// SPDX-License-Identifier: (Apache-2.0 OR MIT) // Converted from the tests for uBPF // Copyright 2015 Big Switch Networks, Inc // Copyright 2016 6WIND S.A. // The tests contained in this file are extracted from the unit tests of uBPF software. Each test // in this file has a name in the form `test_verifier_`, and corresponds to the // (human-readable) code in `ubpf/tree/master/tests/`, available at // (hyphen had to be replaced with underscores // as Rust will not accept them in function names). It is strongly advised to refer to the uBPF // version to understand what these program do. // // Each program was assembled from the uBPF version with the assembler provided by uBPF itself, and // available at . // The very few modifications that have been realized should be indicated. // These are unit tests for the eBPF “verifier”. extern crate rbpf; use rbpf::assembler::assemble; use rbpf::ebpf; #[test] #[should_panic(expected = "[Verifier] Error: unsupported argument for LE/BE (insn #0)")] fn test_verifier_err_endian_size() { let prog = &[ 0xdc, 0x01, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, 0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 ]; let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: incomplete LD_DW instruction (insn #0)")] fn test_verifier_err_incomplete_lddw() { // Note: ubpf has test-err-incomplete-lddw2, which is the same let prog = &[ 0x18, 0x00, 0x00, 0x00, 0x88, 0x77, 0x66, 0x55, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 ]; let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: infinite loop")] fn test_verifier_err_infinite_loop() { let prog = assemble(" ja -1 exit").unwrap(); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: invalid destination register (insn #0)")] fn test_verifier_err_invalid_reg_dst() { let prog = assemble(" mov r11, 1 exit").unwrap(); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: invalid source register (insn #0)")] fn test_verifier_err_invalid_reg_src() { let prog = assemble(" mov r0, r11 exit").unwrap(); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: jump to middle of LD_DW at #2 (insn #0)")] fn test_verifier_err_jmp_lddw() { let prog = assemble(" ja +1 lddw r0, 0x1122334455667788 exit").unwrap(); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: jump out of code to #3 (insn #0)")] fn test_verifier_err_jmp_out() { let prog = assemble(" ja +2 exit").unwrap(); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: program does not end with “EXIT” instruction")] fn test_verifier_err_no_exit() { let prog = assemble(" mov32 r0, 0").unwrap(); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); } #[test] fn test_verifier_err_no_exit_backward_jump() { let prog = assemble(" ja +1 exit ja -2").unwrap(); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: eBPF program length limited to 1000000, here 1000001")] fn test_verifier_err_too_many_instructions() { // uBPF uses 65637 instructions, because it sets its limit at 65636. // We use the classic 4096 limit from kernel, so no need to produce as many instructions. let mut prog = (0..(1_000_000 * ebpf::INSN_SIZE)).map( |x| match x % 8 { 0 => 0xb7, 1 => 0x01, _ => 0 }).collect::>(); prog.append(&mut vec![ 0x95, 0, 0, 0, 0, 0, 0, 0 ]); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: unknown eBPF opcode 0x6 (insn #0)")] fn test_verifier_err_unknown_opcode() { let prog = &[ 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 ]; let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap(); vm.execute_program().unwrap(); } #[test] #[should_panic(expected = "[Verifier] Error: cannot write into register r10 (insn #0)")] fn test_verifier_err_write_r10() { let prog = assemble(" mov r10, 1 exit").unwrap(); let vm = rbpf::EbpfVmNoData::new(Some(&prog)).unwrap(); vm.execute_program().unwrap(); }