mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Allow macro expansion for values passed to the `__retval` and `__retval_unpriv` attributes. This is especially useful for testing programs which return various error codes. With this change, the code for parsing special literals can be made simpler, as the literals are defined via macros. The only exception is INT_MIN which expands to (-INT_MAX -1), which is not single number and cannot be parsed by strtol. So, we instead use a prefixed literal _INT_MIN in __retval and handle it separately (assign the expected return to INT_MIN). Also, strtol cannot handle the "ll" suffix so change the value of POINTER_VALUE from 0xcafe4all to 0xbadcafe. Signed-off-by: Viktor Malik <vmalik@redhat.com> Link: https://lore.kernel.org/r/a6c6b551ae0575351faa7b7a1df52f9341a5cbe8.1750917800.git.vmalik@redhat.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
144 lines
2.8 KiB
C
144 lines
2.8 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Converted from tools/testing/selftests/bpf/verifier/div_overflow.c */
|
|
|
|
#include <linux/bpf.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <limits.h>
|
|
#include "bpf_misc.h"
|
|
|
|
/* Just make sure that JITs used udiv/umod as otherwise we get
|
|
* an exception from INT_MIN/-1 overflow similarly as with div
|
|
* by zero.
|
|
*/
|
|
|
|
SEC("tc")
|
|
__description("DIV32 overflow, check 1")
|
|
__success __retval(0)
|
|
__naked void div32_overflow_check_1(void)
|
|
{
|
|
asm volatile (" \
|
|
w1 = -1; \
|
|
w0 = %[int_min]; \
|
|
w0 /= w1; \
|
|
exit; \
|
|
" :
|
|
: __imm_const(int_min, INT_MIN)
|
|
: __clobber_all);
|
|
}
|
|
|
|
SEC("tc")
|
|
__description("DIV32 overflow, check 2")
|
|
__success __retval(0)
|
|
__naked void div32_overflow_check_2(void)
|
|
{
|
|
asm volatile (" \
|
|
w0 = %[int_min]; \
|
|
w0 /= -1; \
|
|
exit; \
|
|
" :
|
|
: __imm_const(int_min, INT_MIN)
|
|
: __clobber_all);
|
|
}
|
|
|
|
SEC("tc")
|
|
__description("DIV64 overflow, check 1")
|
|
__success __retval(0)
|
|
__naked void div64_overflow_check_1(void)
|
|
{
|
|
asm volatile (" \
|
|
r1 = -1; \
|
|
r2 = %[llong_min] ll; \
|
|
r2 /= r1; \
|
|
w0 = 0; \
|
|
if r0 == r2 goto l0_%=; \
|
|
w0 = 1; \
|
|
l0_%=: exit; \
|
|
" :
|
|
: __imm_const(llong_min, LLONG_MIN)
|
|
: __clobber_all);
|
|
}
|
|
|
|
SEC("tc")
|
|
__description("DIV64 overflow, check 2")
|
|
__success __retval(0)
|
|
__naked void div64_overflow_check_2(void)
|
|
{
|
|
asm volatile (" \
|
|
r1 = %[llong_min] ll; \
|
|
r1 /= -1; \
|
|
w0 = 0; \
|
|
if r0 == r1 goto l0_%=; \
|
|
w0 = 1; \
|
|
l0_%=: exit; \
|
|
" :
|
|
: __imm_const(llong_min, LLONG_MIN)
|
|
: __clobber_all);
|
|
}
|
|
|
|
SEC("tc")
|
|
__description("MOD32 overflow, check 1")
|
|
__success __retval(_INT_MIN)
|
|
__naked void mod32_overflow_check_1(void)
|
|
{
|
|
asm volatile (" \
|
|
w1 = -1; \
|
|
w0 = %[int_min]; \
|
|
w0 %%= w1; \
|
|
exit; \
|
|
" :
|
|
: __imm_const(int_min, INT_MIN)
|
|
: __clobber_all);
|
|
}
|
|
|
|
SEC("tc")
|
|
__description("MOD32 overflow, check 2")
|
|
__success __retval(_INT_MIN)
|
|
__naked void mod32_overflow_check_2(void)
|
|
{
|
|
asm volatile (" \
|
|
w0 = %[int_min]; \
|
|
w0 %%= -1; \
|
|
exit; \
|
|
" :
|
|
: __imm_const(int_min, INT_MIN)
|
|
: __clobber_all);
|
|
}
|
|
|
|
SEC("tc")
|
|
__description("MOD64 overflow, check 1")
|
|
__success __retval(1)
|
|
__naked void mod64_overflow_check_1(void)
|
|
{
|
|
asm volatile (" \
|
|
r1 = -1; \
|
|
r2 = %[llong_min] ll; \
|
|
r3 = r2; \
|
|
r2 %%= r1; \
|
|
w0 = 0; \
|
|
if r3 != r2 goto l0_%=; \
|
|
w0 = 1; \
|
|
l0_%=: exit; \
|
|
" :
|
|
: __imm_const(llong_min, LLONG_MIN)
|
|
: __clobber_all);
|
|
}
|
|
|
|
SEC("tc")
|
|
__description("MOD64 overflow, check 2")
|
|
__success __retval(1)
|
|
__naked void mod64_overflow_check_2(void)
|
|
{
|
|
asm volatile (" \
|
|
r2 = %[llong_min] ll; \
|
|
r3 = r2; \
|
|
r2 %%= -1; \
|
|
w0 = 0; \
|
|
if r3 != r2 goto l0_%=; \
|
|
w0 = 1; \
|
|
l0_%=: exit; \
|
|
" :
|
|
: __imm_const(llong_min, LLONG_MIN)
|
|
: __clobber_all);
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|