/* $NetBSD: t_bpfjit.c,v 1.14 2015/02/14 22:40:18 alnsn Exp $ */
/*-
* Copyright (c) 2011-2012, 2014-2015 Alexander Nasonov.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
* ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
* COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
* INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
* BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
* AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__RCSID("$NetBSD: t_bpfjit.c,v 1.14 2015/02/14 22:40:18 alnsn Exp $");
#include <atf-c.h>
#include <stdint.h>
#include <string.h>
#include <net/bpf.h>
#include <net/bpfjit.h>
static uint8_t deadbeef_at_5[16] = {
0, 0xf1, 2, 0xf3, 4, 0xde, 0xad, 0xbe, 0xef, 0xff
};
static inline
unsigned int jitcall(bpfjit_func_t fn,
const uint8_t *pkt, unsigned int wirelen, unsigned int buflen)
{
bpf_args_t args;
args.pkt = pkt;
args.wirelen = wirelen;
args.buflen = buflen;
return fn(NULL, &args);
}
ATF_TC(libbpfjit_empty);
ATF_TC_HEAD(libbpfjit_empty, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test that JIT compilation of an empty bpf program fails");
}
ATF_TC_BODY(libbpfjit_empty, tc)
{
struct bpf_insn dummy;
ATF_CHECK(!bpf_validate(&dummy, 0));
ATF_CHECK(bpfjit_generate_code(NULL, &dummy, 0) == NULL);
}
ATF_TC(libbpfjit_ret_k);
ATF_TC_HEAD(libbpfjit_ret_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of a trivial bpf program");
}
ATF_TC_BODY(libbpfjit_ret_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_RET+BPF_K, 17)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 17);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_bad_ret_k);
ATF_TC_HEAD(libbpfjit_bad_ret_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test that JIT compilation of a program with bad BPF_RET fails");
}
ATF_TC_BODY(libbpfjit_bad_ret_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_RET+BPF_K+0x8000, 13)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
/*
* The point of this test is checking a bad instruction of
* a valid class and with a valid BPF_RVAL data.
*/
const uint16_t rcode = insns[0].code;
ATF_CHECK(BPF_CLASS(rcode) == BPF_RET &&
(BPF_RVAL(rcode) == BPF_K || BPF_RVAL(rcode) == BPF_A));
ATF_CHECK(!bpf_validate(insns, insn_count));
/* Current implementation generates code. */
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 13);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_add_k);
ATF_TC_HEAD(libbpfjit_alu_add_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_ADD+BPF_K");
}
ATF_TC_BODY(libbpfjit_alu_add_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 3),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 2),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 5);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_sub_k);
ATF_TC_HEAD(libbpfjit_alu_sub_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_SUB+BPF_K");
}
ATF_TC_BODY(libbpfjit_alu_sub_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 1),
BPF_STMT(BPF_ALU+BPF_SUB+BPF_K, 2),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mul_k);
ATF_TC_HEAD(libbpfjit_alu_mul_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MUL+BPF_K");
}
ATF_TC_BODY(libbpfjit_alu_mul_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffff)),
BPF_STMT(BPF_ALU+BPF_MUL+BPF_K, 3),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(0xfffffffd));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div0_k);
ATF_TC_HEAD(libbpfjit_alu_div0_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_K with k=0");
}
ATF_TC_BODY(libbpfjit_alu_div0_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
//ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div1_k);
ATF_TC_HEAD(libbpfjit_alu_div1_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_K with k=1");
}
ATF_TC_BODY(libbpfjit_alu_div1_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 7),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 7);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div2_k);
ATF_TC_HEAD(libbpfjit_alu_div2_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_K with k=2");
}
ATF_TC_BODY(libbpfjit_alu_div2_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 7),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 2),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 3);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div4_k);
ATF_TC_HEAD(libbpfjit_alu_div4_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_K with k=4");
}
ATF_TC_BODY(libbpfjit_alu_div4_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffff)),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(0x3fffffff));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div10_k);
ATF_TC_HEAD(libbpfjit_alu_div10_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_K with k=10");
}
ATF_TC_BODY(libbpfjit_alu_div10_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294843849)),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 10),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(429484384));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div10000_k);
ATF_TC_HEAD(libbpfjit_alu_div10000_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_K with k=10000");
}
ATF_TC_BODY(libbpfjit_alu_div10000_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294843849)),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, 10000),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(429484));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div7609801_k);
ATF_TC_HEAD(libbpfjit_alu_div7609801_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_K with k=7609801");
}
ATF_TC_BODY(libbpfjit_alu_div7609801_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294967295)),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, UINT32_C(7609801)),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 564);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div80000000_k);
ATF_TC_HEAD(libbpfjit_alu_div80000000_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_K with k=0x80000000");
}
ATF_TC_BODY(libbpfjit_alu_div80000000_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffde)),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, UINT32_C(0x80000000)),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod0_k);
ATF_TC_HEAD(libbpfjit_alu_mod0_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_K with k=0");
}
ATF_TC_BODY(libbpfjit_alu_mod0_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_ALU+BPF_MOD+BPF_K, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
//ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod1_k);
ATF_TC_HEAD(libbpfjit_alu_mod1_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_K with k=1");
}
ATF_TC_BODY(libbpfjit_alu_mod1_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 7),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod2_k);
ATF_TC_HEAD(libbpfjit_alu_mod2_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_K with k=2");
}
ATF_TC_BODY(libbpfjit_alu_mod2_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 7),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_K, 2),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod4_k);
ATF_TC_HEAD(libbpfjit_alu_mod4_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_K with k=4");
}
ATF_TC_BODY(libbpfjit_alu_mod4_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffff)),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 3);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod10_k);
ATF_TC_HEAD(libbpfjit_alu_mod10_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_K with k=10");
}
ATF_TC_BODY(libbpfjit_alu_mod10_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294843849)),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_K, 10),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 9);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod10000_k);
ATF_TC_HEAD(libbpfjit_alu_mod10000_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_K with k=10000");
}
ATF_TC_BODY(libbpfjit_alu_mod10000_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294843849)),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_K, 10000),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 3849);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod7609801_k);
ATF_TC_HEAD(libbpfjit_alu_mod7609801_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_mod+BPF_K with k=7609801");
}
ATF_TC_BODY(libbpfjit_alu_mod7609801_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294967295)),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_K, UINT32_C(7609801)),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(3039531));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod80000000_k);
ATF_TC_HEAD(libbpfjit_alu_mod80000000_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_K with k=0x80000000");
}
ATF_TC_BODY(libbpfjit_alu_mod80000000_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffde)),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_K, UINT32_C(0x80000000)),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(0x7fffffde));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_and_k);
ATF_TC_HEAD(libbpfjit_alu_and_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_AND+BPF_K");
}
ATF_TC_BODY(libbpfjit_alu_and_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdead),
BPF_STMT(BPF_ALU+BPF_AND+BPF_K, 0xbeef),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == (0xdead&0xbeef));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_or_k);
ATF_TC_HEAD(libbpfjit_alu_or_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_OR+BPF_K");
}
ATF_TC_BODY(libbpfjit_alu_or_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdead0000),
BPF_STMT(BPF_ALU+BPF_OR+BPF_K, 0x0000beef),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xdeadbeef);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_xor_k);
ATF_TC_HEAD(libbpfjit_alu_xor_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_XOR+BPF_K");
}
ATF_TC_BODY(libbpfjit_alu_xor_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdead0f0f),
BPF_STMT(BPF_ALU+BPF_XOR+BPF_K, 0x0000b1e0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xdeadbeef);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_lsh_k);
ATF_TC_HEAD(libbpfjit_alu_lsh_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_LSH+BPF_K");
}
ATF_TC_BODY(libbpfjit_alu_lsh_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdeadbeef),
BPF_STMT(BPF_ALU+BPF_LSH+BPF_K, 16),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xbeef0000);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_lsh0_k);
ATF_TC_HEAD(libbpfjit_alu_lsh0_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_LSH+BPF_K with k=0");
}
ATF_TC_BODY(libbpfjit_alu_lsh0_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdeadbeef),
BPF_STMT(BPF_ALU+BPF_LSH+BPF_K, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xdeadbeef);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_rsh_k);
ATF_TC_HEAD(libbpfjit_alu_rsh_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_RSH+BPF_K");
}
ATF_TC_BODY(libbpfjit_alu_rsh_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdeadbeef),
BPF_STMT(BPF_ALU+BPF_RSH+BPF_K, 16),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0x0000dead);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_rsh0_k);
ATF_TC_HEAD(libbpfjit_alu_rsh0_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_RSH+BPF_K with k=0");
}
ATF_TC_BODY(libbpfjit_alu_rsh0_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdeadbeef),
BPF_STMT(BPF_ALU+BPF_RSH+BPF_K, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xdeadbeef);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_modulo_k);
ATF_TC_HEAD(libbpfjit_alu_modulo_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of modulo logic of BPF_ALU+BPF_K operations");
}
ATF_TC_BODY(libbpfjit_alu_modulo_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0x7fffff77)),
/* (7FFFFF77 * 0FFFFF77) = 07FFFFB2,F0004951 */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_K, UINT32_C(0x0fffff77)),
/* 07FFFFB2,F0004951 << 1 = 0FFFFF65,E00092A2 */
BPF_STMT(BPF_ALU+BPF_LSH+BPF_K, 1),
