Module Name: src Committed By: alnsn Date: Mon Jul 7 19:40:28 UTC 2014
Added Files: src/tests/net/bpf: t_mbuf.c Log Message: Add rump tests for checking how bpf_validate() works with mbuf chains. To generate a diff of this commit: cvs rdiff -u -r0 -r1.1 src/tests/net/bpf/t_mbuf.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Added files: Index: src/tests/net/bpf/t_mbuf.c diff -u /dev/null src/tests/net/bpf/t_mbuf.c:1.1 --- /dev/null Mon Jul 7 19:40:28 2014 +++ src/tests/net/bpf/t_mbuf.c Mon Jul 7 19:40:28 2014 @@ -0,0 +1,963 @@ +/* $NetBSD: t_mbuf.c,v 1.1 2014/07/07 19:40:28 alnsn Exp $ */ + +/*- + * Copyright (c) 2014 Alexander Nasonov. + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS + * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED + * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE + * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + */ + +#include <sys/cdefs.h> +__RCSID("$NetBSD: t_mbuf.c,v 1.1 2014/07/07 19:40:28 alnsn Exp $"); + +#include <sys/param.h> +#include <sys/mbuf.h> +#include <unistd.h> + +#include <net/bpf.h> + +#include <stdint.h> +#include <stdio.h> +#include <string.h> + +#include <rump/rump.h> +#include <rump/rump_syscalls.h> + +#include "../../net/bpf/h_bpf.h" + +/* XXX: atf-c.h has collisions with mbuf */ +#undef m_type +#undef m_data +#include <atf-c.h> + +#include "../../h_macros.h" + +static bool +test_ldb_abs(size_t split) +{ + /* Return a product of all packet bytes. */ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */ + + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 0), /* A <- P[0] */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */ + + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 1), /* A <- P[1] */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */ + + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 2), /* A <- P[2] */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */ + + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 3), /* A <- P[3] */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */ + + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 4), /* A <- P[4] */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + const unsigned int res = 120; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == res; +} + +static bool +test_ldh_abs(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 0), /* A <- P[0:2] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */ + + BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 1), /* A <- P[1:2] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */ + + BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 2), /* A <- P[2:2] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */ + + BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 3), /* A <- P[3:2] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + const unsigned int res = 0x0a0e; /* 10 14 */ + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == res; +} + +static bool +test_ldw_abs(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 0), /* A <- P[0:4] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_MISC+BPF_TAX, 0), /* X <- A */ + + BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 1), /* A <- P[1:4] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + const unsigned int res = 0x03050709; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == res; +} + +static bool +test_ldb_ind(size_t split) +{ + /* Return a sum of all packet bytes. */ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_B+BPF_IND, 0), /* A <- P[0+X] */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LD+BPF_B+BPF_IND, 1), /* A <- P[1+X] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */ + BPF_STMT(BPF_LD+BPF_B+BPF_IND, 1), /* A <- P[1+X] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */ + BPF_STMT(BPF_LD+BPF_B+BPF_IND, 2), /* A <- P[2+X] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */ + BPF_STMT(BPF_LD+BPF_B+BPF_IND, 3), /* A <- P[3+X] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + const unsigned int res = 15; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == res; +} + +static bool +test_ldw_ind(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_W+BPF_IND, 0), /* A <- P[X+0:4] */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */ + BPF_STMT(BPF_LD+BPF_W+BPF_IND, 0), /* A <- P[X+0:4] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0), /* X <- 0 */ + BPF_STMT(BPF_LD+BPF_W+BPF_IND, 1), /* A <- P[X+1:4] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + const unsigned int res = 0x05080b0e; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == res; +} + +static bool +test_ldh_ind(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_H+BPF_IND, 0), /* A <- P[X+0:2] */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LD+BPF_H+BPF_IND, 1), /* A <- P[X+1:2] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */ + BPF_STMT(BPF_LD+BPF_H+BPF_IND, 1), /* A <- P[X+1:2] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_ST, 0), /* M[0] <- A */ + + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), /* X <- 1 */ + BPF_STMT(BPF_LD+BPF_H+BPF_IND, 2), /* A <- P[X+2:2] */ + BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0), /* X <- M[0] */ + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), /* A <- A + X */ + BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + const unsigned int res = 0x0a0e; /* 10 14 */ + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == res; +} + +static bool +test_msh(size_t split) +{ + /* Return a product of all packet bytes. */ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_IMM, 1), /* A <- 1 */ + + BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 0), /* X <- 4*(P[0]&0xf) */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */ + + BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 1), /* X <- 4*(P[1]&0xf) */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */ + + BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 2), /* X <- 4*(P[2]&0xf) */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */ + + BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 3), /* X <- 4*(P[3]&0xf) */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */ + + BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 4), /* X <- 4*(P[4]&0xf) */ + BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0), /* A <- A * X */ + BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4), /* A <- A / 4 */ + + BPF_STMT(BPF_RET+BPF_A, 0), /* ret A */ + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + const unsigned int res = 120; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == res; +} + +static bool +test_ldb_abs_overflow(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 5), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldh_abs_overflow(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 4), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldw_abs_overflow(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 2), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldb_ind_overflow1(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_B+BPF_IND, 5), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldb_ind_overflow2(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 4), + BPF_STMT(BPF_LD+BPF_B+BPF_IND, 1), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldb_ind_overflow3(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_MAX), + BPF_STMT(BPF_LD+BPF_B+BPF_IND, 1), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldh_ind_overflow1(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_H+BPF_IND, 4), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldh_ind_overflow2(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 3), + BPF_STMT(BPF_LD+BPF_H+BPF_IND, 1), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldh_ind_overflow3(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_MAX), + BPF_STMT(BPF_LD+BPF_H+BPF_IND, 1), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldw_ind_overflow1(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LD+BPF_W+BPF_IND, 2), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldw_ind_overflow2(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1), + BPF_STMT(BPF_LD+BPF_W+BPF_IND, 1), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_ldw_ind_overflow3(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_MAX), + BPF_STMT(BPF_LD+BPF_W+BPF_IND, 1), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +static bool +test_msh_overflow(size_t split) +{ + static struct bpf_insn insns[] = { + BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 5), + BPF_STMT(BPF_MISC+BPF_TXA, 0), + BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1), + BPF_STMT(BPF_RET+BPF_A, 0), + }; + + static char P[] = { 1, 2, 3, 4, 5 }; + + if (!prog_validate(insns, sizeof(insns) / sizeof(insns[0]))) + return false; + + return interp_prog_mchain2(insns, P, sizeof(P), split) == 0; +} + +ATF_TC(bpf_mbuf_ldb_abs); +ATF_TC_HEAD(bpf_mbuf_ldb_abs, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_ABS " + "loads bytes from mbuf correctly"); +} + +ATF_TC_BODY(bpf_mbuf_ldb_abs, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldb_abs(0)); + ATF_CHECK(test_ldb_abs(1)); + ATF_CHECK(test_ldb_abs(2)); + ATF_CHECK(test_ldb_abs(3)); + ATF_CHECK(test_ldb_abs(4)); + ATF_CHECK(test_ldb_abs(5)); +} + +ATF_TC(bpf_mbuf_ldh_abs); +ATF_TC_HEAD(bpf_mbuf_ldh_abs, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_ABS " + "loads halfwords from mbuf