xref: /netbsd-src/usr.sbin/npf/npftest/libnpftest/npf_bpf_test.c (revision b7b7574d3bf8eeb51a1fa3977b59142ec6434a55)
1 /*	$NetBSD: npf_bpf_test.c,v 1.6 2014/06/25 00:20:06 rmind Exp $	*/
2 
3 /*-
4  * Copyright (c) 2013 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This code is derived from software contributed to The NetBSD Foundation
8  * by Mindaugas Rasiukevicius.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29  * POSSIBILITY OF SUCH DAMAGE.
30  */
31 
32 /*
33  * NPF test of BPF coprocessor.
34  */
35 
36 #include <sys/types.h>
37 #include <sys/endian.h>
38 
39 #define	NPF_BPFCOP
40 #include "npf_impl.h"
41 #include "npf_test.h"
42 
43 static bool	lverbose = false;
44 
45 static struct mbuf *
46 fill_packet(int proto)
47 {
48 	struct mbuf *m;
49 	struct ip *ip;
50 	struct tcphdr *th;
51 
52 	m = mbuf_construct(IPPROTO_TCP);
53 	th = mbuf_return_hdrs(m, false, &ip);
54 	ip->ip_src.s_addr = inet_addr("192.168.2.100");
55 	ip->ip_dst.s_addr = inet_addr("10.0.0.1");
56 	th->th_sport = htons(15000);
57 	th->th_dport = htons(80);
58 	return m;
59 }
60 
61 static int
62 test_bpf_code(void *code, size_t size)
63 {
64 	ifnet_t *dummy_ifp = npf_test_addif(IFNAME_TEST, false, false);
65 	npf_cache_t npc = { .npc_info = 0 };
66 	uint32_t memstore[BPF_MEMWORDS];
67 	bpf_args_t bc_args;
68 	struct mbuf *m;
69 	nbuf_t nbuf;
70 	int ret, jret;
71 	void *jcode;
72 
73 	/* Layer 3 (IP + TCP). */
74 	m = fill_packet(IPPROTO_TCP);
75 	nbuf_init(&nbuf, m, dummy_ifp);
76 	npf_cache_all(&npc, &nbuf);
77 
78 	bc_args.pkt = (const uint8_t *)m;
79 	bc_args.buflen = m_length(m);
80 	bc_args.wirelen = bc_args.buflen;
81 	bc_args.mem = memstore;
82 	bc_args.arg = &npc;
83 
84 	ret = npf_bpf_filter(&bc_args, code, NULL);
85 
86 	/* JIT-compiled code. */
87 	jcode = npf_bpf_compile(code, size);
88 	if (jcode) {
89 		jret = npf_bpf_filter(&bc_args, NULL, jcode);
90 		assert(ret == jret);
91 		bpf_jit_freecode(jcode);
92 	} else if (lverbose) {
93 		printf("JIT-compilation failed\n");
94 	}
95 	m_freem(m);
96 
97 	return ret;
98 }
99 
100 static uint32_t
101 npf_bpfcop_run(u_int reg)
102 {
103 	struct bpf_insn insns_npf_bpfcop[] = {
104 		BPF_STMT(BPF_MISC+BPF_COP, NPF_COP_L3),
105 		BPF_STMT(BPF_LD+BPF_W+BPF_MEM, reg),
106 		BPF_STMT(BPF_RET+BPF_A, 0),
107 	};
108 	return test_bpf_code(&insns_npf_bpfcop, sizeof(insns_npf_bpfcop));
109 }
110 
111 static bool
112 npf_bpfcop_test(void)
113 {
114 	bool fail = false;
115 
116 	/* A <- IP version (4 or 6) */
117 	struct bpf_insn insns_ipver[] = {
118 		BPF_STMT(BPF_MISC+BPF_COP, NPF_COP_L3),
119 		BPF_STMT(BPF_RET+BPF_A, 0),
120 	};
121 	fail |= (test_bpf_code(&insns_ipver, sizeof(insns_ipver)) != IPVERSION);
122 
123 	/* BPF_MW_IPVERI <- IP version */
124 	fail |= (npf_bpfcop_run(BPF_MW_IPVER) != IPVERSION);
125 
126 	/* BPF_MW_L4OFF <- L4 header offset */
127 	fail |= (npf_bpfcop_run(BPF_MW_L4OFF) != sizeof(struct ip));
128 
129 	/* BPF_MW_L4PROTO <- L4 protocol */
130 	fail |= (npf_bpfcop_run(BPF_MW_L4PROTO) != IPPROTO_TCP);
131 
132 	return fail;
133 }
134 
135 bool
136 npf_bpf_test(bool verbose)
137 {
138 	bool fail = false;
139 
140 	lverbose = verbose;
141 
142 	fail |= npf_bpfcop_test();
143 
144 	return !fail;
145 }
146