freebsd-dev/contrib/netbsd-tests/net/bpfjit/t_mbuf.c
Enji Cooper 57718be8fa Import the NetBSD test suite from ^/vendor/NetBSD/tests/09.30.2014_20.45 ,
minus the vendor Makefiles

Provide directions for how to bootstrap the vendor sources in
FREEBSD-upgrade

MFC after 2 weeks
Discussed with: rpaulo
Sponsored by: EMC / Isilon Storage Division
2014-10-02 23:26:49 +00:00

983 lines
26 KiB
C

/* $NetBSD: t_mbuf.c,v 1.1 2014/07/08 21:45:55 alnsn Exp $ */
/*-
* Copyright (c) 2014 Alexander Nasonov.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS
* OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
* DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__RCSID("$NetBSD: t_mbuf.c,v 1.1 2014/07/08 21:45:55 alnsn Exp $");
#include <sys/param.h>
#include <sys/mbuf.h>
#include <net/bpf.h>
#include <net/bpfjit.h>
#include <stdint.h>
#include <string.h>
#include <rump/rump.h>
#include <rump/rump_syscalls.h>
#include "../../net/bpf/h_bpf.h"
/* XXX: atf-c.h has collisions with mbuf */
#undef m_type
#undef m_data
#include <atf-c.h>
#include "../../h_macros.h"
static bool
test_ldb_abs(size_t split)
{
/* Return a product of all packet bytes. */
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 0), /* A <- P[0] */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 1), /* A <- P[1] */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 2), /* A <- P[2] */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 3), /* A <- P[3] */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 4), /* A <- P[4] */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const unsigned int res = 120;
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == res;
}
static bool
test_ldh_abs(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 0), /* A <- P[0:2] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 1), /* A <- P[1:2] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 2), /* A <- P[2:2] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 3), /* A <- P[3:2] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const unsigned int res = 0x0a0e; /* 10 14 */
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == res;
}
static bool
test_ldw_abs(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 0), /* A <- P[0:4] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 1), /* A <- P[1:4] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const unsigned int res = 0x03050709;
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == res;
}
static bool
test_ldb_ind(size_t split)
{
/* Return a sum of all packet bytes. */
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 0), /* A <- P[0+X] */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 1), /* A <- P[1+X] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 1), /* A <- P[1+X] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 2), /* A <- P[2+X] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 3), /* A <- P[3+X] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const unsigned int res = 15;
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == res;
}
static bool
test_ldw_ind(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 0), /* A <- P[X+0:4] */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 0), /* A <- P[X+0:4] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0), /* X <- 0 */
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 1), /* A <- P[X+1:4] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const unsigned int res = 0x05080b0e;
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == res;
}
static bool
test_ldh_ind(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 0), /* A <- P[X+0:2] */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 1), /* A <- P[X+1:2] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 1), /* A <- P[X+1:2] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_ST, 0), /* M[0] <- A */
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 2), /* A <- P[X+2:2] */
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */
BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const unsigned int res = 0x0a0e; /* 10 14 */
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == res;
}
static bool
test_msh(size_t split)
{
/* Return a product of all packet bytes. */
