Linux Audio

Check our new training course

Loading...
Note: File does not exist in v3.15.
  1// SPDX-License-Identifier: GPL-2.0
  2
  3#include <linux/bpf.h>
  4#include <bpf/bpf_helpers.h>
  5#include "bpf_misc.h"
  6
  7#if (defined(__TARGET_ARCH_arm64) || defined(__TARGET_ARCH_x86) || \
  8	(defined(__TARGET_ARCH_riscv) && __riscv_xlen == 64) || \
  9	defined(__TARGET_ARCH_arm) || defined(__TARGET_ARCH_s390) || \
 10	defined(__TARGET_ARCH_loongarch)) && \
 11	__clang_major__ >= 18
 12
 13SEC("socket")
 14__description("LDSX, S8")
 15__success __success_unpriv __retval(-2)
 16__naked void ldsx_s8(void)
 17{
 18	asm volatile (
 19	"r1 = 0x3fe;"
 20	"*(u64 *)(r10 - 8) = r1;"
 21#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
 22	"r0 = *(s8 *)(r10 - 8);"
 23#else
 24	"r0 = *(s8 *)(r10 - 1);"
 25#endif
 26	"exit;"
 27	::: __clobber_all);
 28}
 29
 30SEC("socket")
 31__description("LDSX, S16")
 32__success __success_unpriv __retval(-2)
 33__naked void ldsx_s16(void)
 34{
 35	asm volatile (
 36	"r1 = 0x3fffe;"
 37	"*(u64 *)(r10 - 8) = r1;"
 38#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
 39	"r0 = *(s16 *)(r10 - 8);"
 40#else
 41	"r0 = *(s16 *)(r10 - 2);"
 42#endif
 43	"exit;"
 44	::: __clobber_all);
 45}
 46
 47SEC("socket")
 48__description("LDSX, S32")
 49__success __success_unpriv __retval(-1)
 50__naked void ldsx_s32(void)
 51{
 52	asm volatile (
 53	"r1 = 0xfffffffe;"
 54	"*(u64 *)(r10 - 8) = r1;"
 55#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
 56	"r0 = *(s32 *)(r10 - 8);"
 57#else
 58	"r0 = *(s32 *)(r10 - 4);"
 59#endif
 60	"r0 >>= 1;"
 61	"exit;"
 62	::: __clobber_all);
 63}
 64
 65SEC("socket")
 66__description("LDSX, S8 range checking, privileged")
 67__log_level(2) __success __retval(1)
 68__msg("R1_w=scalar(smin=smin32=-128,smax=smax32=127)")
 69__naked void ldsx_s8_range_priv(void)
 70{
 71	asm volatile (
 72	"call %[bpf_get_prandom_u32];"
 73	"*(u64 *)(r10 - 8) = r0;"
 74#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
 75	"r1 = *(s8 *)(r10 - 8);"
 76#else
 77	"r1 = *(s8 *)(r10 - 1);"
 78#endif
 79	/* r1 with s8 range */
 80	"if r1 s> 0x7f goto l0_%=;"
 81	"if r1 s< -0x80 goto l0_%=;"
 82	"r0 = 1;"
 83"l1_%=:"
 84	"exit;"
 85"l0_%=:"
 86	"r0 = 2;"
 87	"goto l1_%=;"
 88	:
 89	: __imm(bpf_get_prandom_u32)
 90	: __clobber_all);
 91}
 92
 93SEC("socket")
 94__description("LDSX, S16 range checking")
 95__success __success_unpriv __retval(1)
 96__naked void ldsx_s16_range(void)
 97{
 98	asm volatile (
 99	"call %[bpf_get_prandom_u32];"
100	"*(u64 *)(r10 - 8) = r0;"
101#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
102	"r1 = *(s16 *)(r10 - 8);"
103#else
104	"r1 = *(s16 *)(r10 - 2);"
105#endif
106	/* r1 with s16 range */
107	"if r1 s> 0x7fff goto l0_%=;"
108	"if r1 s< -0x8000 goto l0_%=;"
109	"r0 = 1;"
110"l1_%=:"
111	"exit;"
112"l0_%=:"
113	"r0 = 2;"
114	"goto l1_%=;"
115	:
116	: __imm(bpf_get_prandom_u32)
117	: __clobber_all);
118}
119
120SEC("socket")
121__description("LDSX, S32 range checking")
122__success __success_unpriv __retval(1)
123__naked void ldsx_s32_range(void)
124{
125	asm volatile (
126	"call %[bpf_get_prandom_u32];"
127	"*(u64 *)(r10 - 8) = r0;"
128#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
129	"r1 = *(s32 *)(r10 - 8);"
130#else
131	"r1 = *(s32 *)(r10 - 4);"
132#endif
133	/* r1 with s16 range */
