blob: 7145fe3351d5c309f69fa8ad1ea62c7c33ba4b50 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
|
// SPDX-License-Identifier: GPL-2.0
/* Copyright (c) 2025 Nandakumar Edamana */
#include <linux/bpf.h>
#include <bpf/bpf_helpers.h>
#include <bpf/bpf_tracing.h>
#include "bpf_misc.h"
/* Intended to test the abstract multiplication technique(s) used by
* the verifier. Using assembly to avoid compiler optimizations.
*/
SEC("fentry/bpf_fentry_test1")
void BPF_PROG(mul_precise, int x)
{
/* First, force the verifier to be uncertain about the value:
* unsigned int a = (bpf_get_prandom_u32() & 0x2) | 0x1;
*
* Assuming the verifier is using tnum, a must be tnum{.v=0x1, .m=0x2}.
* Then a * 0x3 would be m0m1 (m for uncertain). Added imprecision
* would cause the following to fail, because the required return value
* is 0:
* return (a * 0x3) & 0x4);
*/
asm volatile ("\
call %[bpf_get_prandom_u32];\
r0 &= 0x2;\
r0 |= 0x1;\
r0 *= 0x3;\
r0 &= 0x4;\
if r0 != 0 goto l0_%=;\
r0 = 0;\
goto l1_%=;\
l0_%=:\
r0 = 1;\
l1_%=:\
" :
: __imm(bpf_get_prandom_u32)
: __clobber_all);
}
|