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 1), /* A <- 1 */
BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 0), /* X <- 4*(P[0]&0xf) */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */
BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 1), /* X <- 4*(P[1]&0xf) */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */
BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 2), /* X <- 4*(P[2]&0xf) */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */
BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 3), /* X <- 4*(P[3]&0xf) */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */
BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 4), /* X <- 4*(P[4]&0xf) */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */
BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const unsigned int res = 120;
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == res;
}
static bool
test_ldb_abs_overflow(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 5),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldh_abs_overflow(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 4),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldw_abs_overflow(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 2),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldb_ind_overflow1(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 5),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldb_ind_overflow2(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 4),
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldb_ind_overflow3(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_MAX),
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldh_ind_overflow1(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 4),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldh_ind_overflow2(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 3),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldh_ind_overflow3(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_MAX),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldw_ind_overflow1(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 2),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldw_ind_overflow2(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_ldw_ind_overflow3(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_MAX),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
static bool
test_msh_overflow(size_t split)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 5),
BPF_STMT(BPF_MISC+BPF_TXA, 0),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0),
};
static unsigned char P[] = { 1, 2, 3, 4, 5 };
const size_t insn_count = sizeof(insns) / sizeof(insns[0]);
if (!prog_validate(insns, insn_count))
return false;
return exec_prog_mchain2(insns, insn_count, P, sizeof(P), split) == 0;
}
ATF_TC(bpfjit_mbuf_ldb_abs);
ATF_TC_HEAD(bpfjit_mbuf_ldb_abs, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_ABS "
"loads bytes from mbuf correctly");
}
ATF_TC_BODY(bpfjit_mbuf_ldb_abs, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldb_abs(0));
ATF_CHECK(test_ldb_abs(1));
ATF_CHECK(test_ldb_abs(2));
ATF_CHECK(test_ldb_abs(3));
ATF_CHECK(test_ldb_abs(4));
ATF_CHECK(test_ldb_abs(5));
}
ATF_TC(bpfjit_mbuf_ldh_abs);
ATF_TC_HEAD(bpfjit_mbuf_ldh_abs, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_ABS "
"loads halfwords from mbuf correctly");
}
ATF_TC_BODY(bpfjit_mbuf_ldh_abs, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldh_abs(0));
ATF_CHECK(test_ldh_abs(1));
ATF_CHECK(test_ldh_abs(2));
ATF_CHECK(test_ldh_abs(3));
ATF_CHECK(test_ldh_abs(4));
ATF_CHECK(test_ldh_abs(5));
}
ATF_TC(bpfjit_mbuf_ldw_abs);
ATF_TC_HEAD(bpfjit_mbuf_ldw_abs, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_ABS "
"loads words from mbuf correctly");
}
ATF_TC_BODY(bpfjit_mbuf_ldw_abs, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldw_abs(0));
ATF_CHECK(test_ldw_abs(1));
ATF_CHECK(test_ldw_abs(2));
ATF_CHECK(test_ldw_abs(3));
ATF_CHECK(test_ldw_abs(4));
ATF_CHECK(test_ldw_abs(5));
}
ATF_TC(bpfjit_mbuf_ldb_ind);
ATF_TC_HEAD(bpfjit_mbuf_ldb_ind, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_IND "
"loads bytes from mbuf correctly");
}
ATF_TC_BODY(bpfjit_mbuf_ldb_ind, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldb_ind(0));