134	"if r1 s> 0x7fffFFFF goto l0_%=;"
135	"if r1 s< -0x80000000 goto l0_%=;"
136	"r0 = 1;"
137"l1_%=:"
138	"exit;"
139"l0_%=:"
140	"r0 = 2;"
141	"goto l1_%=;"
142	:
143	: __imm(bpf_get_prandom_u32)
144	: __clobber_all);
145}
146
147SEC("xdp")
148__description("LDSX, xdp s32 xdp_md->data")
149__failure __msg("invalid bpf_context access")
150__naked void ldsx_ctx_1(void)
151{
152	asm volatile (
153	"r2 = *(s32 *)(r1 + %[xdp_md_data]);"
154	"r0 = 0;"
155	"exit;"
156	:
157	: __imm_const(xdp_md_data, offsetof(struct xdp_md, data))
158	: __clobber_all);
159}
160
161SEC("xdp")
162__description("LDSX, xdp s32 xdp_md->data_end")
163__failure __msg("invalid bpf_context access")
164__naked void ldsx_ctx_2(void)
165{
166	asm volatile (
167	"r2 = *(s32 *)(r1 + %[xdp_md_data_end]);"
168	"r0 = 0;"
169	"exit;"
170	:
171	: __imm_const(xdp_md_data_end, offsetof(struct xdp_md, data_end))
172	: __clobber_all);
173}
174
175SEC("xdp")
176__description("LDSX, xdp s32 xdp_md->data_meta")
177__failure __msg("invalid bpf_context access")
178__naked void ldsx_ctx_3(void)
179{
180	asm volatile (
181	"r2 = *(s32 *)(r1 + %[xdp_md_data_meta]);"
182	"r0 = 0;"
183	"exit;"
184	:
185	: __imm_const(xdp_md_data_meta, offsetof(struct xdp_md, data_meta))
186	: __clobber_all);
187}
188
189SEC("tcx/ingress")
190__description("LDSX, tcx s32 __sk_buff->data")
191__failure __msg("invalid bpf_context access")
192__naked void ldsx_ctx_4(void)
193{
194	asm volatile (
195	"r2 = *(s32 *)(r1 + %[sk_buff_data]);"
196	"r0 = 0;"
197	"exit;"
198	:
199	: __imm_const(sk_buff_data, offsetof(struct __sk_buff, data))
200	: __clobber_all);
201}
202
203SEC("tcx/ingress")
204__description("LDSX, tcx s32 __sk_buff->data_end")
205__failure __msg("invalid bpf_context access")
206__naked void ldsx_ctx_5(void)
207{
208	asm volatile (
209	"r2 = *(s32 *)(r1 + %[sk_buff_data_end]);"
210	"r0 = 0;"
211	"exit;"
212	:
213	: __imm_const(sk_buff_data_end, offsetof(struct __sk_buff, data_end))
214	: __clobber_all);
215}
216
217SEC("tcx/ingress")
218__description("LDSX, tcx s32 __sk_buff->data_meta")
219__failure __msg("invalid bpf_context access")
220__naked void ldsx_ctx_6(void)
221{
222	asm volatile (
223	"r2 = *(s32 *)(r1 + %[sk_buff_data_meta]);"
224	"r0 = 0;"
225	"exit;"
226	:
227	: __imm_const(sk_buff_data_meta, offsetof(struct __sk_buff, data_meta))
228	: __clobber_all);
229}
230
231SEC("flow_dissector")
232__description("LDSX, flow_dissector s32 __sk_buff->data")
233__failure __msg("invalid bpf_context access")
234__naked void ldsx_ctx_7(void)
235{
236	asm volatile (
237	"r2 = *(s32 *)(r1 + %[sk_buff_data]);"
238	"r0 = 0;"
239	"exit;"
240	:
241	: __imm_const(sk_buff_data, offsetof(struct __sk_buff, data))
242	: __clobber_all);
243}
244
245SEC("flow_dissector")
246__description("LDSX, flow_dissector s32 __sk_buff->data_end")
247__failure __msg("invalid bpf_context access")
248__naked void ldsx_ctx_8(void)
249{
250	asm volatile (
251	"r2 = *(s32 *)(r1 + %[sk_buff_data_end]);"
252	"r0 = 0;"
253	"exit;"
254	:
255	: __imm_const(sk_buff_data_end, offsetof(struct __sk_buff, data_end))
256	: __clobber_all);
257}
258
259#else
260
261SEC("socket")
262__description("cpuv4 is not supported by compiler or jit, use a dummy test")
263__success
264int dummy_test(void)
265{
266	return 0;
267}
268
269#endif
270
271char _license[] SEC("license") = "GPL";