/* 0FFFFF65,E00092A2 + DDDDDDDD = 0FFFFF66,BDDE707F */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, UINT32_C(0xdddddddd)),
/* 0FFFFF66,BDDE707F - FFFFFFFF = 0FFFFF65,BDDE7080 */
BPF_STMT(BPF_ALU+BPF_SUB+BPF_K, UINT32_C(0xffffffff)),
/* 0FFFFF65,BDDE7080 | 0000030C = 0FFFFF65,BDDE738C */
BPF_STMT(BPF_ALU+BPF_OR+BPF_K, UINT32_C(0x0000030c)),
/* -0FFFFF65,BDDE738C mod(2^64) = F000009A,42218C74 */
BPF_STMT(BPF_ALU+BPF_NEG, 0),
/* F000009A,42218C74 & FFFFFF0F = F000009A,42218C04 */
BPF_STMT(BPF_ALU+BPF_AND+BPF_K, UINT32_C(0xffffff0f)),
/* F000009A,42218C74 >> 3 = 1E000013,48443180 */
/* 00000000,42218C74 >> 3 = 00000000,08443180 */
BPF_STMT(BPF_ALU+BPF_RSH+BPF_K, 3),
/* 00000000,08443180 * 7FFFFF77 = 042218BB,93818280 */
BPF_STMT(BPF_ALU+BPF_MUL+BPF_K, UINT32_C(0x7fffff77)),
/* 042218BB,93818280 / DEAD = 000004C0,71CBBBC3 */
/* 00000000,93818280 / DEAD = 00000000,0000A994 */
BPF_STMT(BPF_ALU+BPF_DIV+BPF_K, UINT32_C(0xdead)),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) != UINT32_C(0x71cbbbc3));
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(0x0000a994));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_add_x);
ATF_TC_HEAD(libbpfjit_alu_add_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_ADD+BPF_X");
}
ATF_TC_BODY(libbpfjit_alu_add_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 3),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 2),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 5);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_sub_x);
ATF_TC_HEAD(libbpfjit_alu_sub_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_SUB+BPF_X");
}
ATF_TC_BODY(libbpfjit_alu_sub_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 1),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 2),
BPF_STMT(BPF_ALU+BPF_SUB+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mul_x);
ATF_TC_HEAD(libbpfjit_alu_mul_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MUL+BPF_X");
}
ATF_TC_BODY(libbpfjit_alu_mul_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffff)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 3),
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(0xfffffffd));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div0_x);
ATF_TC_HEAD(libbpfjit_alu_div0_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_X with X=0");
}
ATF_TC_BODY(libbpfjit_alu_div0_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div1_x);
ATF_TC_HEAD(libbpfjit_alu_div1_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_X with X=1");
}
ATF_TC_BODY(libbpfjit_alu_div1_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 7),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 7);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div2_x);
ATF_TC_HEAD(libbpfjit_alu_div2_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_X with X=2");
}
ATF_TC_BODY(libbpfjit_alu_div2_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 7),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 2),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 3);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div4_x);
ATF_TC_HEAD(libbpfjit_alu_div4_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_X with X=4");
}
ATF_TC_BODY(libbpfjit_alu_div4_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffff)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 4),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(0x3fffffff));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div10_x);
ATF_TC_HEAD(libbpfjit_alu_div10_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_X with X=10");
}
ATF_TC_BODY(libbpfjit_alu_div10_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294843849)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 10),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(429484384));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div10000_x);
ATF_TC_HEAD(libbpfjit_alu_div10000_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_X with X=10000");
}
ATF_TC_BODY(libbpfjit_alu_div10000_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294843849)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 10000),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(429484));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div7609801_x);
ATF_TC_HEAD(libbpfjit_alu_div7609801_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_X with X=7609801");
}
ATF_TC_BODY(libbpfjit_alu_div7609801_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294967295)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(7609801)),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 564);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_div80000000_x);
ATF_TC_HEAD(libbpfjit_alu_div80000000_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_DIV+BPF_X with X=0x80000000");
}
ATF_TC_BODY(libbpfjit_alu_div80000000_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffde)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0x80000000)),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod0_x);
ATF_TC_HEAD(libbpfjit_alu_mod0_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_X with X=0");
}
ATF_TC_BODY(libbpfjit_alu_mod0_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod1_x);
ATF_TC_HEAD(libbpfjit_alu_mod1_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_X with X=1");
}
ATF_TC_BODY(libbpfjit_alu_mod1_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 7),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod2_x);
ATF_TC_HEAD(libbpfjit_alu_mod2_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_X with X=2");
}
ATF_TC_BODY(libbpfjit_alu_mod2_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 7),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 2),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod4_x);
ATF_TC_HEAD(libbpfjit_alu_mod4_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_X with X=4");
}
ATF_TC_BODY(libbpfjit_alu_mod4_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffff)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 4),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 3);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod10_x);
ATF_TC_HEAD(libbpfjit_alu_mod10_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_X with X=10");
}
ATF_TC_BODY(libbpfjit_alu_mod10_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294843849)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 10),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 9);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod10000_x);
ATF_TC_HEAD(libbpfjit_alu_mod10000_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_X with X=10000");
}
ATF_TC_BODY(libbpfjit_alu_mod10000_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294843849)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 10000),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 3849);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod7609801_x);
ATF_TC_HEAD(libbpfjit_alu_mod7609801_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_X with X=7609801");
}
ATF_TC_BODY(libbpfjit_alu_mod7609801_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(4294967295)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(7609801)),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(3039531));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_mod80000000_x);
ATF_TC_HEAD(libbpfjit_alu_mod80000000_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_MOD+BPF_X with X=0x80000000");
}
ATF_TC_BODY(libbpfjit_alu_mod80000000_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0xffffffde)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0x80000000)),
BPF_STMT(BPF_ALU+BPF_MOD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(0x7fffffde));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_and_x);
ATF_TC_HEAD(libbpfjit_alu_and_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_AND+BPF_X");
}
ATF_TC_BODY(libbpfjit_alu_and_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdead),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0xbeef),
BPF_STMT(BPF_ALU+BPF_AND+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == (0xdead&0xbeef));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_or_x);
ATF_TC_HEAD(libbpfjit_alu_or_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_OR+BPF_X");
}
ATF_TC_BODY(libbpfjit_alu_or_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdead0000),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0x0000beef),
BPF_STMT(BPF_ALU+BPF_OR+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xdeadbeef);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_xor_x);
ATF_TC_HEAD(libbpfjit_alu_xor_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_XOR+BPF_X");
}
ATF_TC_BODY(libbpfjit_alu_xor_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdead0f0f),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0x0000b1e0),
BPF_STMT(BPF_ALU+BPF_XOR+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xdeadbeef);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_lsh_x);
ATF_TC_HEAD(libbpfjit_alu_lsh_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_LSH+BPF_X");
}
ATF_TC_BODY(libbpfjit_alu_lsh_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdeadbeef),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 16),
BPF_STMT(BPF_ALU+BPF_LSH+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xbeef0000);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_lsh0_x);
ATF_TC_HEAD(libbpfjit_alu_lsh0_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_LSH+BPF_X with k=0");
}
ATF_TC_BODY(libbpfjit_alu_lsh0_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdeadbeef),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0),
BPF_STMT(BPF_ALU+BPF_LSH+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xdeadbeef);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_rsh_x);
ATF_TC_HEAD(libbpfjit_alu_rsh_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_RSH+BPF_X");
}
ATF_TC_BODY(libbpfjit_alu_rsh_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdeadbeef),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 16),
BPF_STMT(BPF_ALU+BPF_RSH+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0x0000dead);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_rsh0_x);
ATF_TC_HEAD(libbpfjit_alu_rsh0_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_RSH+BPF_X with k=0");
}
ATF_TC_BODY(libbpfjit_alu_rsh0_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 0xdeadbeef),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0),
BPF_STMT(BPF_ALU+BPF_RSH+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0xdeadbeef);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_modulo_x);
ATF_TC_HEAD(libbpfjit_alu_modulo_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of modulo logic of BPF_ALU+BPF_X operations");
}
ATF_TC_BODY(libbpfjit_alu_modulo_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0x7fffff77)),
/* (7FFFFF77 * 0FFFFF77) = 07FFFFB2,F0004951 */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, UINT32_C(0x0fffff77)),
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0),
/* 07FFFFB2,F0004951 << 1 = 0FFFFF65,E00092A2 */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, 1),
BPF_STMT(BPF_ALU+BPF_LSH+BPF_X, 0),
/* 0FFFFF65,E00092A2 + DDDDDDDD = 0FFFFF66,BDDE707F */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, UINT32_C(0xdddddddd)),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
/* 0FFFFF66,BDDE707F - FFFFFFFF = 0FFFFF65,BDDE7080 */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, UINT32_C(0xffffffff)),
BPF_STMT(BPF_ALU+BPF_SUB+BPF_X, 0),
/* 0FFFFF65,BDDE7080 | 0000030C = 0FFFFF65,BDDE738C */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, UINT32_C(0x0000030c)),
BPF_STMT(BPF_ALU+BPF_OR+BPF_X, 0),
/* -0FFFFF65,BDDE738C mod(2^64) = F000009A,42218C74 */
BPF_STMT(BPF_ALU+BPF_NEG, 0),
/* F000009A,42218C74 & FFFFFF0F = F000009A,42218C04 */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, UINT32_C(0xffffff0f)),
BPF_STMT(BPF_ALU+BPF_AND+BPF_X, 0),
/* F000009A,42218C74 >> 3 = 1E000013,48443180 */
/* 00000000,42218C74 >> 3 = 00000000,08443180 */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, 3),