ATF_CHECK(test_ldb_ind(1));
ATF_CHECK(test_ldb_ind(2));
ATF_CHECK(test_ldb_ind(3));
ATF_CHECK(test_ldb_ind(4));
ATF_CHECK(test_ldb_ind(5));
}
ATF_TC(bpfjit_mbuf_ldh_ind);
ATF_TC_HEAD(bpfjit_mbuf_ldh_ind, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_IND "
"loads halfwords from mbuf correctly");
}
ATF_TC_BODY(bpfjit_mbuf_ldh_ind, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldh_ind(0));
ATF_CHECK(test_ldh_ind(1));
ATF_CHECK(test_ldh_ind(2));
ATF_CHECK(test_ldh_ind(3));
ATF_CHECK(test_ldh_ind(4));
ATF_CHECK(test_ldh_ind(5));
}
ATF_TC(bpfjit_mbuf_ldw_ind);
ATF_TC_HEAD(bpfjit_mbuf_ldw_ind, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_IND "
"loads words from mbuf correctly");
}
ATF_TC_BODY(bpfjit_mbuf_ldw_ind, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldw_ind(0));
ATF_CHECK(test_ldw_ind(1));
ATF_CHECK(test_ldw_ind(2));
ATF_CHECK(test_ldw_ind(3));
ATF_CHECK(test_ldw_ind(4));
ATF_CHECK(test_ldw_ind(5));
}
ATF_TC(bpfjit_mbuf_msh);
ATF_TC_HEAD(bpfjit_mbuf_msh, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LDX+BPF_B+BPF_MSH "
"loads bytes from mbuf correctly");
}
ATF_TC_BODY(bpfjit_mbuf_msh, tc)
{
RZ(rump_init());
ATF_CHECK(test_msh(0));
ATF_CHECK(test_msh(1));
ATF_CHECK(test_msh(2));
ATF_CHECK(test_msh(3));
ATF_CHECK(test_msh(4));
ATF_CHECK(test_msh(5));
}
ATF_TC(bpfjit_mbuf_ldb_abs_overflow);
ATF_TC_HEAD(bpfjit_mbuf_ldb_abs_overflow, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_ABS "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldb_abs_overflow, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldb_abs_overflow(0));
ATF_CHECK(test_ldb_abs_overflow(1));
ATF_CHECK(test_ldb_abs_overflow(2));
ATF_CHECK(test_ldb_abs_overflow(3));
ATF_CHECK(test_ldb_abs_overflow(4));
ATF_CHECK(test_ldb_abs_overflow(5));
}
ATF_TC(bpfjit_mbuf_ldh_abs_overflow);
ATF_TC_HEAD(bpfjit_mbuf_ldh_abs_overflow, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_ABS "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldh_abs_overflow, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldh_abs_overflow(0));
ATF_CHECK(test_ldh_abs_overflow(1));
ATF_CHECK(test_ldh_abs_overflow(2));
ATF_CHECK(test_ldh_abs_overflow(3));
ATF_CHECK(test_ldh_abs_overflow(4));
ATF_CHECK(test_ldh_abs_overflow(5));
}
ATF_TC(bpfjit_mbuf_ldw_abs_overflow);
ATF_TC_HEAD(bpfjit_mbuf_ldw_abs_overflow, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_ABS "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldw_abs_overflow, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldw_abs_overflow(0));
ATF_CHECK(test_ldw_abs_overflow(1));
ATF_CHECK(test_ldw_abs_overflow(2));
ATF_CHECK(test_ldw_abs_overflow(3));
ATF_CHECK(test_ldw_abs_overflow(4));
ATF_CHECK(test_ldw_abs_overflow(5));
}
ATF_TC(bpfjit_mbuf_ldb_ind_overflow1);
ATF_TC_HEAD(bpfjit_mbuf_ldb_ind_overflow1, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldb_ind_overflow1, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldb_ind_overflow1(0));
ATF_CHECK(test_ldb_ind_overflow1(1));
ATF_CHECK(test_ldb_ind_overflow1(2));
ATF_CHECK(test_ldb_ind_overflow1(3));
ATF_CHECK(test_ldb_ind_overflow1(4));
ATF_CHECK(test_ldb_ind_overflow1(5));
}
ATF_TC(bpfjit_mbuf_ldb_ind_overflow2);
ATF_TC_HEAD(bpfjit_mbuf_ldb_ind_overflow2, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldb_ind_overflow2, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldb_ind_overflow2(0));
ATF_CHECK(test_ldb_ind_overflow2(1));
ATF_CHECK(test_ldb_ind_overflow2(2));
ATF_CHECK(test_ldb_ind_overflow2(3));
ATF_CHECK(test_ldb_ind_overflow2(4));
ATF_CHECK(test_ldb_ind_overflow2(5));
}
ATF_TC(bpfjit_mbuf_ldb_ind_overflow3);
ATF_TC_HEAD(bpfjit_mbuf_ldb_ind_overflow3, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldb_ind_overflow3, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldb_ind_overflow3(0));
ATF_CHECK(test_ldb_ind_overflow3(1));
ATF_CHECK(test_ldb_ind_overflow3(2));
ATF_CHECK(test_ldb_ind_overflow3(3));
ATF_CHECK(test_ldb_ind_overflow3(4));
ATF_CHECK(test_ldb_ind_overflow3(5));
}
ATF_TC(bpfjit_mbuf_ldh_ind_overflow1);
ATF_TC_HEAD(bpfjit_mbuf_ldh_ind_overflow1, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldh_ind_overflow1, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldh_ind_overflow1(0));
ATF_CHECK(test_ldh_ind_overflow1(1));
