Lines Matching +full:pre +full:- +full:verified

25 	"calls: invalid kfunc call: ptr_to_mem to struct with non-scalar",
28 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
43 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
58 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
70 "calls: invalid kfunc call: reg->type != PTR_TO_CTX",
73 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
88 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
100 "calls: trigger reg2btf_ids[reg->type] for reg->type > __BPF_REG_TYPE_MAX",
103 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
119 "calls: invalid kfunc call: reg->off must be zero when passed to release kfunc",
122 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
165 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
172 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -4),
184 .errstr = "negative offset ptr_ ptr R1 off=-4 disallowed",
190 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
225 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
252 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
367 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
369 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
399 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -2),
400 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -2),
401 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -2),
423 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, -1, 2),
436 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -1),
441 .errstr = "back-edge from insn 0 to 0",
487 BPF_JMP_IMM(BPF_JA, 0, 0, -6),
489 BPF_JMP_IMM(BPF_JA, 0, 0, -6),
492 .errstr_unpriv = "back-edge from insn",
507 BPF_JMP_IMM(BPF_JA, 0, 0, -5),
524 BPF_JMP_IMM(BPF_JA, 0, 0, -6),
538 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, -3),
625 .retval = TEST_DATA_LEN + TEST_DATA_LEN - ETH_HLEN - ETH_HLEN,
657 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
659 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
704 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -64),
707 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -64),
710 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -64),
723 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -63),
726 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -61),
729 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -63),
746 BPF_JMP_IMM(BPF_JA, 0, 0, -3),
760 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -3),
782 BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, -3),
794 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -1),
798 .errstr = "back-edge",
806 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -3),
810 .errstr = "back-edge",
834 BPF_RAW_INSN(BPF_JMP | BPF_CALL, 0, 1, 0, -4),
859 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, -3),
887 BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, -2),
969 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
971 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
992 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
994 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
996 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
998 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -16),
1023 "calls: stack overflow using two frames (pre-call access)",
1026 BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
1031 BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
1040 "calls: stack overflow using two frames (post-call access)",
1044 BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
1048 BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
1062 BPF_ST_MEM(BPF_B, BPF_REG_10, -32, 0),
1066 BPF_ST_MEM(BPF_B, BPF_REG_10, -256, 0),
1069 BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, -3), /* call A */
1070 BPF_ST_MEM(BPF_B, BPF_REG_10, -64, 0),
1085 BPF_ST_MEM(BPF_B, BPF_REG_10, -32, 0),
1089 BPF_ST_MEM(BPF_B, BPF_REG_10, -64, 0),
1092 BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, -3), /* call A */
1093 BPF_ST_MEM(BPF_B, BPF_REG_10, -256, 0),
1111 BPF_ST_MEM(BPF_B, BPF_REG_10, -64, 0),
1117 BPF_ST_MEM(BPF_B, BPF_REG_10, -224, 0),
1118 BPF_JMP_IMM(BPF_JA, 0, 0, -3),
1121 BPF_RAW_INSN(BPF_JMP|BPF_CALL, 0, 1, 0, -6), /* call A */
1122 BPF_ST_MEM(BPF_B, BPF_REG_10, -256, 0),
1141 * frame_pointer[-300] = 1;
1148 * frame_pointer[-300] = 1;
1164 BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
1170 BPF_ST_MEM(BPF_B, BPF_REG_10, -300, 0),
1253 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1255 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1270 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1290 BPF_ALU64_IMM(BPF_ADD, BPF_REG_0, -8),
1301 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1303 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1305 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1307 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -16),
1349 /* pass fp-16, fp-8 into a function */
1351 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1353 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1357 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
1362 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -16),
1373 /* first time with fp-8 */
1376 /* second time with fp-16 */
1383 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1385 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1401 /* pass fp-16, fp-8 into a function */
1403 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1405 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1414 /* first time with fp-8 */
1422 /* second time with fp-16 */
1434 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1436 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1455 /* pass fp-16, fp-8 into a function */
1457 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1459 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1468 /* first time with fp-8 */
1476 /* second time with fp-16 */
1488 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1490 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1504 .errstr = "invalid read from stack R7 off=-16 size=8",
1510 /* pass fp-16, fp-8 into a function */
1512 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1514 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1523 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1525 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1531 /* write map_value_ptr into stack frame of main prog at fp-8 */
1537 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1544 /* write map_value_ptr into stack frame of main prog at fp-16 */
1548 /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
1582 /* pass fp-16, fp-8 into a function */
1584 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1586 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1595 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1597 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1603 /* write map_value_ptr into stack frame of main prog at fp-8 */
1609 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1616 /* write map_value_ptr into stack frame of main prog at fp-16 */
1620 /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
1652 /* pass fp-16, fp-8 into a function */
1654 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1656 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1665 BPF_ST_MEM(BPF_DW, BPF_REG_10, -24, 0),
1667 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -24),
1673 /* write map_value_ptr into stack frame of main prog at fp-8 */
1679 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -24),
1685 /* write map_value_ptr into stack frame of main prog at fp-16 */
1689 /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
1695 BPF_JMP_IMM(BPF_JA, 0, 0, -30),
1711 BPF_JMP_IMM(BPF_JA, 0, 0, -8),
1723 /* pass fp-16, fp-8 into a function */
1725 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1727 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1736 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1738 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1741 /* write map_value_ptr_or_null into stack frame of main prog at fp-8 */
1750 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1753 /* write map_value_ptr_or_null into stack frame of main prog at fp-16 */
1760 /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
1792 /* pass fp-16, fp-8 into a function */
1794 BPF_ALU64_IMM(BPF_ADD, BPF_REG_1, -8),
1796 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -16),
1805 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
1807 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1810 /* write map_value_ptr_or_null into stack frame of main prog at fp-8 */
1819 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
1822 /* write map_value_ptr_or_null into stack frame of main prog at fp-16 */
1829 /* call 3rd func with fp-8, 0|1, fp-16, 0|1 */
1862 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
1876 /* now the pkt range is verified, read pkt_ptr from stack */
1891 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
1894 BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
1908 /* now the pkt range is verified, read pkt_ptr from stack */
1923 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
1927 BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
1943 /* now the pkt range is verified, read pkt_ptr from stack */
1959 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
1963 BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
1994 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
1997 BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
2030 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
2033 BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
2065 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
2068 BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
2107 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
2110 BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
2148 BPF_ALU64_IMM(BPF_ADD, BPF_REG_4, -8),
2151 BPF_LDX_MEM(BPF_DW, BPF_REG_4, BPF_REG_10, -8),
2182 BPF_STX_MEM(BPF_DW, BPF_REG_10, BPF_REG_0, -8),
2184 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
2187 BPF_LDX_MEM(BPF_DW, BPF_REG_0, BPF_REG_10, -8),
2196 /* else bpf_map_lookup() and *(fp - 8) = r0 */
2199 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
2201 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
2203 /* write map_value_ptr_or_null into stack frame of main prog at fp-8 */
2215 BPF_ST_MEM(BPF_DW, BPF_REG_10, -16, 0),
2217 * of JGT insn will be verified second and it skisp zero
2218 * init of fp-8 stack slot. If stack liveness marking
2221 * that fp-8 stack slot was unused in the fall-through
2225 BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
2228 BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
2234 .errstr = "invalid indirect read from stack R2 off -8+0 size 8",
2284 "calls: cross frame pruning - liveness propagation",