BPF_STMT(BPF_ALU+BPF_RSH+BPF_X, 0),
/* 00000000,08443180 * 7FFFFF77 = 042218BB,93818280 */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, UINT32_C(0x7fffff77)),
BPF_STMT(BPF_ALU+BPF_MUL+BPF_X, 0),
/* 042218BB,93818280 / DEAD = 000004C0,71CBBBC3 */
/* 00000000,93818280 / DEAD = 00000000,0000A994 */
BPF_STMT(BPF_LDX+BPF_W+BPF_K, UINT32_C(0xdead)),
BPF_STMT(BPF_ALU+BPF_DIV+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) != UINT32_C(0x71cbbbc3));
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_C(0x0000a994));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_alu_neg);
ATF_TC_HEAD(libbpfjit_alu_neg, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ALU+BPF_NEG");
}
ATF_TC_BODY(libbpfjit_alu_neg, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 777),
BPF_STMT(BPF_ALU+BPF_NEG, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0u-777u);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_ja);
ATF_TC_HEAD(libbpfjit_jmp_ja, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JA");
}
ATF_TC_BODY(libbpfjit_jmp_ja, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_JMP+BPF_JA, 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_RET+BPF_K, 3),
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_ja_invalid);
ATF_TC_HEAD(libbpfjit_jmp_ja_invalid, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test BPF_JMP+BPF_JA to invalid destination");
}
ATF_TC_BODY(libbpfjit_jmp_ja_invalid, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_JMP+BPF_JA, 4),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_RET+BPF_K, 3),
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(!bpf_validate(insns, insn_count));
ATF_CHECK(bpfjit_generate_code(NULL, insns, insn_count) == NULL);
}
ATF_TC(libbpfjit_jmp_ja_overflow);
ATF_TC_HEAD(libbpfjit_jmp_ja_overflow, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test BPF_JMP+BPF_JA with negative offset");
}
ATF_TC_BODY(libbpfjit_jmp_ja_overflow, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_JMP+BPF_JA, 1),
BPF_STMT(BPF_RET+BPF_K, 777),
BPF_STMT(BPF_JMP+BPF_JA, UINT32_MAX - 1), // -2
BPF_STMT(BPF_RET+BPF_K, 0)
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
/* Jumps with negative offsets work in userspace ... */
ATF_CHECK(bpf_validate(insns, insn_count));
/* .. but not for bpfjit. */
ATF_CHECK(bpfjit_generate_code(NULL, insns, insn_count) == NULL);
}
ATF_TC(libbpfjit_jmp_jgt_k);
ATF_TC_HEAD(libbpfjit_jmp_jgt_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JGT+BPF_K");
}
ATF_TC_BODY(libbpfjit_jmp_jgt_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, 7, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, 2, 2, 0),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, 9, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, 4, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, 6, 2, 3),
BPF_STMT(BPF_RET+BPF_K, 3),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, 5, 3, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, 0, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, 8)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 1);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 7);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 7);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 7);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 8);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 5);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jge_k);
ATF_TC_HEAD(libbpfjit_jmp_jge_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JGE+BPF_K");
}
ATF_TC_BODY(libbpfjit_jmp_jge_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, 8, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, 3, 2, 0),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, 9, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, 5, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, 7, 2, 3),
BPF_STMT(BPF_RET+BPF_K, 3),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, 6, 3, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, 1, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, 8)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 1);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 7);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 7);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 7);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 8);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 5);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jeq_k);
ATF_TC_HEAD(libbpfjit_jmp_jeq_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JEQ+BPF_K");
}
ATF_TC_BODY(libbpfjit_jmp_jeq_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 8, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 3, 1, 0),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 9, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 5, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 7, 2, 3),
BPF_STMT(BPF_RET+BPF_K, 3),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 6, 3, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 1, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, 8)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 7);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 7);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 1);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 7);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 7);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 8);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 5);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jset_k);
ATF_TC_HEAD(libbpfjit_jmp_jset_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JSET+BPF_K");
}
ATF_TC_BODY(libbpfjit_jmp_jset_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 8, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 4, 2, 0),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 3, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 2, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 1, 2, 3),
BPF_STMT(BPF_RET+BPF_K, 3),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 2, 3, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 7, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, 8)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 1);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 1);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 7);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 5);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 8);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 5);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_modulo_k);
ATF_TC_HEAD(libbpfjit_jmp_modulo_k, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of modulo logic of BPF_JMP+BPF_K operations");
}
ATF_TC_BODY(libbpfjit_jmp_modulo_k, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0x7fffff77)),
BPF_STMT(BPF_ALU+BPF_LSH+BPF_K, 4),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, UINT32_C(0xfffff770), 1, 0),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, UINT32_C(0xfffff770), 0, 1),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, UINT32_C(0xfffff771), 0, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, UINT32_C(0xfffff770), 0, 3),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, UINT32_C(0xfffff770), 2, 0),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, UINT32_C(0xfffff771), 1, 0),
BPF_STMT(BPF_JMP+BPF_JA, 1),
BPF_STMT(BPF_RET+BPF_K, 3),
/* FFFFF770+FFFFF770 = 00000001,FFFFEEE0 */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, UINT32_C(0xfffff770)),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, UINT32_C(0xffffeee0), 1, 0),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, UINT32_C(0xffffeee0), 0, 1),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, UINT32_C(0xffffeee1), 0, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, UINT32_C(0xffffeee0), 0, 3),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, UINT32_C(0xffffeee0), 2, 0),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, UINT32_C(0xffffeee1), 1, 0),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 7)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jgt_x);
ATF_TC_HEAD(libbpfjit_jmp_jgt_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JGT+BPF_X");
}
ATF_TC_BODY(libbpfjit_jmp_jgt_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 7),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 2),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 3, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 9),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 4),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 6),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 2, 3),
BPF_STMT(BPF_RET+BPF_K, 3),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 5),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 4, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, 8)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 1);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 7);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 7);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 7);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 8);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 5);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jge_x);
ATF_TC_HEAD(libbpfjit_jmp_jge_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JGE+BPF_X");
}
ATF_TC_BODY(libbpfjit_jmp_jge_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 8),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 3),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 3, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 9),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 5),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 7),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 2, 3),
BPF_STMT(BPF_RET+BPF_K, 3),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 6),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 4, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, 8)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 1);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 7);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 7);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 7);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 8);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 5);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jeq_x);
ATF_TC_HEAD(libbpfjit_jmp_jeq_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JEQ+BPF_X");
}
ATF_TC_BODY(libbpfjit_jmp_jeq_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 8),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 3),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 2, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 9),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 5),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 3),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 7),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 2, 3),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 6),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 3, 1),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 1, 0),
BPF_STMT(BPF_RET+BPF_K, 8),
BPF_STMT(BPF_RET+BPF_K, 9)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 8);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 8);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 2);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 8);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 3);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 9);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 6);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 1);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jset_x);
ATF_TC_HEAD(libbpfjit_jmp_jset_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_JMP+BPF_JSET+BPF_X");
}
