forked from Minki/linux
bpf, tests: Add more tests of ALU32 and ALU64 bitwise operations
This patch adds tests of BPF_AND, BPF_OR and BPF_XOR with different magnitude of the immediate value. Mainly checking 32-bit JIT sub-word handling and zero/sign extension. Signed-off-by: Johan Almbladh <johan.almbladh@anyfinetworks.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Yonghong Song <yhs@fb.com> Link: https://lore.kernel.org/bpf/20210809091829.810076-5-johan.almbladh@anyfinetworks.com
This commit is contained in:
parent
e92c813bf1
commit
ba89bcf78f
210
lib/test_bpf.c
210
lib/test_bpf.c
@ -3514,6 +3514,44 @@ static struct bpf_test tests[] = {
|
||||
{ },
|
||||
{ { 0, 0xffffffff } },
|
||||
},
|
||||
{
|
||||
"ALU_AND_K: Small immediate",
|
||||
.u.insns_int = {
|
||||
BPF_ALU32_IMM(BPF_MOV, R0, 0x01020304),
|
||||
BPF_ALU32_IMM(BPF_AND, R0, 15),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 4 } }
|
||||
},
|
||||
{
|
||||
"ALU_AND_K: Large immediate",
|
||||
.u.insns_int = {
|
||||
BPF_ALU32_IMM(BPF_MOV, R0, 0xf1f2f3f4),
|
||||
BPF_ALU32_IMM(BPF_AND, R0, 0xafbfcfdf),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 0xa1b2c3d4 } }
|
||||
},
|
||||
{
|
||||
"ALU_AND_K: Zero extension",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0x0000000080a0c0e0LL),
|
||||
BPF_ALU32_IMM(BPF_AND, R0, 0xf0f0f0f0),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
{
|
||||
"ALU64_AND_K: 3 & 2 = 2",
|
||||
.u.insns_int = {
|
||||
@ -3584,6 +3622,38 @@ static struct bpf_test tests[] = {
|
||||
{ },
|
||||
{ { 0, 0x1 } },
|
||||
},
|
||||
{
|
||||
"ALU64_AND_K: Sign extension 1",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0x00000000090b0d0fLL),
|
||||
BPF_ALU64_IMM(BPF_AND, R0, 0x0f0f0f0f),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
{
|
||||
"ALU64_AND_K: Sign extension 2",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0x0123456780a0c0e0LL),
|
||||
BPF_ALU64_IMM(BPF_AND, R0, 0xf0f0f0f0),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
/* BPF_ALU | BPF_OR | BPF_X */
|
||||
{
|
||||
"ALU_OR_X: 1 | 2 = 3",
|
||||
@ -3656,6 +3726,44 @@ static struct bpf_test tests[] = {
|
||||
{ },
|
||||
{ { 0, 0xffffffff } },
|
||||
},
|
||||
{
|
||||
"ALU_OR_K: Small immediate",
|
||||
.u.insns_int = {
|
||||
BPF_ALU32_IMM(BPF_MOV, R0, 0x01020304),
|
||||
BPF_ALU32_IMM(BPF_OR, R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 0x01020305 } }
|
||||
},
|
||||
{
|
||||
"ALU_OR_K: Large immediate",
|
||||
.u.insns_int = {
|
||||
BPF_ALU32_IMM(BPF_MOV, R0, 0x01020304),
|
||||
BPF_ALU32_IMM(BPF_OR, R0, 0xa0b0c0d0),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 0xa1b2c3d4 } }
|
||||
},
|
||||
{
|
||||
"ALU_OR_K: Zero extension",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0x00000000f9fbfdffLL),
|
||||
BPF_ALU32_IMM(BPF_OR, R0, 0xf0f0f0f0),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
{
|
||||
"ALU64_OR_K: 1 | 2 = 3",
|
||||
.u.insns_int = {
|
||||
@ -3726,6 +3834,38 @@ static struct bpf_test tests[] = {
|
||||
{ },
|
||||
{ { 0, 0x1 } },
|
||||
},
|
||||
{
|
||||
"ALU64_OR_K: Sign extension 1",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0x012345678fafcfefLL),
|
||||
BPF_ALU64_IMM(BPF_OR, R0, 0x0f0f0f0f),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
{
|
||||
"ALU64_OR_K: Sign extension 2",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0xfffffffff9fbfdffLL),
|
||||
BPF_ALU64_IMM(BPF_OR, R0, 0xf0f0f0f0),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
/* BPF_ALU | BPF_XOR | BPF_X */
|
||||
{
|
||||
"ALU_XOR_X: 5 ^ 6 = 3",
|
||||
@ -3798,6 +3938,44 @@ static struct bpf_test tests[] = {
|
||||
{ },
|
||||
{ { 0, 0xfffffffe } },
|
||||
},
|
||||
{
|
||||
"ALU_XOR_K: Small immediate",
|
||||
.u.insns_int = {
|
||||
BPF_ALU32_IMM(BPF_MOV, R0, 0x01020304),
|
||||
BPF_ALU32_IMM(BPF_XOR, R0, 15),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 0x0102030b } }
|
||||
},
|
||||
{
|
||||
"ALU_XOR_K: Large immediate",
|
||||
.u.insns_int = {
|
||||
BPF_ALU32_IMM(BPF_MOV, R0, 0xf1f2f3f4),
|
||||
BPF_ALU32_IMM(BPF_XOR, R0, 0xafbfcfdf),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 0x5e4d3c2b } }
|
||||
},
|
||||
{
|
||||
"ALU_XOR_K: Zero extension",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0x00000000795b3d1fLL),
|
||||
BPF_ALU32_IMM(BPF_XOR, R0, 0xf0f0f0f0),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
{
|
||||
"ALU64_XOR_K: 5 ^ 6 = 3",
|
||||
.u.insns_int = {
|
||||
@ -3868,6 +4046,38 @@ static struct bpf_test tests[] = {
|
||||
{ },
|
||||
{ { 0, 0x1 } },
|
||||
},
|
||||
{
|
||||
"ALU64_XOR_K: Sign extension 1",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0x0123456786a4c2e0LL),
|
||||
BPF_ALU64_IMM(BPF_XOR, R0, 0x0f0f0f0f),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
{
|
||||
"ALU64_XOR_K: Sign extension 2",
|
||||
.u.insns_int = {
|
||||
BPF_LD_IMM64(R0, 0x0123456789abcdefLL),
|
||||
BPF_LD_IMM64(R1, 0xfedcba98795b3d1fLL),
|
||||
BPF_ALU64_IMM(BPF_XOR, R0, 0xf0f0f0f0),
|
||||
BPF_JMP_REG(BPF_JEQ, R0, R1, 2),
|
||||
BPF_MOV32_IMM(R0, 2),
|
||||
BPF_EXIT_INSN(),
|
||||
BPF_MOV32_IMM(R0, 1),
|
||||
BPF_EXIT_INSN(),
|
||||
},
|
||||
INTERNAL,
|
||||
{ },
|
||||
{ { 0, 1 } }
|
||||
},
|
||||
/* BPF_ALU | BPF_LSH | BPF_X */
|
||||
{
|
||||
"ALU_LSH_X: 1 << 1 = 2",
|
||||
|
Loading…
Reference in New Issue
Block a user