178 lines
5.3 KiB
Rust
178 lines
5.3 KiB
Rust
// SPDX-License-Identifier: (Apache-2.0 OR MIT)
|
|
// Converted from the tests for uBPF <https://github.com/iovisor/ubpf>
|
|
// Copyright 2015 Big Switch Networks, Inc
|
|
// Copyright 2016 6WIND S.A. <quentin.monnet@6wind.com>
|
|
|
|
// The tests contained in this file are extracted from the unit tests of uBPF software. Each test
|
|
// in this file has a name in the form `test_verifier_<name>`, and corresponds to the
|
|
// (human-readable) code in `ubpf/tree/master/tests/<name>`, available at
|
|
// <https://github.com/iovisor/ubpf/tree/master/tests> (hyphen had to be replaced with underscores
|
|
// as Rust will not accept them in function names). It is strongly advised to refer to the uBPF
|
|
// version to understand what these program do.
|
|
//
|
|
// Each program was assembled from the uBPF version with the assembler provided by uBPF itself, and
|
|
// available at <https://github.com/iovisor/ubpf/tree/master/ubpf>.
|
|
// The very few modifications that have been realized should be indicated.
|
|
|
|
// These are unit tests for the eBPF “verifier”.
|
|
|
|
extern crate rbpf;
|
|
|
|
use rbpf::{assembler::assemble, ebpf};
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: unsupported argument for LE/BE (insn #0)")]
|
|
fn test_verifier_err_endian_size() {
|
|
let prog = &[
|
|
0xdc, 0x01, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
];
|
|
let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: incomplete LD_DW instruction (insn #0)")]
|
|
fn test_verifier_err_incomplete_lddw() {
|
|
// Note: ubpf has test-err-incomplete-lddw2, which is the same
|
|
let prog = &[
|
|
0x18, 0x00, 0x00, 0x00, 0x88, 0x77, 0x66, 0x55, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00,
|
|
];
|
|
let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: infinite loop")]
|
|
fn test_verifier_err_infinite_loop() {
|
|
let prog = assemble(
|
|
"
|
|
ja -1
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: invalid destination register (insn #0)")]
|
|
fn test_verifier_err_invalid_reg_dst() {
|
|
let prog = assemble(
|
|
"
|
|
mov r11, 1
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: invalid source register (insn #0)")]
|
|
fn test_verifier_err_invalid_reg_src() {
|
|
let prog = assemble(
|
|
"
|
|
mov r0, r11
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: jump to middle of LD_DW at #2 (insn #0)")]
|
|
fn test_verifier_err_jmp_lddw() {
|
|
let prog = assemble(
|
|
"
|
|
ja +1
|
|
lddw r0, 0x1122334455667788
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: jump out of code to #3 (insn #0)")]
|
|
fn test_verifier_err_jmp_out() {
|
|
let prog = assemble(
|
|
"
|
|
ja +2
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: program does not end with “EXIT” instruction")]
|
|
fn test_verifier_err_no_exit() {
|
|
let prog = assemble(
|
|
"
|
|
mov32 r0, 0",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
fn test_verifier_err_no_exit_backward_jump() {
|
|
let prog = assemble(
|
|
"
|
|
ja +1
|
|
exit
|
|
ja -2",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: eBPF program length limited to 1000000, here 1000001")]
|
|
fn test_verifier_err_too_many_instructions() {
|
|
// uBPF uses 65637 instructions, because it sets its limit at 65636.
|
|
// We use the classic 4096 limit from kernel, so no need to produce as many instructions.
|
|
let mut prog = (0..(1_000_000 * ebpf::INSN_SIZE))
|
|
.map(|x| match x % 8 {
|
|
0 => 0xb7,
|
|
1 => 0x01,
|
|
_ => 0,
|
|
})
|
|
.collect::<Vec<u8>>();
|
|
prog.append(&mut vec![0x95, 0, 0, 0, 0, 0, 0, 0]);
|
|
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: unknown eBPF opcode 0x6 (insn #0)")]
|
|
fn test_verifier_err_unknown_opcode() {
|
|
let prog = &[
|
|
0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00,
|
|
];
|
|
let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|
|
|
|
#[test]
|
|
#[should_panic(expected = "[Verifier] Error: cannot write into register r10 (insn #0)")]
|
|
fn test_verifier_err_write_r10() {
|
|
let prog = assemble(
|
|
"
|
|
mov r10, 1
|
|
exit",
|
|
)
|
|
.unwrap();
|
|
let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
|
|
vm.execute_program().unwrap();
|
|
}
|