correctly"); +} + +ATF_TC_BODY(bpf_mbuf_ldh_abs, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldh_abs(0)); + ATF_CHECK(test_ldh_abs(1)); + ATF_CHECK(test_ldh_abs(2)); + ATF_CHECK(test_ldh_abs(3)); + ATF_CHECK(test_ldh_abs(4)); + ATF_CHECK(test_ldh_abs(5)); +} + +ATF_TC(bpf_mbuf_ldw_abs); +ATF_TC_HEAD(bpf_mbuf_ldw_abs, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_ABS " + "loads words from mbuf correctly"); +} + +ATF_TC_BODY(bpf_mbuf_ldw_abs, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldw_abs(0)); + ATF_CHECK(test_ldw_abs(1)); + ATF_CHECK(test_ldw_abs(2)); + ATF_CHECK(test_ldw_abs(3)); + ATF_CHECK(test_ldw_abs(4)); + ATF_CHECK(test_ldw_abs(5)); +} + +ATF_TC(bpf_mbuf_ldb_ind); +ATF_TC_HEAD(bpf_mbuf_ldb_ind, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_IND " + "loads bytes from mbuf correctly"); +} + +ATF_TC_BODY(bpf_mbuf_ldb_ind, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldb_ind(0)); + ATF_CHECK(test_ldb_ind(1)); + ATF_CHECK(test_ldb_ind(2)); + ATF_CHECK(test_ldb_ind(3)); + ATF_CHECK(test_ldb_ind(4)); + ATF_CHECK(test_ldb_ind(5)); +} + +ATF_TC(bpf_mbuf_ldh_ind); +ATF_TC_HEAD(bpf_mbuf_ldh_ind, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_IND " + "loads halfwords from mbuf correctly"); +} + +ATF_TC_BODY(bpf_mbuf_ldh_ind, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldh_ind(0)); + ATF_CHECK(test_ldh_ind(1)); + ATF_CHECK(test_ldh_ind(2)); + ATF_CHECK(test_ldh_ind(3)); + ATF_CHECK(test_ldh_ind(4)); + ATF_CHECK(test_ldh_ind(5)); +} + +ATF_TC(bpf_mbuf_ldw_ind); +ATF_TC_HEAD(bpf_mbuf_ldw_ind, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_IND " + "loads words from mbuf correctly"); +} + +ATF_TC_BODY(bpf_mbuf_ldw_ind, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldw_ind(0)); + ATF_CHECK(test_ldw_ind(1)); + ATF_CHECK(test_ldw_ind(2)); + ATF_CHECK(test_ldw_ind(3)); + ATF_CHECK(test_ldw_ind(4)); + ATF_CHECK(test_ldw_ind(5)); +} + +ATF_TC(bpf_mbuf_msh); +ATF_TC_HEAD(bpf_mbuf_msh, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LDX+BPF_B+BPF_MSH " + "loads bytes from mbuf correctly"); +} + +ATF_TC_BODY(bpf_mbuf_msh, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_msh(0)); + ATF_CHECK(test_msh(1)); + ATF_CHECK(test_msh(2)); + ATF_CHECK(test_msh(3)); + ATF_CHECK(test_msh(4)); + ATF_CHECK(test_msh(5)); +} + +ATF_TC(bpf_mbuf_ldb_abs_overflow); +ATF_TC_HEAD(bpf_mbuf_ldb_abs_overflow, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_ABS " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldb_abs_overflow, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldb_abs_overflow(0)); + ATF_CHECK(test_ldb_abs_overflow(1)); + ATF_CHECK(test_ldb_abs_overflow(2)); + ATF_CHECK(test_ldb_abs_overflow(3)); + ATF_CHECK(test_ldb_abs_overflow(4)); + ATF_CHECK(test_ldb_abs_overflow(5)); +} + +ATF_TC(bpf_mbuf_ldh_abs_overflow); +ATF_TC_HEAD(bpf_mbuf_ldh_abs_overflow, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_ABS " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldh_abs_overflow, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldh_abs_overflow(0)); + ATF_CHECK(test_ldh_abs_overflow(1)); + ATF_CHECK(test_ldh_abs_overflow(2)); + ATF_CHECK(test_ldh_abs_overflow(3)); + ATF_CHECK(test_ldh_abs_overflow(4)); + ATF_CHECK(test_ldh_abs_overflow(5)); +} + +ATF_TC(bpf_mbuf_ldw_abs_overflow); +ATF_TC_HEAD(bpf_mbuf_ldw_abs_overflow, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_ABS " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldw_abs_overflow, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldw_abs_overflow(0)); + ATF_CHECK(test_ldw_abs_overflow(1)); + ATF_CHECK(test_ldw_abs_overflow(2)); + ATF_CHECK(test_ldw_abs_overflow(3)); + ATF_CHECK(test_ldw_abs_overflow(4)); + ATF_CHECK(test_ldw_abs_overflow(5)); +} + +ATF_TC(bpf_mbuf_ldb_ind_overflow1); +ATF_TC_HEAD(bpf_mbuf_ldb_ind_overflow1, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldb_ind_overflow1, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldb_ind_overflow1(0)); + ATF_CHECK(test_ldb_ind_overflow1(1)); + ATF_CHECK(test_ldb_ind_overflow1(2)); + ATF_CHECK(test_ldb_ind_overflow1(3)); + ATF_CHECK(test_ldb_ind_overflow1(4)); + ATF_CHECK(test_ldb_ind_overflow1(5)); +} + +ATF_TC(bpf_mbuf_ldb_ind_overflow2); +ATF_TC_HEAD(bpf_mbuf_ldb_ind_overflow2, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldb_ind_overflow2, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldb_ind_overflow2(0)); + ATF_CHECK(test_ldb_ind_overflow2(1)); + ATF_CHECK(test_ldb_ind_overflow2(2)); + ATF_CHECK(test_ldb_ind_overflow2(3)); + ATF_CHECK(test_ldb_ind_overflow2(4)); + ATF_CHECK(test_ldb_ind_overflow2(5)); +} + +ATF_TC(bpf_mbuf_ldb_ind_overflow3); +ATF_TC_HEAD(bpf_mbuf_ldb_ind_overflow3, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_B+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldb_ind_overflow3, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldb_ind_overflow3(0)); + ATF_CHECK(test_ldb_ind_overflow