ATF_TC_BODY(libbpfjit_jmp_jset_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 8),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 4),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_X, 0, 2, 0),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_X, 3, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 2),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_X, 0, 1, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 1),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_X, 0, 2, 3),
BPF_STMT(BPF_RET+BPF_K, 3),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 2),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_X, 0, 4, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 7),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_X, 0, 0, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, 8)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 1);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 1);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 7);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 5);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 8);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 5);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jeq_x_noinit_ax);
ATF_TC_HEAD(libbpfjit_jmp_jeq_x_noinit_ax, tc)
{
atf_tc_set_md_var(tc, "descr", "Test JIT compilation "
"of BPF_JMP+BPF_EQ+BPF_X with uninitialised A and X");
}
ATF_TC_BODY(libbpfjit_jmp_jeq_x_noinit_ax, tc)
{
static struct bpf_insn insns[] = {
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 10),
BPF_STMT(BPF_RET+BPF_K, 11)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 10);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jeq_x_noinit_a);
ATF_TC_HEAD(libbpfjit_jmp_jeq_x_noinit_a, tc)
{
atf_tc_set_md_var(tc, "descr", "Test JIT compilation "
"of BPF_JMP+BPF_EQ+BPF_X with uninitialised A");
}
ATF_TC_BODY(libbpfjit_jmp_jeq_x_noinit_a, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_LEN, 0), /* X > 0 */
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 10),
BPF_STMT(BPF_RET+BPF_K, 11)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 11);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_jeq_x_noinit_x);
ATF_TC_HEAD(libbpfjit_jmp_jeq_x_noinit_x, tc)
{
atf_tc_set_md_var(tc, "descr", "Test JIT compilation "
"of BPF_JMP+BPF_EQ+BPF_X with uninitialised X");
}
ATF_TC_BODY(libbpfjit_jmp_jeq_x_noinit_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_LEN, 0), /* A > 0 */
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 10),
BPF_STMT(BPF_RET+BPF_K, 11)
};
bpfjit_func_t code;
uint8_t pkt[8]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 11);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_jmp_modulo_x);
ATF_TC_HEAD(libbpfjit_jmp_modulo_x, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of modulo logic of BPF_JMP+BPF_X operations");
}
ATF_TC_BODY(libbpfjit_jmp_modulo_x, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_C(0x7fffff77)),
/* FFFFF770 << 4 = FFFFF770 */
BPF_STMT(BPF_ALU+BPF_LSH+BPF_K, 4),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0xfffff770)),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 1, 0),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0xfffff771)),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0xfffff770)),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 0, 4),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 3, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0xfffff771)),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 1, 0),
BPF_STMT(BPF_JMP+BPF_JA, 1),
BPF_STMT(BPF_RET+BPF_K, 3),
/* FFFFF770+FFFFF770 = 00000001,FFFFEEE0 */
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, UINT32_C(0xfffff770)),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0xffffeee0)),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 1, 0),
BPF_STMT(BPF_RET+BPF_K, 4),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 5),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0xffffeee1)),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 6),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0xffffeee0)),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 0, 4),
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_X, 0, 3, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_C(0xffffeee1)),
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_X, 0, 1, 0),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 7)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ld_abs);
ATF_TC_HEAD(libbpfjit_ld_abs, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LD+BPF_ABS");
}
ATF_TC_BODY(libbpfjit_ld_abs, tc)
{
static struct bpf_insn insns[3][2] = {
{
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 5),
BPF_STMT(BPF_RET+BPF_A, 0)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 5),
BPF_STMT(BPF_RET+BPF_A, 0)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 5),
BPF_STMT(BPF_RET+BPF_A, 0)
}
};
static size_t lengths[3] = { 1, 2, 4 };
static unsigned int expected[3] = { 0xde, 0xdead, 0xdeadbeef };
size_t i, l;
uint8_t *pkt = deadbeef_at_5;
size_t pktsize = sizeof(deadbeef_at_5);
size_t insn_count = sizeof(insns[0]) / sizeof(insns[0][0]);
for (i = 0; i < 3; i++) {
bpfjit_func_t code;
ATF_CHECK(bpf_validate(insns[i], insn_count));
code = bpfjit_generate_code(NULL, insns[i], insn_count);
ATF_REQUIRE(code != NULL);
for (l = 1; l < 5 + lengths[i]; l++) {
ATF_CHECK(jitcall(code, pkt, l, l) == 0);
ATF_CHECK(jitcall(code, pkt, pktsize, l) == 0);
}
l = 5 + lengths[i];
ATF_CHECK(jitcall(code, pkt, l, l) == expected[i]);
ATF_CHECK(jitcall(code, pkt, pktsize, l) == expected[i]);
l = pktsize;
ATF_CHECK(jitcall(code, pkt, l, l) == expected[i]);
bpfjit_free_code(code);
}
}
ATF_TC(libbpfjit_ld_abs_k_overflow);
ATF_TC_HEAD(libbpfjit_ld_abs_k_overflow, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LD+BPF_ABS with overflow in k+4");
}
ATF_TC_BODY(libbpfjit_ld_abs_k_overflow, tc)
{
static struct bpf_insn insns[12][3] = {
{
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, UINT32_MAX),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, UINT32_MAX - 1),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, UINT32_MAX),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, UINT32_MAX - 1),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, UINT32_MAX - 2),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, UINT32_MAX - 3),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, UINT32_MAX - 1),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, UINT32_MAX - 1),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, UINT32_MAX - 2),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, UINT32_MAX - 3),
BPF_STMT(BPF_RET+BPF_K, 1)
}
};
int i;
uint8_t pkt[8] = { 0 };
size_t insn_count = sizeof(insns[0]) / sizeof(insns[0][0]);
for (i = 0; i < 3; i++) {
bpfjit_func_t code;
ATF_CHECK(bpf_validate(insns[i], insn_count));
code = bpfjit_generate_code(NULL, insns[i], insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
}
ATF_TC(libbpfjit_ld_ind);
ATF_TC_HEAD(libbpfjit_ld_ind, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LD+BPF_IND");
}
ATF_TC_BODY(libbpfjit_ld_ind, tc)
{
static struct bpf_insn insns[6][3] = {
{
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 3),
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 2),
BPF_STMT(BPF_RET+BPF_A, 0)
},
{
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 3),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 2),
BPF_STMT(BPF_RET+BPF_A, 0)
},
{
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 3),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 2),
BPF_STMT(BPF_RET+BPF_A, 0)
},
{
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 5),
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
},
{
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 5),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
},
{
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 5),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
}
};
static size_t lengths[6] = { 1, 2, 4, 1, 2, 4 };
static unsigned int expected[6] = {
0xde, 0xdead, 0xdeadbeef,
0xde, 0xdead, 0xdeadbeef
};
size_t i, l;
uint8_t *pkt = deadbeef_at_5;
size_t pktsize = sizeof(deadbeef_at_5);
size_t insn_count = sizeof(insns[0]) / sizeof(insns[0][0]);
for (i = 0; i < 3; i++) {
bpfjit_func_t code;
ATF_CHECK(bpf_validate(insns[i], insn_count));
code = bpfjit_generate_code(NULL, insns[i], insn_count);
ATF_REQUIRE(code != NULL);
for (l = 1; l < 5 + lengths[i]; l++) {
ATF_CHECK(jitcall(code, pkt, l, l) == 0);
ATF_CHECK(jitcall(code, pkt, pktsize, l) == 0);
}
l = 5 + lengths[i];
ATF_CHECK(jitcall(code, pkt, l, l) == expected[i]);
ATF_CHECK(jitcall(code, pkt, pktsize, l) == expected[i]);
l = pktsize;
ATF_CHECK(jitcall(code, pkt, l, l) == expected[i]);
bpfjit_free_code(code);
}
}
ATF_TC(libbpfjit_ld_ind_k_overflow);
ATF_TC_HEAD(libbpfjit_ld_ind_k_overflow, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LD+BPF_IND with overflow in k+4");
}
ATF_TC_BODY(libbpfjit_ld_ind_k_overflow, tc)
{
static struct bpf_insn insns[12][3] = {
{
BPF_STMT(BPF_LD+BPF_H+BPF_IND, UINT32_MAX),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_IND, UINT32_MAX - 1),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_IND, UINT32_MAX),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_IND, UINT32_MAX - 1),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_IND, UINT32_MAX - 2),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_W+BPF_IND, UINT32_MAX - 3),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, UINT32_MAX - 1),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, UINT32_MAX - 1),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, UINT32_MAX - 2),
BPF_STMT(BPF_RET+BPF_K, 1)
},
{
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 7),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, UINT32_MAX - 3),
BPF_STMT(BPF_RET+BPF_K, 1)
}
};
int i;
uint8_t pkt[8] = { 0 };
size_t insn_count = sizeof(insns[0]) / sizeof(insns[0][0]);
for (i = 0; i < 3; i++) {
bpfjit_func_t code;
ATF_CHECK(bpf_validate(insns[i], insn_count));
code = bpfjit_generate_code(NULL, insns[i], insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
bpfjit_free_code(code);
}
}
ATF_TC(libbpfjit_ld_ind_x_overflow1);
ATF_TC_HEAD(libbpfjit_ld_ind_x_overflow1, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LD+BPF_IND with overflow in X+4");
}
ATF_TC_BODY(libbpfjit_ld_ind_x_overflow1, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_LEN, 0),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, UINT32_C(0xffffffff)),
BPF_STMT(BPF_MISC+BPF_TAX, 0),
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
size_t i;
bpfjit_func_t code;
uint8_t pkt[8] = { 10, 20, 30, 40, 50, 60, 70, 80 };
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 1; i <= sizeof(pkt); i++) {
ATF_CHECK(bpf_filter(insns, pkt, i, i) == 10 * i);
ATF_CHECK(jitcall(code, pkt, i, i) == 10 * i);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ld_ind_x_overflow2);
ATF_TC_HEAD(libbpfjit_ld_ind_x_overflow2, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LD+BPF_IND with overflow in X+4");
}
ATF_TC_BODY(libbpfjit_ld_ind_x_overflow2, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_LEN, 0),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, UINT32_C(0xffffffff)),
BPF_STMT(BPF_ST, 3),
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 3),
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
size_t i;
bpfjit_func_t code;
uint8_t pkt[8] = { 10, 20, 30, 40, 50, 60, 70, 80 };
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 1; i <= sizeof(pkt); i++) {
ATF_CHECK(bpf_filter(insns, pkt, i, i) == 10 * i);
ATF_CHECK(jitcall(code, pkt, i, i) == 10 * i);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ld_len);
ATF_TC_HEAD(libbpfjit_ld_len, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LD+BPF_W+BPF_LEN");
}
ATF_TC_BODY(libbpfjit_ld_len, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
size_t i;
bpfjit_func_t code;
uint8_t pkt[32]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 0; i < sizeof(pkt); i++)
ATF_CHECK(jitcall(code, pkt, i, 1) == i);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ld_imm);
ATF_TC_HEAD(libbpfjit_ld_imm, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LD+BPF_IMM");
}
