1 // SPDX-License-Identifier: GPL-2.0
2
3 #include <linux/bpf.h>
4 #include <bpf/bpf_helpers.h>
5 #include "bpf_misc.h"
6
7 #if (defined(__TARGET_ARCH_arm64) || defined(__TARGET_ARCH_x86) || \
8 (defined(__TARGET_ARCH_riscv) && __riscv_xlen == 64) || \
9 defined(__TARGET_ARCH_arm) || defined(__TARGET_ARCH_s390) || \
10 defined(__TARGET_ARCH_loongarch)) && \
11 __clang_major__ >= 18
12
13 SEC("socket")
14 __description("BSWAP, 16")
15 __success __success_unpriv __retval(0x23ff)
bswap_16(void)16 __naked void bswap_16(void)
17 {
18 asm volatile (" \
19 r0 = 0xff23; \
20 r0 = bswap16 r0; \
21 exit; \
22 " ::: __clobber_all);
23 }
24
25 SEC("socket")
26 __description("BSWAP, 32")
27 __success __success_unpriv __retval(0x23ff0000)
bswap_32(void)28 __naked void bswap_32(void)
29 {
30 asm volatile (" \
31 r0 = 0xff23; \
32 r0 = bswap32 r0; \
33 exit; \
34 " ::: __clobber_all);
35 }
36
37 SEC("socket")
38 __description("BSWAP, 64")
39 __success __success_unpriv __retval(0x34ff12ff)
bswap_64(void)40 __naked void bswap_64(void)
41 {
42 asm volatile (" \
43 r0 = %[u64_val] ll; \
44 r0 = bswap64 r0; \
45 exit; \
46 " :
47 : [u64_val]"i"(0xff12ff34ff56ff78ull)
48 : __clobber_all);
49 }
50
51 #define BSWAP_RANGE_TEST(name, op, in_value, out_value) \
52 SEC("socket") \
53 __success __log_level(2) \
54 __msg("r0 &= {{.*}}; R0=scalar({{.*}},var_off=(0x0; " #in_value "))") \
55 __msg("r0 = " op " r0 {{.*}}; R0=scalar({{.*}},var_off=(0x0; " #out_value "))") \
56 __naked void name(void) \
57 { \
58 asm volatile ( \
59 "call %[bpf_get_prandom_u32];" \
60 "r0 &= " #in_value ";" \
61 "r0 = " op " r0;" \
62 "r2 = " #out_value " ll;" \
63 "if r0 > r2 goto trap_%=;" \
64 "r0 = 0;" \
65 "exit;" \
66 "trap_%=:" \
67 "r1 = 42;" \
68 "r0 = *(u64 *)(r1 + 0);" \
69 "exit;" \
70 : \
71 : __imm(bpf_get_prandom_u32) \
72 : __clobber_all); \
73 }
74
75 BSWAP_RANGE_TEST(bswap16_range, "bswap16", 0x3f00, 0x3f)
76 BSWAP_RANGE_TEST(bswap32_range, "bswap32", 0x3f00, 0x3f0000)
77 BSWAP_RANGE_TEST(bswap64_range, "bswap64", 0x3f00, 0x3f000000000000)
78 #if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
79 BSWAP_RANGE_TEST(be16_range, "be16", 0x3f00, 0x3f)
80 BSWAP_RANGE_TEST(be32_range, "be32", 0x3f00, 0x3f0000)
81 BSWAP_RANGE_TEST(be64_range, "be64", 0x3f00, 0x3f000000000000)
82 BSWAP_RANGE_TEST(le16_range, "le16", 0x3f00, 0x3f00)
83 BSWAP_RANGE_TEST(le32_range, "le32", 0x3f00, 0x3f00)
84 BSWAP_RANGE_TEST(le64_range, "le64", 0x3f00, 0x3f00)
85 #else
86 BSWAP_RANGE_TEST(be16_range, "be16", 0x3f00, 0x3f00)
87 BSWAP_RANGE_TEST(be32_range, "be32", 0x3f00, 0x3f00)
88 BSWAP_RANGE_TEST(be64_range, "be64", 0x3f00, 0x3f00)
89 BSWAP_RANGE_TEST(le16_range, "le16", 0x3f00, 0x3f)
90 BSWAP_RANGE_TEST(le32_range, "le32", 0x3f00, 0x3f0000)
91 BSWAP_RANGE_TEST(le64_range, "le64", 0x3f00, 0x3f000000000000)
92 #endif
93
94 SEC("socket")
95 __description("BSWAP, reset reg id")
96 __failure __msg("math between fp pointer and register with unbounded min value is not allowed")
bswap_reset_reg_id(void)97 __naked void bswap_reset_reg_id(void)
98 {
99 asm volatile (" \
100 call %[bpf_ktime_get_ns]; \
101 r1 = r0; \
102 r0 = be16 r0; \
103 if r0 != 1 goto l0_%=; \
104 r2 = r10; \
105 r2 += -512; \
106 r2 += r1; \
107 *(u8 *)(r2 + 0) = 0; \
108 l0_%=: \
109 r0 = 0; \
110 exit; \
111 " :
112 : __imm(bpf_ktime_get_ns)
113 : __clobber_all);
114 }
115
116 #else
117
118 SEC("socket")
119 __description("cpuv4 is not supported by compiler or jit, use a dummy test")
120 __success
dummy_test(void)121 int dummy_test(void)
122 {
123 return 0;
124 }
125
126 #endif
127
128 char _license[] SEC("license") = "GPL";
129