Home | History | Annotate | Line # | Download | only in libnpftest
npf_bpf_test.c revision 1.7.4.2
      1 /*	$NetBSD: npf_bpf_test.c,v 1.7.4.2 2014/08/20 00:05:11 tls Exp $	*/
      2 
      3 /*-
      4  * Copyright (c) 2013 The NetBSD Foundation, Inc.
      5  * All rights reserved.
      6  *
      7  * This code is derived from software contributed to The NetBSD Foundation
      8  * by Mindaugas Rasiukevicius.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  * 1. Redistributions of source code must retain the above copyright
     14  *    notice, this list of conditions and the following disclaimer.
     15  * 2. Redistributions in binary form must reproduce the above copyright
     16  *    notice, this list of conditions and the following disclaimer in the
     17  *    documentation and/or other materials provided with the distribution.
     18  *
     19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29  * POSSIBILITY OF SUCH DAMAGE.
     30  */
     31 
     32 /*
     33  * NPF test of BPF coprocessor.
     34  */
     35 
     36 #include <sys/types.h>
     37 #include <sys/endian.h>
     38 
     39 #define	NPF_BPFCOP
     40 #include "npf_impl.h"
     41 #include "npf_test.h"
     42 
     43 static bool	lverbose = false;
     44 
     45 static struct mbuf *
     46 fill_packet(int proto)
     47 {
     48 	struct mbuf *m;
     49 	struct ip *ip;
     50 	struct tcphdr *th;
     51 
     52 	m = mbuf_construct(IPPROTO_TCP);
     53 	th = mbuf_return_hdrs(m, false, &ip);
     54 	ip->ip_src.s_addr = inet_addr("192.168.2.100");
     55 	ip->ip_dst.s_addr = inet_addr("10.0.0.1");
     56 	th->th_sport = htons(15000);
     57 	th->th_dport = htons(80);
     58 	return m;
     59 }
     60 
     61 static int
     62 test_bpf_code(void *code, size_t size)
     63 {
     64 	ifnet_t *dummy_ifp = npf_test_addif(IFNAME_TEST, false, false);
     65 	npf_cache_t npc = { .npc_info = 0 };
     66 	uint32_t memstore[BPF_MEMWORDS];
     67 	bpf_args_t bc_args;
     68 	struct mbuf *m;
     69 	nbuf_t nbuf;
     70 	int ret, jret;
     71 	void *jcode;
     72 
     73 	/* Layer 3 (IP + TCP). */
     74 	m = fill_packet(IPPROTO_TCP);
     75 	nbuf_init(&nbuf, m, dummy_ifp);
     76 	npc.npc_nbuf = &nbuf;
     77 	npf_cache_all(&npc);
     78 
     79 	bc_args.pkt = (const uint8_t *)m;
     80 	bc_args.buflen = m_length(m);
     81 	bc_args.wirelen = bc_args.buflen;
     82 	bc_args.mem = memstore;
     83 	bc_args.arg = &npc;
     84 
     85 	ret = npf_bpf_filter(&bc_args, code, NULL);
     86 
     87 	/* JIT-compiled code. */
     88 	jcode = npf_bpf_compile(code, size);
     89 	if (jcode) {
     90 		jret = npf_bpf_filter(&bc_args, NULL, jcode);
     91 		assert(ret == jret);
     92 		bpf_jit_freecode(jcode);
     93 	} else if (lverbose) {
     94 		printf("JIT-compilation failed\n");
     95 	}
     96 	m_freem(m);
     97 
     98 	return ret;
     99 }
    100 
    101 static uint32_t
    102 npf_bpfcop_run(u_int reg)
    103 {
    104 	struct bpf_insn insns_npf_bpfcop[] = {
    105 		BPF_STMT(BPF_MISC+BPF_COP, NPF_COP_L3),
    106 		BPF_STMT(BPF_LD+BPF_W+BPF_MEM, reg),
    107 		BPF_STMT(BPF_RET+BPF_A, 0),
    108 	};
    109 	return test_bpf_code(&insns_npf_bpfcop, sizeof(insns_npf_bpfcop));
    110 }
    111 
    112 static bool
    113 npf_bpfcop_test(void)
    114 {
    115 	bool fail = false;
    116 
    117 	/* A <- IP version (4 or 6) */
    118 	struct bpf_insn insns_ipver[] = {
    119 		BPF_STMT(BPF_MISC+BPF_COP, NPF_COP_L3),
    120 		BPF_STMT(BPF_RET+BPF_A, 0),
    121 	};
    122 	fail |= (test_bpf_code(&insns_ipver, sizeof(insns_ipver)) != IPVERSION);
    123 
    124 	/* BPF_MW_IPVERI <- IP version */
    125 	fail |= (npf_bpfcop_run(BPF_MW_IPVER) != IPVERSION);
    126 
    127 	/* BPF_MW_L4OFF <- L4 header offset */
    128 	fail |= (npf_bpfcop_run(BPF_MW_L4OFF) != sizeof(struct ip));
    129 
    130 	/* BPF_MW_L4PROTO <- L4 protocol */
    131 	fail |= (npf_bpfcop_run(BPF_MW_L4PROTO) != IPPROTO_TCP);
    132 
    133 	return fail;
    134 }
    135 
    136 bool
    137 npf_bpf_test(bool verbose)
    138 {
    139 	bool fail = false;
    140 
    141 	lverbose = verbose;
    142 
    143 	fail |= npf_bpfcop_test();
    144 
    145 	return !fail;
    146 }
    147