summaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/progs/verifier_mul.c
blob: 7145fe3351d5c309f69fa8ad1ea62c7c33ba4b50 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
// SPDX-License-Identifier: GPL-2.0
/* Copyright (c) 2025 Nandakumar Edamana */
#include <linux/bpf.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#include "bpf_misc.h"

/* Intended to test the abstract multiplication technique(s) used by
 * the verifier. Using assembly to avoid compiler optimizations.
 */
SEC("fentry/bpf_fentry_test1")
void BPF_PROG(mul_precise, int x)
{
	/* First, force the verifier to be uncertain about the value:
	 *     unsigned int a = (bpf_get_prandom_u32() & 0x2) | 0x1;
	 *
	 * Assuming the verifier is using tnum, a must be tnum{.v=0x1, .m=0x2}.
	 * Then a * 0x3 would be m0m1 (m for uncertain). Added imprecision
	 * would cause the following to fail, because the required return value
	 * is 0:
	 *     return (a * 0x3) & 0x4);
	 */
	asm volatile ("\
	call %[bpf_get_prandom_u32];\
	r0 &= 0x2;\
	r0 |= 0x1;\
	r0 *= 0x3;\
	r0 &= 0x4;\
	if r0 != 0 goto l0_%=;\
	r0 = 0;\
	goto l1_%=;\
l0_%=:\
	r0 = 1;\
l1_%=:\
"	:
	: __imm(bpf_get_prandom_u32)
	: __clobber_all);
}