123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177 |
- // SPDX-License-Identifier: (Apache-2.0 OR MIT)
- // Converted from the tests for uBPF <https://github.com/iovisor/ubpf>
- // Copyright 2015 Big Switch Networks, Inc
- // Copyright 2016 6WIND S.A. <[email protected]>
- // The tests contained in this file are extracted from the unit tests of uBPF software. Each test
- // in this file has a name in the form `test_verifier_<name>`, and corresponds to the
- // (human-readable) code in `ubpf/tree/master/tests/<name>`, available at
- // <https://github.com/iovisor/ubpf/tree/master/tests> (hyphen had to be replaced with underscores
- // as Rust will not accept them in function names). It is strongly advised to refer to the uBPF
- // version to understand what these program do.
- //
- // Each program was assembled from the uBPF version with the assembler provided by uBPF itself, and
- // available at <https://github.com/iovisor/ubpf/tree/master/ubpf>.
- // The very few modifications that have been realized should be indicated.
- // These are unit tests for the eBPF “verifier”.
- extern crate rbpf;
- use rbpf::{assembler::assemble, ebpf};
- #[test]
- #[should_panic(expected = "[Verifier] Error: unsupported argument for LE/BE (insn #0)")]
- fn test_verifier_err_endian_size() {
- let prog = &[
- 0xdc, 0x01, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- ];
- let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: incomplete LD_DW instruction (insn #0)")]
- fn test_verifier_err_incomplete_lddw() {
- // Note: ubpf has test-err-incomplete-lddw2, which is the same
- let prog = &[
- 0x18, 0x00, 0x00, 0x00, 0x88, 0x77, 0x66, 0x55, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00,
- ];
- let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: infinite loop")]
- fn test_verifier_err_infinite_loop() {
- let prog = assemble(
- "
- ja -1
- exit",
- )
- .unwrap();
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: invalid destination register (insn #0)")]
- fn test_verifier_err_invalid_reg_dst() {
- let prog = assemble(
- "
- mov r11, 1
- exit",
- )
- .unwrap();
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: invalid source register (insn #0)")]
- fn test_verifier_err_invalid_reg_src() {
- let prog = assemble(
- "
- mov r0, r11
- exit",
- )
- .unwrap();
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: jump to middle of LD_DW at #2 (insn #0)")]
- fn test_verifier_err_jmp_lddw() {
- let prog = assemble(
- "
- ja +1
- lddw r0, 0x1122334455667788
- exit",
- )
- .unwrap();
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: jump out of code to #3 (insn #0)")]
- fn test_verifier_err_jmp_out() {
- let prog = assemble(
- "
- ja +2
- exit",
- )
- .unwrap();
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: program does not end with “EXIT” instruction")]
- fn test_verifier_err_no_exit() {
- let prog = assemble(
- "
- mov32 r0, 0",
- )
- .unwrap();
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- fn test_verifier_err_no_exit_backward_jump() {
- let prog = assemble(
- "
- ja +1
- exit
- ja -2",
- )
- .unwrap();
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: eBPF program length limited to 1000000, here 1000001")]
- fn test_verifier_err_too_many_instructions() {
- // uBPF uses 65637 instructions, because it sets its limit at 65636.
- // We use the classic 4096 limit from kernel, so no need to produce as many instructions.
- let mut prog = (0..(1_000_000 * ebpf::INSN_SIZE))
- .map(|x| match x % 8 {
- 0 => 0xb7,
- 1 => 0x01,
- _ => 0,
- })
- .collect::<Vec<u8>>();
- prog.append(&mut vec![0x95, 0, 0, 0, 0, 0, 0, 0]);
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: unknown eBPF opcode 0x6 (insn #0)")]
- fn test_verifier_err_unknown_opcode() {
- let prog = &[
- 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
- 0x00,
- ];
- let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
- vm.execute_program().unwrap();
- }
- #[test]
- #[should_panic(expected = "[Verifier] Error: cannot write into register r10 (insn #0)")]
- fn test_verifier_err_write_r10() {
- let prog = assemble(
- "
- mov r10, 1
- exit",
- )
- .unwrap();
- let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap();
- vm.execute_program().unwrap();
- }
|