ATF_CHECK(test_ldh_ind_overflow1(2));
ATF_CHECK(test_ldh_ind_overflow1(3));
ATF_CHECK(test_ldh_ind_overflow1(4));
ATF_CHECK(test_ldh_ind_overflow1(5));
}
ATF_TC(bpfjit_mbuf_ldh_ind_overflow2);
ATF_TC_HEAD(bpfjit_mbuf_ldh_ind_overflow2, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldh_ind_overflow2, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldh_ind_overflow2(0));
ATF_CHECK(test_ldh_ind_overflow2(1));
ATF_CHECK(test_ldh_ind_overflow2(2));
ATF_CHECK(test_ldh_ind_overflow2(3));
ATF_CHECK(test_ldh_ind_overflow2(4));
ATF_CHECK(test_ldh_ind_overflow2(5));
}
ATF_TC(bpfjit_mbuf_ldh_ind_overflow3);
ATF_TC_HEAD(bpfjit_mbuf_ldh_ind_overflow3, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldh_ind_overflow3, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldh_ind_overflow3(0));
ATF_CHECK(test_ldh_ind_overflow3(1));
ATF_CHECK(test_ldh_ind_overflow3(2));
ATF_CHECK(test_ldh_ind_overflow3(3));
ATF_CHECK(test_ldh_ind_overflow3(4));
ATF_CHECK(test_ldh_ind_overflow3(5));
}
ATF_TC(bpfjit_mbuf_ldw_ind_overflow1);
ATF_TC_HEAD(bpfjit_mbuf_ldw_ind_overflow1, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldw_ind_overflow1, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldw_ind_overflow1(0));
ATF_CHECK(test_ldw_ind_overflow1(1));
ATF_CHECK(test_ldw_ind_overflow1(2));
ATF_CHECK(test_ldw_ind_overflow1(3));
ATF_CHECK(test_ldw_ind_overflow1(4));
ATF_CHECK(test_ldw_ind_overflow1(5));
}
ATF_TC(bpfjit_mbuf_ldw_ind_overflow2);
ATF_TC_HEAD(bpfjit_mbuf_ldw_ind_overflow2, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldw_ind_overflow2, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldw_ind_overflow2(0));
ATF_CHECK(test_ldw_ind_overflow2(1));
ATF_CHECK(test_ldw_ind_overflow2(2));
ATF_CHECK(test_ldw_ind_overflow2(3));
ATF_CHECK(test_ldw_ind_overflow2(4));
ATF_CHECK(test_ldw_ind_overflow2(5));
}
ATF_TC(bpfjit_mbuf_ldw_ind_overflow3);
ATF_TC_HEAD(bpfjit_mbuf_ldw_ind_overflow3, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_IND "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_ldw_ind_overflow3, tc)
{
RZ(rump_init());
ATF_CHECK(test_ldw_ind_overflow3(0));
ATF_CHECK(test_ldw_ind_overflow3(1));
ATF_CHECK(test_ldw_ind_overflow3(2));
ATF_CHECK(test_ldw_ind_overflow3(3));
ATF_CHECK(test_ldw_ind_overflow3(4));
ATF_CHECK(test_ldw_ind_overflow3(5));
}
ATF_TC(bpfjit_mbuf_msh_overflow);
ATF_TC_HEAD(bpfjit_mbuf_msh_overflow, tc)
{
atf_tc_set_md_var(tc, "descr", "Check that BPF_LDX+BPF_B+BPF_MSH "
"with out-of-bounds index aborts a filter program");
}
ATF_TC_BODY(bpfjit_mbuf_msh_overflow, tc)
{
RZ(rump_init());
ATF_CHECK(test_msh_overflow(0));
ATF_CHECK(test_msh_overflow(1));
ATF_CHECK(test_msh_overflow(2));
ATF_CHECK(test_msh_overflow(3));
ATF_CHECK(test_msh_overflow(4));
ATF_CHECK(test_msh_overflow(5));
}
ATF_TP_ADD_TCS(tp)
{
/*
* For every new test please also add a similar test
* to ../../net/bpf/t_mbuf.c
*/
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldb_abs);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldh_abs);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldw_abs);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldb_ind);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldh_ind);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldw_ind);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_msh);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldb_abs_overflow);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldh_abs_overflow);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldw_abs_overflow);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldb_ind_overflow1);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldb_ind_overflow2);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldb_ind_overflow3);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldh_ind_overflow1);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldh_ind_overflow2);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldh_ind_overflow3);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldw_ind_overflow1);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldw_ind_overflow2);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_ldw_ind_overflow3);
ATF_TP_ADD_TC(tp, bpfjit_mbuf_msh_overflow);
return atf_no_error();
}