll;				\
406 	r0 |= r1;					\
407 	w0 %%= 2;					\
408 	r0 >>= 32;					\
409 	r0 |= r6;					\
410 	exit;						\
411 "	:
412 	: __imm(bpf_get_prandom_u32)
413 	: __clobber_all);
414 }
415 
416 SEC("socket")
417 __description("xor32 reg zero extend check")
418 __success __success_unpriv __retval(0)
419 __naked void xor32_reg_zero_extend_check(void)
420 {
421 	asm volatile ("					\
422 	call %[bpf_get_prandom_u32];			\
423 	r1 = r0;					\
424 	r0 = 0x100000000 ll;				\
425 	w0 ^= w1;					\
426 	r0 >>= 32;					\
427 	exit;						\
428 "	:
429 	: __imm(bpf_get_prandom_u32)
430 	: __clobber_all);
431 }
432 
433 SEC("socket")
434 __description("xor32 imm zero extend check")
435 __success __success_unpriv __retval(0)
436 __naked void xor32_imm_zero_extend_check(void)
437 {
438 	asm volatile ("					\
439 	call %[bpf_get_prandom_u32];			\
440 	r1 = 0x1000000000 ll;				\
441 	r0 |= r1;					\
442 	w0 ^= 1;					\
443 	r0 >>= 32;					\
444 	exit;						\
445 "	:
446 	: __imm(bpf_get_prandom_u32)
447 	: __clobber_all);
448 }
449 
450 SEC("socket")
451 __description("mov32 reg zero extend check")
452 __success __success_unpriv __retval(0)
453 __naked void mov32_reg_zero_extend_check(void)
454 {
455 	asm volatile ("					\
456 	call %[bpf_get_prandom_u32];			\
457 	r1 = 0x100000000 ll;				\
458 	r1 |= r0;					\
459 	r0 = 0x100000000 ll;				\
460 	w0 = w1;					\
461 	r0 >>= 32;					\
462 	exit;						\
463 "	:
464 	: __imm(bpf_get_prandom_u32)
465 	: __clobber_all);
466 }
467 
468 SEC("socket")
469 __description("mov32 imm zero extend check")
470 __success __success_unpriv __retval(0)
471 __naked void mov32_imm_zero_extend_check(void)
472 {
473 	asm volatile ("					\
474 	call %[bpf_get_prandom_u32];			\
475 	r1 = 0x1000000000 ll;				\
476 	r0 |= r1;					\
477 	w0 = 0;						\
478 	r0 >>= 32;					\
479 	r6 = r0;					\
480 	call %[bpf_get_prandom_u32];			\
481 	r1 = 0x1000000000 ll;				\
482 	r0 |= r1;					\
483 	w0 = 1;						\
484 	r0 >>= 32;					\
485 	r0 |= r6;					\
486 	exit;						\
487 "	:
488 	: __imm(bpf_get_prandom_u32)
489 	: __clobber_all);
490 }
491 
492 SEC("socket")
493 __description("arsh32 reg zero extend check")
494 __success __success_unpriv __retval(0)
495 __naked void arsh32_reg_zero_extend_check(void)
496 {
497 	asm volatile ("					\
498 	call %[bpf_get_prandom_u32];			\
499 	r1 = 0x1000000000 ll;				\
500 	r0 |= r1;					\
501 	r1 = 1;						\
502 	w0 s>>= w1;					\
503 	r0 >>= 32;					\
504 	exit;						\
505 "	:
506 	: __imm(bpf_get_prandom_u32)
507 	: __clobber_all);
508 }
509 
510 SEC("socket")
511 __description("arsh32 imm zero extend check")
512 __success __success_unpriv __retval(0)
513 __naked void arsh32_imm_zero_extend_check(void)
514 {
515 	asm volatile ("					\
516 	call %[bpf_get_prandom_u32];			\
517 	r1 = 0x1000000000 ll;				\
518 	r0 |= r1;					\
519 	w0 s>>= 0;					\
520 	r0 >>= 32;					\
521 	r6 = r0;					\
522 	call %[bpf_get_prandom_u32];			\
523 	r1 = 0x1000000000 ll;				\
524 	r0 |= r1;					\
525 	w0 s>>= 1;					\
526 	r0 >>= 32;					\
527 	r0 |= r6;					\
528 	exit;						\
529 "	:
530 	: __imm(bpf_get_prandom_u32)
531 	: __clobber_all);
532 }
533 
534 SEC("socket")
535 __description("end16 (to_le) reg zero extend check")
536 __success __success_unpriv __retval(0)
537 __naked void le_reg_zero_extend_check_1(void)
538 {
539 	asm volatile ("					\