ATF_TC_BODY(libbpfjit_ld_imm, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ldx_imm1);
ATF_TC_HEAD(libbpfjit_ldx_imm1, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LDX+BPF_IMM");
}
ATF_TC_BODY(libbpfjit_ldx_imm1, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, UINT32_MAX - 5),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX - 5);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ldx_imm2);
ATF_TC_HEAD(libbpfjit_ldx_imm2, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LDX+BPF_IMM");
}
ATF_TC_BODY(libbpfjit_ldx_imm2, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 5),
BPF_STMT(BPF_LD+BPF_IMM, 5),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 1, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ldx_len1);
ATF_TC_HEAD(libbpfjit_ldx_len1, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LDX+BPF_LEN");
}
ATF_TC_BODY(libbpfjit_ldx_len1, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
size_t i;
bpfjit_func_t code;
uint8_t pkt[5]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 1; i < sizeof(pkt); i++) {
ATF_CHECK(jitcall(code, pkt, i, 1) == i);
ATF_CHECK(jitcall(code, pkt, i + 1, i) == i + 1);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ldx_len2);
ATF_TC_HEAD(libbpfjit_ldx_len2, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LDX+BPF_LEN");
}
ATF_TC_BODY(libbpfjit_ldx_len2, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_LD+BPF_IMM, 5),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_X, 0, 1, 0),
BPF_STMT(BPF_RET+BPF_K, 7),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX)
};
bpfjit_func_t code;
uint8_t pkt[5]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 5, 1) == UINT32_MAX);
ATF_CHECK(jitcall(code, pkt, 6, 5) == 7);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_ldx_msh);
ATF_TC_HEAD(libbpfjit_ldx_msh, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_LDX+BPF_MSH");
}
ATF_TC_BODY(libbpfjit_ldx_msh, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[2] = { 0, 0x7a };
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 40);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_misc_tax);
ATF_TC_HEAD(libbpfjit_misc_tax, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_MISC+BPF_TAX");
}
ATF_TC_BODY(libbpfjit_misc_tax, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_IMM, 3),
BPF_STMT(BPF_MISC+BPF_TAX, 0),
BPF_STMT(BPF_LD+BPF_B+BPF_IND, 2),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[] = { 0, 11, 22, 33, 44, 55 };
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, sizeof(pkt), sizeof(pkt)) == 55);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_misc_txa);
ATF_TC_HEAD(libbpfjit_misc_txa, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_MISC+BPF_TXA");
}
ATF_TC_BODY(libbpfjit_misc_txa, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 391),
BPF_STMT(BPF_MISC+BPF_TXA, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 391);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_st1);
ATF_TC_HEAD(libbpfjit_st1, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ST");
}
ATF_TC_BODY(libbpfjit_st1, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_ST, 0),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 1),
BPF_STMT(BPF_LD+BPF_MEM, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
size_t i;
bpfjit_func_t code;
uint8_t pkt[16]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 1; i <= sizeof(pkt); i++)
ATF_CHECK(jitcall(code, pkt, i, sizeof(pkt)) == i);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_st2);
ATF_TC_HEAD(libbpfjit_st2, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ST");
}
ATF_TC_BODY(libbpfjit_st2, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_ST, BPF_MEMWORDS-1),
BPF_STMT(BPF_LD+BPF_MEM, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_st3);
ATF_TC_HEAD(libbpfjit_st3, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ST");
}
ATF_TC_BODY(libbpfjit_st3, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_ST, 0),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 100),
BPF_STMT(BPF_ST, BPF_MEMWORDS-1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 200),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 301, 2, 0),
BPF_STMT(BPF_LD+BPF_MEM, BPF_MEMWORDS-1),
BPF_STMT(BPF_RET+BPF_A, 0),
BPF_STMT(BPF_LD+BPF_MEM, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[2]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_REQUIRE(BPF_MEMWORDS > 1);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 102);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_st4);
ATF_TC_HEAD(libbpfjit_st4, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ST");
}
ATF_TC_BODY(libbpfjit_st4, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_ST, 5),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 100),
BPF_STMT(BPF_ST, BPF_MEMWORDS-1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_K, 200),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 301, 2, 0),
BPF_STMT(BPF_LD+BPF_MEM, BPF_MEMWORDS-1),
BPF_STMT(BPF_RET+BPF_A, 0),
BPF_STMT(BPF_LD+BPF_MEM, 5),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[2]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_REQUIRE(BPF_MEMWORDS > 6);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 1);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 102);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_st5);
ATF_TC_HEAD(libbpfjit_st5, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_ST");
}
ATF_TC_BODY(libbpfjit_st5, tc)
{
struct bpf_insn insns[5*BPF_MEMWORDS+2];
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
size_t k;
bpfjit_func_t code;
uint8_t pkt[BPF_MEMWORDS]; /* the program doesn't read any data */
memset(insns, 0, sizeof(insns));
/* for each k do M[k] = k */
for (k = 0; k < BPF_MEMWORDS; k++) {
insns[2*k].code = BPF_LD+BPF_IMM;
insns[2*k].k = 3*k;
insns[2*k+1].code = BPF_ST;
insns[2*k+1].k = k;
}
/* load wirelen into A */
insns[2*BPF_MEMWORDS].code = BPF_LD+BPF_W+BPF_LEN;
/* for each k, if (A == k + 1) return M[k] */
for (k = 0; k < BPF_MEMWORDS; k++) {
insns[2*BPF_MEMWORDS+3*k+1].code = BPF_JMP+BPF_JEQ+BPF_K;
insns[2*BPF_MEMWORDS+3*k+1].k = k+1;
insns[2*BPF_MEMWORDS+3*k+1].jt = 0;
insns[2*BPF_MEMWORDS+3*k+1].jf = 2;
insns[2*BPF_MEMWORDS+3*k+2].code = BPF_LD+BPF_MEM;
insns[2*BPF_MEMWORDS+3*k+2].k = k;
insns[2*BPF_MEMWORDS+3*k+3].code = BPF_RET+BPF_A;
insns[2*BPF_MEMWORDS+3*k+3].k = 0;
}
insns[5*BPF_MEMWORDS+1].code = BPF_RET+BPF_K;
insns[5*BPF_MEMWORDS+1].k = UINT32_MAX;
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (k = 1; k <= sizeof(pkt); k++)
ATF_CHECK(jitcall(code, pkt, k, k) == 3*(k-1));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_stx1);
ATF_TC_HEAD(libbpfjit_stx1, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_STX");
}
ATF_TC_BODY(libbpfjit_stx1, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_STX, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
size_t i;
bpfjit_func_t code;
uint8_t pkt[16]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 1; i <= sizeof(pkt); i++)
ATF_CHECK(jitcall(code, pkt, i, sizeof(pkt)) == i);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_stx2);
ATF_TC_HEAD(libbpfjit_stx2, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_STX");
}
ATF_TC_BODY(libbpfjit_stx2, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_STX, BPF_MEMWORDS-1),
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 0),
BPF_STMT(BPF_MISC+BPF_TXA, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_stx3);
ATF_TC_HEAD(libbpfjit_stx3, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_STX");
}
ATF_TC_BODY(libbpfjit_stx3, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_LEN, 0),
BPF_STMT(BPF_STX, 5),
BPF_STMT(BPF_STX, 2),
BPF_STMT(BPF_STX, 3),
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 1),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 2),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 3),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 5),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_LDX+BPF_W+BPF_MEM, 6),
BPF_STMT(BPF_ALU+BPF_ADD+BPF_X, 0),
BPF_STMT(BPF_RET+BPF_A, 0)
};
size_t i;
bpfjit_func_t code;
uint8_t pkt[16]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 1; i <= sizeof(pkt); i++)
ATF_CHECK(jitcall(code, pkt, i, sizeof(pkt)) == 3 * i);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_stx4);
ATF_TC_HEAD(libbpfjit_stx4, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation of BPF_STX");
}
ATF_TC_BODY(libbpfjit_stx4, tc)
{
struct bpf_insn insns[5*BPF_MEMWORDS+2];
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
size_t k;
bpfjit_func_t code;
uint8_t pkt[BPF_MEMWORDS]; /* the program doesn't read any data */
memset(insns, 0, sizeof(insns));
/* for each k do M[k] = k */
for (k = 0; k < BPF_MEMWORDS; k++) {
insns[2*k].code = BPF_LDX+BPF_W+BPF_IMM;
insns[2*k].k = 3*k;
insns[2*k+1].code = BPF_STX;
insns[2*k+1].k = k;
}
/* load wirelen into A */
insns[2*BPF_MEMWORDS].code = BPF_LD+BPF_W+BPF_LEN;
/* for each k, if (A == k + 1) return M[k] */
for (k = 0; k < BPF_MEMWORDS; k++) {
insns[2*BPF_MEMWORDS+3*k+1].code = BPF_JMP+BPF_JEQ+BPF_K;
insns[2*BPF_MEMWORDS+3*k+1].k = k+1;
insns[2*BPF_MEMWORDS+3*k+1].jt = 0;
insns[2*BPF_MEMWORDS+3*k+1].jf = 2;
insns[2*BPF_MEMWORDS+3*k+2].code = BPF_LD+BPF_MEM;
insns[2*BPF_MEMWORDS+3*k+2].k = k;
insns[2*BPF_MEMWORDS+3*k+3].code = BPF_RET+BPF_A;
insns[2*BPF_MEMWORDS+3*k+3].k = 0;
}
insns[5*BPF_MEMWORDS+1].code = BPF_RET+BPF_K;
insns[5*BPF_MEMWORDS+1].k = UINT32_MAX;
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (k = 1; k <= sizeof(pkt); k++)
ATF_CHECK(jitcall(code, pkt, k, k) == 3*(k-1));
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_opt_ld_abs_1);
ATF_TC_HEAD(libbpfjit_opt_ld_abs_1, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation with length optimization "
"applied to BPF_LD+BPF_ABS");
}
ATF_TC_BODY(libbpfjit_opt_ld_abs_1, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x800, 0, 8),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 26),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 3, 4),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 3),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
size_t i, j;
bpfjit_func_t code;
uint8_t pkt[2][34] = {
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x0f,
0x80, 0x03, 0x70, 0x23
},
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x23,
0x80, 0x03, 0x70, 0x0f
}
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 0; i < 2; i++) {
for (j = 1; j < sizeof(pkt[i]); j++)
ATF_CHECK(jitcall(code, pkt[i], j, j) == 0);
ATF_CHECK(jitcall(code, pkt[i], j, j) == UINT32_MAX);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_opt_ld_abs_2);
ATF_TC_HEAD(libbpfjit_opt_ld_abs_2, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation with length optimization "
"applied to BPF_LD+BPF_ABS");
}
ATF_TC_BODY(libbpfjit_opt_ld_abs_2, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 26),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 3, 6),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 5),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 3),
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x800, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
size_t i, j;
bpfjit_func_t code;
uint8_t pkt[2][34] = {
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x0f,
0x80, 0x03, 0x70, 0x23
},
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x23,
0x80, 0x03, 0x70, 0x0f
}
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 0; i < 2; i++) {
for (j = 1; j < sizeof(pkt[i]); j++)
ATF_CHECK(jitcall(code, pkt[i], j, j) == 0);
ATF_CHECK(jitcall(code, pkt[i], j, j) == UINT32_MAX);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_opt_ld_abs_3);
ATF_TC_HEAD(libbpfjit_opt_ld_abs_3, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation with length optimization "
"applied to BPF_LD+BPF_ABS");
}
ATF_TC_BODY(libbpfjit_opt_ld_abs_3, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 26),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 3, 6),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 5),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 26),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 3),