3(1)); + ATF_CHECK(test_ldb_ind_overflow3(2)); + ATF_CHECK(test_ldb_ind_overflow3(3)); + ATF_CHECK(test_ldb_ind_overflow3(4)); + ATF_CHECK(test_ldb_ind_overflow3(5)); +} + +ATF_TC(bpf_mbuf_ldh_ind_overflow1); +ATF_TC_HEAD(bpf_mbuf_ldh_ind_overflow1, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldh_ind_overflow1, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldh_ind_overflow1(0)); + ATF_CHECK(test_ldh_ind_overflow1(1)); + ATF_CHECK(test_ldh_ind_overflow1(2)); + ATF_CHECK(test_ldh_ind_overflow1(3)); + ATF_CHECK(test_ldh_ind_overflow1(4)); + ATF_CHECK(test_ldh_ind_overflow1(5)); +} + +ATF_TC(bpf_mbuf_ldh_ind_overflow2); +ATF_TC_HEAD(bpf_mbuf_ldh_ind_overflow2, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldh_ind_overflow2, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldh_ind_overflow2(0)); + ATF_CHECK(test_ldh_ind_overflow2(1)); + ATF_CHECK(test_ldh_ind_overflow2(2)); + ATF_CHECK(test_ldh_ind_overflow2(3)); + ATF_CHECK(test_ldh_ind_overflow2(4)); + ATF_CHECK(test_ldh_ind_overflow2(5)); +} + +ATF_TC(bpf_mbuf_ldh_ind_overflow3); +ATF_TC_HEAD(bpf_mbuf_ldh_ind_overflow3, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_H+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldh_ind_overflow3, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldh_ind_overflow3(0)); + ATF_CHECK(test_ldh_ind_overflow3(1)); + ATF_CHECK(test_ldh_ind_overflow3(2)); + ATF_CHECK(test_ldh_ind_overflow3(3)); + ATF_CHECK(test_ldh_ind_overflow3(4)); + ATF_CHECK(test_ldh_ind_overflow3(5)); +} + +ATF_TC(bpf_mbuf_ldw_ind_overflow1); +ATF_TC_HEAD(bpf_mbuf_ldw_ind_overflow1, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldw_ind_overflow1, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldw_ind_overflow1(0)); + ATF_CHECK(test_ldw_ind_overflow1(1)); + ATF_CHECK(test_ldw_ind_overflow1(2)); + ATF_CHECK(test_ldw_ind_overflow1(3)); + ATF_CHECK(test_ldw_ind_overflow1(4)); + ATF_CHECK(test_ldw_ind_overflow1(5)); +} + +ATF_TC(bpf_mbuf_ldw_ind_overflow2); +ATF_TC_HEAD(bpf_mbuf_ldw_ind_overflow2, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldw_ind_overflow2, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldw_ind_overflow2(0)); + ATF_CHECK(test_ldw_ind_overflow2(1)); + ATF_CHECK(test_ldw_ind_overflow2(2)); + ATF_CHECK(test_ldw_ind_overflow2(3)); + ATF_CHECK(test_ldw_ind_overflow2(4)); + ATF_CHECK(test_ldw_ind_overflow2(5)); +} + +ATF_TC(bpf_mbuf_ldw_ind_overflow3); +ATF_TC_HEAD(bpf_mbuf_ldw_ind_overflow3, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LD+BPF_W+BPF_IND " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_ldw_ind_overflow3, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_ldw_ind_overflow3(0)); + ATF_CHECK(test_ldw_ind_overflow3(1)); + ATF_CHECK(test_ldw_ind_overflow3(2)); + ATF_CHECK(test_ldw_ind_overflow3(3)); + ATF_CHECK(test_ldw_ind_overflow3(4)); + ATF_CHECK(test_ldw_ind_overflow3(5)); +} + +ATF_TC(bpf_mbuf_msh_overflow); +ATF_TC_HEAD(bpf_mbuf_msh_overflow, tc) +{ + + atf_tc_set_md_var(tc, "descr", "Check that BPF_LDX+BPF_B+BPF_MSH " + "with out-of-bounds index aborts a filter program"); +} + +ATF_TC_BODY(bpf_mbuf_msh_overflow, tc) +{ + + RZ(rump_init()); + + ATF_CHECK(test_msh_overflow(0)); + ATF_CHECK(test_msh_overflow(1)); + ATF_CHECK(test_msh_overflow(2)); + ATF_CHECK(test_msh_overflow(3)); + ATF_CHECK(test_msh_overflow(4)); + ATF_CHECK(test_msh_overflow(5)); +} + +ATF_TP_ADD_TCS(tp) +{ + + /* + * For every new test please also add a similar test + * to ../../net/bpfjit/t_mbuf.c + */ + ATF_TP_ADD_TC(tp, bpf_mbuf_ldb_abs); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldh_abs); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldw_abs); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldb_ind); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldh_ind); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldw_ind); + ATF_TP_ADD_TC(tp, bpf_mbuf_msh); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldb_abs_overflow); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldh_abs_overflow); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldw_abs_overflow); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldb_ind_overflow1); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldb_ind_overflow2); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldb_ind_overflow3); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldh_ind_overflow1); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldh_ind_overflow2); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldh_ind_overflow3); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldw_ind_overflow1); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldw_ind_overflow2); + ATF_TP_ADD_TC(tp, bpf_mbuf_ldw_ind_overflow3); + ATF_TP_ADD_TC(tp, bpf_mbuf_msh_overflow); + + return atf_no_error(); +}