540 	call %[bpf_get_prandom_u32];			\
541 	r6 = r0;					\
542 	r6 <<= 32;					\
543 	call %[bpf_get_prandom_u32];			\
544 	r0 |= r6;					\
545 	r0 = le16 r0;					\
546 	r0 >>= 32;					\
547 	exit;						\
548 "	:
549 	: __imm(bpf_get_prandom_u32)
550 	: __clobber_all);
551 }
552 
553 SEC("socket")
554 __description("end32 (to_le) reg zero extend check")
555 __success __success_unpriv __retval(0)
556 __naked void le_reg_zero_extend_check_2(void)
557 {
558 	asm volatile ("					\
559 	call %[bpf_get_prandom_u32];			\
560 	r6 = r0;					\
561 	r6 <<= 32;					\
562 	call %[bpf_get_prandom_u32];			\
563 	r0 |= r6;					\
564 	r0 = le32 r0;					\
565 	r0 >>= 32;					\
566 	exit;						\
567 "	:
568 	: __imm(bpf_get_prandom_u32)
569 	: __clobber_all);
570 }
571 
572 SEC("socket")
573 __description("end16 (to_be) reg zero extend check")
574 __success __success_unpriv __retval(0)
575 __naked void be_reg_zero_extend_check_1(void)
576 {
577 	asm volatile ("					\
578 	call %[bpf_get_prandom_u32];			\
579 	r6 = r0;					\
580 	r6 <<= 32;					\
581 	call %[bpf_get_prandom_u32];			\
582 	r0 |= r6;					\
583 	r0 = be16 r0;					\
584 	r0 >>= 32;					\
585 	exit;						\
586 "	:
587 	: __imm(bpf_get_prandom_u32)
588 	: __clobber_all);
589 }
590 
591 SEC("socket")
592 __description("end32 (to_be) reg zero extend check")
593 __success __success_unpriv __retval(0)
594 __naked void be_reg_zero_extend_check_2(void)
595 {
596 	asm volatile ("					\
597 	call %[bpf_get_prandom_u32];			\
598 	r6 = r0;					\
599 	r6 <<= 32;					\
600 	call %[bpf_get_prandom_u32];			\
601 	r0 |= r6;					\
602 	r0 = be32 r0;					\
603 	r0 >>= 32;					\
604 	exit;						\
605 "	:
606 	: __imm(bpf_get_prandom_u32)
607 	: __clobber_all);
608 }
609 
610 SEC("socket")
611 __description("ldx_b zero extend check")
612 __success __success_unpriv __retval(0)
613 __naked void ldx_b_zero_extend_check(void)
614 {
615 	asm volatile ("					\
616 	r6 = r10;					\
617 	r6 += -4;					\
618 	r7 = 0xfaceb00c;				\
619 	*(u32*)(r6 + 0) = r7;				\
620 	call %[bpf_get_prandom_u32];			\
621 	r1 = 0x1000000000 ll;				\
622 	r0 |= r1;					\
623 	r0 = *(u8*)(r6 + 0);				\
624 	r0 >>= 32;					\
625 	exit;						\
626 "	:
627 	: __imm(bpf_get_prandom_u32)
628 	: __clobber_all);
629 }
630 
631 SEC("socket")
632 __description("ldx_h zero extend check")
633 __success __success_unpriv __retval(0)
634 __naked void ldx_h_zero_extend_check(void)
635 {
636 	asm volatile ("					\
637 	r6 = r10;					\
638 	r6 += -4;					\
639 	r7 = 0xfaceb00c;				\
640 	*(u32*)(r6 + 0) = r7;				\
641 	call %[bpf_get_prandom_u32];			\
642 	r1 = 0x1000000000 ll;				\
643 	r0 |= r1;					\
644 	r0 = *(u16*)(r6 + 0);				\
645 	r0 >>= 32;					\
646 	exit;						\
647 "	:
648 	: __imm(bpf_get_prandom_u32)
649 	: __clobber_all);
650 }
651 
652 SEC("socket")
653 __description("ldx_w zero extend check")
654 __success __success_unpriv __retval(0)
655 __naked void ldx_w_zero_extend_check(void)
656 {
657 	asm volatile ("					\
658 	r6 = r10;					\
659 	r6 += -4;					\
660 	r7 = 0xfaceb00c;				\
661 	*(u32*)(r6 + 0) = r7;				\
662 	call %[bpf_get_prandom_u32];			\
663 	r1 = 0x1000000000 ll;				\
664 	r0 |= r1;					\
665 	r0 = *(u32*)(r6 + 0);				\
666 	r0 >>= 32;					\
667 	exit;						\
668 "	:
669 	: __imm(bpf_get_prandom_u32)
670 	: __clobber_all);
671 }
672 
673 char _license[] SEC("license") = "GPL";
674