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x800, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
size_t i, j;
bpfjit_func_t code;
uint8_t pkt[2][34] = {
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x0f,
0x80, 0x03, 0x70, 0x23
},
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x23,
0x80, 0x03, 0x70, 0x0f
}
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 0; i < 2; i++) {
for (j = 1; j < sizeof(pkt[i]); j++)
ATF_CHECK(jitcall(code, pkt[i], j, j) == 0);
ATF_CHECK(jitcall(code, pkt[i], j, j) == UINT32_MAX);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_opt_ld_ind_1);
ATF_TC_HEAD(libbpfjit_opt_ld_ind_1, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation with length optimization "
"applied to BPF_LD+BPF_IND");
}
ATF_TC_BODY(libbpfjit_opt_ld_ind_1, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 12),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 0),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x800, 0, 8),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 14),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 18),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 3, 4),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 3),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 18),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
size_t i, j;
bpfjit_func_t code;
uint8_t pkt[2][34] = {
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x0f,
0x80, 0x03, 0x70, 0x23
},
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x23,
0x80, 0x03, 0x70, 0x0f
}
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 0; i < 2; i++) {
for (j = 1; j < sizeof(pkt[i]); j++)
ATF_CHECK(jitcall(code, pkt[i], j, j) == 0);
ATF_CHECK(jitcall(code, pkt[i], j, j) == UINT32_MAX);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_opt_ld_ind_2);
ATF_TC_HEAD(libbpfjit_opt_ld_ind_2, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation with length optimization "
"applied to BPF_LD+BPF_IND");
}
ATF_TC_BODY(libbpfjit_opt_ld_ind_2, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 26),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 3, 6),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 5),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 3),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x800, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
size_t i, j;
bpfjit_func_t code;
uint8_t pkt[2][34] = {
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x0f,
0x80, 0x03, 0x70, 0x23
},
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x23,
0x80, 0x03, 0x70, 0x0f
}
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 0; i < 2; i++) {
for (j = 1; j < sizeof(pkt[i]); j++)
ATF_CHECK(jitcall(code, pkt[i], j, j) == 0);
ATF_CHECK(jitcall(code, pkt[i], j, j) == UINT32_MAX);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_opt_ld_ind_3);
ATF_TC_HEAD(libbpfjit_opt_ld_ind_3, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation with length optimization "
"applied to BPF_LD+BPF_IND");
}
ATF_TC_BODY(libbpfjit_opt_ld_ind_3, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 15),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 15),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 11),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 3, 7),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 6),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 11),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 4),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x800, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
size_t i, j;
bpfjit_func_t code;
uint8_t pkt[2][34] = {
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x0f,
0x80, 0x03, 0x70, 0x23
},
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x23,
0x80, 0x03, 0x70, 0x0f
}
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 0; i < 2; i++) {
for (j = 1; j < sizeof(pkt[i]); j++)
ATF_CHECK(jitcall(code, pkt[i], j, j) == 0);
ATF_CHECK(jitcall(code, pkt[i], j, j) == UINT32_MAX);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_opt_ld_ind_4);
ATF_TC_HEAD(libbpfjit_opt_ld_ind_4, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test JIT compilation with length optimization "
"applied to BPF_LD+BPF_IND");
}
ATF_TC_BODY(libbpfjit_opt_ld_ind_4, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 11),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 19),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 15),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 3, 7),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 6),
BPF_STMT(BPF_LD+BPF_W+BPF_IND, 15),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 4),
BPF_STMT(BPF_LDX+BPF_W+BPF_IMM, 0),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x800, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
size_t i, j;
bpfjit_func_t code;
uint8_t pkt[2][34] = {
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x0f,
0x80, 0x03, 0x70, 0x23
},
{
0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 0x08, 0x00,
14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25,
0x80, 0x03, 0x70, 0x23,
0x80, 0x03, 0x70, 0x0f
}
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
for (i = 0; i < 2; i++) {
for (j = 1; j < sizeof(pkt[i]); j++)
ATF_CHECK(jitcall(code, pkt[i], j, j) == 0);
ATF_CHECK(jitcall(code, pkt[i], j, j) == UINT32_MAX);
}
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_abc_ja);
ATF_TC_HEAD(libbpfjit_abc_ja, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test ABC optimization with a single BPF_JMP+BPF_JA");
}
ATF_TC_BODY(libbpfjit_abc_ja, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 3), /* min. length 4 */
BPF_STMT(BPF_JMP+BPF_JA, 2),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, UINT32_MAX - 1),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 2), /* min. length 6 */
BPF_STMT(BPF_RET+BPF_A, 0),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 6),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 7),
BPF_STMT(BPF_RET+BPF_K, 3),
};
bpfjit_func_t code;
uint8_t pkt[6] = {0, 0, /* UINT32_MAX: */ 255, 255, 255, 255};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_abc_ja_over);
ATF_TC_HEAD(libbpfjit_abc_ja_over, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test ABC optimization when BPF_JMP+BPF_JA jumps over all loads");
}
ATF_TC_BODY(libbpfjit_abc_ja_over, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_JMP+BPF_JA, 2),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 3),
BPF_STMT(BPF_RET+BPF_K, 0),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 4),
BPF_STMT(BPF_RET+BPF_K, 1),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 5),
BPF_STMT(BPF_RET+BPF_K, 2),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 6),
BPF_STMT(BPF_RET+BPF_K, 3),
};
bpfjit_func_t code;
uint8_t pkt[1]; /* the program doesn't read any data */
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
ATF_CHECK(jitcall(code, pkt, 1, 1) == UINT32_MAX);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_abc_ld_chain);
ATF_TC_HEAD(libbpfjit_abc_ld_chain, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test ABC optimization of a chain of BPF_LD instructions "
"with exits leading to a single BPF_RET");
}
ATF_TC_BODY(libbpfjit_abc_ld_chain, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 3), /* min. length 4 */
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 8, 0, 4),
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 4), /* min. length 6 */
BPF_JUMP(BPF_JMP+BPF_JGE+BPF_K, 7, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 6), /* min. length 10 */
BPF_JUMP(BPF_JMP+BPF_JGT+BPF_K, 6, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 123456789),
BPF_STMT(BPF_RET+BPF_K, 987654321),
};
bpfjit_func_t code;
uint8_t pkt[10] = {};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
/* Packet is too short. */
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
/* !(pkt[3] == 8) => return 123456789 */
ATF_CHECK(jitcall(code, pkt, 4, 4) == 123456789);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 123456789);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 123456789);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 123456789);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 123456789);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 123456789);
/* !(pkt[4:2] >= 7) => too short or return 123456789 */
pkt[3] = 8;
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 123456789);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 123456789);
/* !(pkt[6:4] > 6) => too short or return 987654321 */
pkt[4] = pkt[5] = 1;
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 0);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 0);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 0);
ATF_CHECK(jitcall(code, pkt, 10, 10) == 987654321);
/* (pkt[6:4] > 6) => too short or return 123456789 */
pkt[6] = pkt[7] = pkt[8] = pkt[9] = 1;
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 0);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 0);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 0);
ATF_CHECK(jitcall(code, pkt, 10, 10) == 123456789);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_examples_1);
ATF_TC_HEAD(libbpfjit_examples_1, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test the first example from bpf(4) - "
"accept Reverse ARP requests");
}
ATF_TC_BODY(libbpfjit_examples_1, tc)
{
/*
* The following filter is taken from the Reverse ARP
* Daemon. It accepts only Reverse ARP requests.
*/
struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8035, 0, 3),
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 20),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 3, 0, 1),
BPF_STMT(BPF_RET+BPF_K, 42),
BPF_STMT(BPF_RET+BPF_K, 0),
};
bpfjit_func_t code;
uint8_t pkt[22] = {};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
/* Packet is too short. */
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 0);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 0);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 0);
ATF_CHECK(jitcall(code, pkt, 10, 10) == 0);
ATF_CHECK(jitcall(code, pkt, 11, 11) == 0);
ATF_CHECK(jitcall(code, pkt, 12, 12) == 0);
ATF_CHECK(jitcall(code, pkt, 13, 13) == 0);
ATF_CHECK(jitcall(code, pkt, 14, 14) == 0);
ATF_CHECK(jitcall(code, pkt, 15, 15) == 0);
ATF_CHECK(jitcall(code, pkt, 16, 16) == 0);
ATF_CHECK(jitcall(code, pkt, 17, 17) == 0);
ATF_CHECK(jitcall(code, pkt, 18, 18) == 0);
ATF_CHECK(jitcall(code, pkt, 19, 19) == 0);
ATF_CHECK(jitcall(code, pkt, 20, 20) == 0);
ATF_CHECK(jitcall(code, pkt, 21, 21) == 0);
/* The packet doesn't match. */
ATF_CHECK(jitcall(code, pkt, 22, 22) == 0);
/* Still no match after setting the protocol field. */
pkt[12] = 0x80; pkt[13] = 0x35;
ATF_CHECK(jitcall(code, pkt, 22, 22) == 0);
/* Set RARP message type. */
pkt[21] = 3;
ATF_CHECK(jitcall(code, pkt, 22, 22) == 42);
/* Packet is too short. */
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 0);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 0);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 0);
ATF_CHECK(jitcall(code, pkt, 10, 10) == 0);
ATF_CHECK(jitcall(code, pkt, 11, 11) == 0);
ATF_CHECK(jitcall(code, pkt, 12, 12) == 0);
ATF_CHECK(jitcall(code, pkt, 13, 13) == 0);
ATF_CHECK(jitcall(code, pkt, 14, 14) == 0);
ATF_CHECK(jitcall(code, pkt, 15, 15) == 0);
ATF_CHECK(jitcall(code, pkt, 16, 16) == 0);
ATF_CHECK(jitcall(code, pkt, 17, 17) == 0);
ATF_CHECK(jitcall(code, pkt, 18, 18) == 0);
ATF_CHECK(jitcall(code, pkt, 19, 19) == 0);
ATF_CHECK(jitcall(code, pkt, 20, 20) == 0);
ATF_CHECK(jitcall(code, pkt, 21, 21) == 0);
/* Change RARP message type. */
pkt[20] = 3;
ATF_CHECK(jitcall(code, pkt, 22, 22) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_examples_2);
ATF_TC_HEAD(libbpfjit_examples_2, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test the second example from bpf(4) - "
"accept IP packets between two specified hosts");
}
ATF_TC_BODY(libbpfjit_examples_2, tc)
{
/*
* This filter accepts only IP packets between host 128.3.112.15
* and 128.3.112.35.
*/
static struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x0800, 0, 8),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 26),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 2),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 3, 4),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x80037023, 0, 3),
BPF_STMT(BPF_LD+BPF_W+BPF_ABS, 30),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x8003700f, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
bpfjit_func_t code;
uint8_t pkt[34] = {};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
/* Packet is too short. */
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 0);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 0);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 0);
ATF_CHECK(jitcall(code, pkt, 10, 10) == 0);
ATF_CHECK(jitcall(code, pkt, 11, 11) == 0);
ATF_CHECK(jitcall(code, pkt, 12, 12) == 0);
ATF_CHECK(jitcall(code, pkt, 13, 13) == 0);
ATF_CHECK(jitcall(code, pkt, 14, 14) == 0);
ATF_CHECK(jitcall(code, pkt, 15, 15) == 0);
ATF_CHECK(jitcall(code, pkt, 16, 16) == 0);
ATF_CHECK(jitcall(code, pkt, 17, 17) == 0);
ATF_CHECK(jitcall(code, pkt, 18, 18) == 0);
ATF_CHECK(jitcall(code, pkt, 19, 19) == 0);
ATF_CHECK(jitcall(code, pkt, 20, 20) == 0);
ATF_CHECK(jitcall(code, pkt, 21, 21) == 0);
ATF_CHECK(jitcall(code, pkt, 22, 22) == 0);
ATF_CHECK(jitcall(code, pkt, 23, 23) == 0);
ATF_CHECK(jitcall(code, pkt, 24, 24) == 0);
ATF_CHECK(jitcall(code, pkt, 25, 25) == 0);
ATF_CHECK(jitcall(code, pkt, 26, 26) == 0);
ATF_CHECK(jitcall(code, pkt, 27, 27) == 0);
ATF_CHECK(jitcall(code, pkt, 28, 28) == 0);
ATF_CHECK(jitcall(code, pkt, 29, 29) == 0);
ATF_CHECK(jitcall(code, pkt, 30, 30) == 0);
ATF_CHECK(jitcall(code, pkt, 31, 31) == 0);
ATF_CHECK(jitcall(code, pkt, 32, 32) == 0);
ATF_CHECK(jitcall(code, pkt, 33, 33) == 0);
/* The packet doesn't match. */
ATF_CHECK(jitcall(code, pkt, 34, 34) == 0);
/* Still no match after setting the protocol field. */
pkt[12] = 8;
ATF_CHECK(jitcall(code, pkt, 34, 34) == 0);
pkt[26] = 128; pkt[27] = 3; pkt[28] = 112; pkt[29] = 15;
ATF_CHECK(jitcall(code, pkt, 34, 34) == 0);
pkt[30] = 128; pkt[31] = 3; pkt[32] = 112; pkt[33] = 35;
ATF_CHECK(jitcall(code, pkt, 34, 34) == UINT32_MAX);
/* Swap the ip addresses. */
pkt[26] = 128; pkt[27] = 3; pkt[28] = 112; pkt[29] = 35;
ATF_CHECK(jitcall(code, pkt, 34, 34) == 0);
pkt[30] = 128; pkt[31] = 3; pkt[32] = 112; pkt[33] = 15;
ATF_CHECK(jitcall(code, pkt, 34, 34) == UINT32_MAX);
/* Packet is too short. */
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 0);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 0);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 0);
ATF_CHECK(jitcall(code, pkt, 10, 10) == 0);
ATF_CHECK(jitcall(code, pkt, 11, 11) == 0);
ATF_CHECK(jitcall(code, pkt, 12, 12) == 0);
ATF_CHECK(jitcall(code, pkt, 13, 13) == 0);
ATF_CHECK(jitcall(code, pkt, 14, 14) == 0);
ATF_CHECK(jitcall(code, pkt, 15, 15) == 0);
ATF_CHECK(jitcall(code, pkt, 16, 16) == 0);
ATF_CHECK(jitcall(code, pkt, 17, 17) == 0);
ATF_CHECK(jitcall(code, pkt, 18, 18) == 0);
ATF_CHECK(jitcall(code, pkt, 19, 19) == 0);
ATF_CHECK(jitcall(code, pkt, 20, 20) == 0);
ATF_CHECK(jitcall(code, pkt, 21, 21) == 0);
ATF_CHECK(jitcall(code, pkt, 22, 22) == 0);
ATF_CHECK(jitcall(code, pkt, 23, 23) == 0);
ATF_CHECK(jitcall(code, pkt, 24, 24) == 0);
ATF_CHECK(jitcall(code, pkt, 25, 25) == 0);
ATF_CHECK(jitcall(code, pkt, 26, 26) == 0);
ATF_CHECK(jitcall(code, pkt, 27, 27) == 0);
ATF_CHECK(jitcall(code, pkt, 28, 28) == 0);
ATF_CHECK(jitcall(code, pkt, 29, 29) == 0);
ATF_CHECK(jitcall(code, pkt, 30, 30) == 0);
ATF_CHECK(jitcall(code, pkt, 31, 31) == 0);
ATF_CHECK(jitcall(code, pkt, 32, 32) == 0);
ATF_CHECK(jitcall(code, pkt, 33, 33) == 0);
/* Change the protocol field. */
pkt[13] = 8;
ATF_CHECK(jitcall(code, pkt, 34, 34) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_examples_3);
ATF_TC_HEAD(libbpfjit_examples_3, tc)
{
atf_tc_set_md_var(tc, "descr",
"Test the third example from bpf(4) - "
"accept TCP finger packets");
}
ATF_TC_BODY(libbpfjit_examples_3, tc)
{
/*
* This filter returns only TCP finger packets.
*/
struct bpf_insn insns[] = {
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 12),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 0x0800, 0, 10),
BPF_STMT(BPF_LD+BPF_B+BPF_ABS, 23),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 6, 0, 8),
BPF_STMT(BPF_LD+BPF_H+BPF_ABS, 20),
BPF_JUMP(BPF_JMP+BPF_JSET+BPF_K, 0x1fff, 6, 0),
BPF_STMT(BPF_LDX+BPF_B+BPF_MSH, 14),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 14),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 79, 2, 0),
BPF_STMT(BPF_LD+BPF_H+BPF_IND, 16),
BPF_JUMP(BPF_JMP+BPF_JEQ+BPF_K, 79, 0, 1),
BPF_STMT(BPF_RET+BPF_K, UINT32_MAX),
BPF_STMT(BPF_RET+BPF_K, 0),
};
bpfjit_func_t code;
uint8_t pkt[30] = {};
/* Set IP fragment offset to non-zero. */
pkt[20] = 1; pkt[21] = 1;
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(bpf_validate(insns, insn_count));
code = bpfjit_generate_code(NULL, insns, insn_count);
ATF_REQUIRE(code != NULL);
/* Packet is too short. */
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 0);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 0);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 0);
ATF_CHECK(jitcall(code, pkt, 10, 10) == 0);
ATF_CHECK(jitcall(code, pkt, 11, 11) == 0);
ATF_CHECK(jitcall(code, pkt, 12, 12) == 0);
ATF_CHECK(jitcall(code, pkt, 13, 13) == 0);
ATF_CHECK(jitcall(code, pkt, 14, 14) == 0);
ATF_CHECK(jitcall(code, pkt, 15, 15) == 0);
ATF_CHECK(jitcall(code, pkt, 16, 16) == 0);
ATF_CHECK(jitcall(code, pkt, 17, 17) == 0);
ATF_CHECK(jitcall(code, pkt, 18, 18) == 0);
ATF_CHECK(jitcall(code, pkt, 19, 19) == 0);
ATF_CHECK(jitcall(code, pkt, 20, 20) == 0);
ATF_CHECK(jitcall(code, pkt, 21, 21) == 0);
ATF_CHECK(jitcall(code, pkt, 22, 22) == 0);
ATF_CHECK(jitcall(code, pkt, 23, 23) == 0);
ATF_CHECK(jitcall(code, pkt, 24, 24) == 0);
ATF_CHECK(jitcall(code, pkt, 25, 25) == 0);
ATF_CHECK(jitcall(code, pkt, 26, 26) == 0);
ATF_CHECK(jitcall(code, pkt, 27, 27) == 0);
ATF_CHECK(jitcall(code, pkt, 28, 28) == 0);
ATF_CHECK(jitcall(code, pkt, 29, 29) == 0);
/* The packet doesn't match. */
ATF_CHECK(jitcall(code, pkt, 30, 30) == 0);
/* Still no match after setting the protocol field. */
pkt[12] = 8;
ATF_CHECK(jitcall(code, pkt, 30, 30) == 0);
/* Get one step closer to the match. */
pkt[23] = 6;
ATF_CHECK(jitcall(code, pkt, 30, 30) == 0);
/* Set IP fragment offset to zero. */
pkt[20] = 0x20; pkt[21] = 0;
ATF_CHECK(jitcall(code, pkt, 30, 30) == 0);
/* Set IP header length to 12. */
pkt[14] = 0xd3;
ATF_CHECK(jitcall(code, pkt, 30, 30) == 0);
/* Match one branch of the program. */
pkt[27] = 79;
ATF_CHECK(jitcall(code, pkt, 30, 30) == UINT32_MAX);
/* Match the other branch of the program. */
pkt[29] = 79; pkt[27] = 0;
ATF_CHECK(jitcall(code, pkt, 30, 30) == UINT32_MAX);
/* Packet is too short. */
ATF_CHECK(jitcall(code, pkt, 1, 1) == 0);
ATF_CHECK(jitcall(code, pkt, 2, 2) == 0);
ATF_CHECK(jitcall(code, pkt, 3, 3) == 0);
ATF_CHECK(jitcall(code, pkt, 4, 4) == 0);
ATF_CHECK(jitcall(code, pkt, 5, 5) == 0);
ATF_CHECK(jitcall(code, pkt, 6, 6) == 0);
ATF_CHECK(jitcall(code, pkt, 7, 7) == 0);
ATF_CHECK(jitcall(code, pkt, 8, 8) == 0);
ATF_CHECK(jitcall(code, pkt, 9, 9) == 0);
ATF_CHECK(jitcall(code, pkt, 10, 10) == 0);
ATF_CHECK(jitcall(code, pkt, 11, 11) == 0);
ATF_CHECK(jitcall(code, pkt, 12, 12) == 0);
ATF_CHECK(jitcall(code, pkt, 13, 13) == 0);
ATF_CHECK(jitcall(code, pkt, 14, 14) == 0);
ATF_CHECK(jitcall(code, pkt, 15, 15) == 0);
ATF_CHECK(jitcall(code, pkt, 16, 16) == 0);
ATF_CHECK(jitcall(code, pkt, 17, 17) == 0);
ATF_CHECK(jitcall(code, pkt, 18, 18) == 0);
ATF_CHECK(jitcall(code, pkt, 19, 19) == 0);
ATF_CHECK(jitcall(code, pkt, 20, 20) == 0);
ATF_CHECK(jitcall(code, pkt, 21, 21) == 0);
ATF_CHECK(jitcall(code, pkt, 22, 22) == 0);
ATF_CHECK(jitcall(code, pkt, 23, 23) == 0);
ATF_CHECK(jitcall(code, pkt, 24, 24) == 0);
ATF_CHECK(jitcall(code, pkt, 25, 25) == 0);
ATF_CHECK(jitcall(code, pkt, 26, 26) == 0);
ATF_CHECK(jitcall(code, pkt, 27, 27) == 0);
ATF_CHECK(jitcall(code, pkt, 28, 28) == 0);
ATF_CHECK(jitcall(code, pkt, 29, 29) == 0);
/* Set IP header length to 16. Packet is too short. */
pkt[14] = 4;
ATF_CHECK(jitcall(code, pkt, 30, 30) == 0);
bpfjit_free_code(code);
}
ATF_TC(libbpfjit_cop_no_ctx);
ATF_TC_HEAD(libbpfjit_cop_no_ctx, tc)
{
atf_tc_set_md_var(tc, "descr", "Test that BPF_MISC|BPF_COP "
"instruction can't be accepted without a context");
}
ATF_TC_BODY(libbpfjit_cop_no_ctx, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_MISC+BPF_COP, 0),
BPF_STMT(BPF_RET+BPF_K, 7)
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(!bpf_validate(insns, insn_count));
ATF_CHECK(bpfjit_generate_code(NULL, insns, insn_count) == NULL);
}
ATF_TC(libbpfjit_copx_no_ctx);
ATF_TC_HEAD(libbpfjit_copx_no_ctx, tc)
{
atf_tc_set_md_var(tc, "descr", "Test that BPF_MISC|BPF_COPX "
"instruction can't be accepted without a context");
}
ATF_TC_BODY(libbpfjit_copx_no_ctx, tc)
{
static struct bpf_insn insns[] = {
BPF_STMT(BPF_MISC+BPF_COPX, 0),
BPF_STMT(BPF_RET+BPF_K, 7)
};
size_t insn_count = sizeof(insns) / sizeof(insns[0]);
ATF_CHECK(!bpf_validate(insns, insn_count));
ATF_CHECK(bpfjit_generate_code(NULL, insns, insn_count) == NULL);
}
ATF_TP_ADD_TCS(tp)
{
/*
* For every new test please also add a similar test
* to ../../net/bpfjit/t_bpfjit.c
*/
ATF_TP_ADD_TC(tp, libbpfjit_empty);
ATF_TP_ADD_TC(tp, libbpfjit_ret_k);
ATF_TP_ADD_TC(tp, libbpfjit_bad_ret_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_add_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_sub_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mul_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div0_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div1_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div2_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div4_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div10_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div10000_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div7609801_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div80000000_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod0_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod1_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod2_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod4_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod10_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod10000_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod7609801_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod80000000_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_and_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_or_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_xor_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_lsh_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_lsh0_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_rsh_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_rsh0_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_modulo_k);
ATF_TP_ADD_TC(tp, libbpfjit_alu_add_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_sub_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mul_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div0_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div1_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div2_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div4_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div10_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div10000_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div7609801_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_div80000000_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod0_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod1_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod2_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod4_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod10_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod10000_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod7609801_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_mod80000000_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_and_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_or_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_xor_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_lsh_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_lsh0_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_rsh_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_rsh0_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_modulo_x);
ATF_TP_ADD_TC(tp, libbpfjit_alu_neg);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_ja);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_ja_invalid);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_ja_overflow);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jgt_k);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jge_k);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jeq_k);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jset_k);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_modulo_k);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jgt_x);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jge_x);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jeq_x);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jset_x);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jeq_x_noinit_ax);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jeq_x_noinit_a);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_jeq_x_noinit_x);
ATF_TP_ADD_TC(tp, libbpfjit_jmp_modulo_x);
ATF_TP_ADD_TC(tp, libbpfjit_ld_abs);
ATF_TP_ADD_TC(tp, libbpfjit_ld_abs_k_overflow);
ATF_TP_ADD_TC(tp, libbpfjit_ld_ind);
ATF_TP_ADD_TC(tp, libbpfjit_ld_ind_k_overflow);
ATF_TP_ADD_TC(tp, libbpfjit_ld_ind_x_overflow1);
ATF_TP_ADD_TC(tp, libbpfjit_ld_ind_x_overflow2);
ATF_TP_ADD_TC(tp, libbpfjit_ld_len);
ATF_TP_ADD_TC(tp, libbpfjit_ld_imm);
ATF_TP_ADD_TC(tp, libbpfjit_ldx_imm1);
ATF_TP_ADD_TC(tp, libbpfjit_ldx_imm2);
ATF_TP_ADD_TC(tp, libbpfjit_ldx_len1);
ATF_TP_ADD_TC(tp, libbpfjit_ldx_len2);
ATF_TP_ADD_TC(tp, libbpfjit_ldx_msh);
ATF_TP_ADD_TC(tp, libbpfjit_misc_tax);
ATF_TP_ADD_TC(tp, libbpfjit_misc_txa);
ATF_TP_ADD_TC(tp, libbpfjit_st1);
ATF_TP_ADD_TC(tp, libbpfjit_st2);
ATF_TP_ADD_TC(tp, libbpfjit_st3);
ATF_TP_ADD_TC(tp, libbpfjit_st4);
ATF_TP_ADD_TC(tp, libbpfjit_st5);
ATF_TP_ADD_TC(tp, libbpfjit_stx1);
ATF_TP_ADD_TC(tp, libbpfjit_stx2);
ATF_TP_ADD_TC(tp, libbpfjit_stx3);
ATF_TP_ADD_TC(tp, libbpfjit_stx4);
ATF_TP_ADD_TC(tp, libbpfjit_opt_ld_abs_1);
ATF_TP_ADD_TC(tp, libbpfjit_opt_ld_abs_2);
ATF_TP_ADD_TC(tp, libbpfjit_opt_ld_abs_3);
ATF_TP_ADD_TC(tp, libbpfjit_opt_ld_ind_1);
ATF_TP_ADD_TC(tp, libbpfjit_opt_ld_ind_2);
ATF_TP_ADD_TC(tp, libbpfjit_opt_ld_ind_3);
ATF_TP_ADD_TC(tp, libbpfjit_opt_ld_ind_4);
ATF_TP_ADD_TC(tp, libbpfjit_abc_ja);
ATF_TP_ADD_TC(tp, libbpfjit_abc_ja_over);
ATF_TP_ADD_TC(tp, libbpfjit_abc_ld_chain);
ATF_TP_ADD_TC(tp, libbpfjit_examples_1);
ATF_TP_ADD_TC(tp, libbpfjit_examples_2);
ATF_TP_ADD_TC(tp, libbpfjit_examples_3);
ATF_TP_ADD_TC(tp, libbpfjit_cop_no_ctx);
ATF_TP_ADD_TC(tp, libbpfjit_copx_no_ctx);
return atf_no_error();
}