Back to home page

OSCL-LXR

 
 

    


0001 {
0002     "jit: lsh, rsh, arsh by 1",
0003     .insns = {
0004     BPF_MOV64_IMM(BPF_REG_0, 1),
0005     BPF_MOV64_IMM(BPF_REG_1, 0xff),
0006     BPF_ALU64_IMM(BPF_LSH, BPF_REG_1, 1),
0007     BPF_ALU32_IMM(BPF_LSH, BPF_REG_1, 1),
0008     BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0x3fc, 1),
0009     BPF_EXIT_INSN(),
0010     BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 1),
0011     BPF_ALU32_IMM(BPF_RSH, BPF_REG_1, 1),
0012     BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0xff, 1),
0013     BPF_EXIT_INSN(),
0014     BPF_ALU64_IMM(BPF_ARSH, BPF_REG_1, 1),
0015     BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0x7f, 1),
0016     BPF_EXIT_INSN(),
0017     BPF_MOV64_IMM(BPF_REG_0, 2),
0018     BPF_EXIT_INSN(),
0019     },
0020     .result = ACCEPT,
0021     .retval = 2,
0022 },
0023 {
0024     "jit: mov32 for ldimm64, 1",
0025     .insns = {
0026     BPF_MOV64_IMM(BPF_REG_0, 2),
0027     BPF_LD_IMM64(BPF_REG_1, 0xfeffffffffffffffULL),
0028     BPF_ALU64_IMM(BPF_RSH, BPF_REG_1, 32),
0029     BPF_LD_IMM64(BPF_REG_2, 0xfeffffffULL),
0030     BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_2, 1),
0031     BPF_MOV64_IMM(BPF_REG_0, 1),
0032     BPF_EXIT_INSN(),
0033     },
0034     .result = ACCEPT,
0035     .retval = 2,
0036 },
0037 {
0038     "jit: mov32 for ldimm64, 2",
0039     .insns = {
0040     BPF_MOV64_IMM(BPF_REG_0, 1),
0041     BPF_LD_IMM64(BPF_REG_1, 0x1ffffffffULL),
0042     BPF_LD_IMM64(BPF_REG_2, 0xffffffffULL),
0043     BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_2, 1),
0044     BPF_MOV64_IMM(BPF_REG_0, 2),
0045     BPF_EXIT_INSN(),
0046     },
0047     .result = ACCEPT,
0048     .retval = 2,
0049 },
0050 {
0051     "jit: various mul tests",
0052     .insns = {
0053     BPF_LD_IMM64(BPF_REG_2, 0xeeff0d413122ULL),
0054     BPF_LD_IMM64(BPF_REG_0, 0xfefefeULL),
0055     BPF_LD_IMM64(BPF_REG_1, 0xefefefULL),
0056     BPF_ALU64_REG(BPF_MUL, BPF_REG_0, BPF_REG_1),
0057     BPF_JMP_REG(BPF_JEQ, BPF_REG_0, BPF_REG_2, 2),
0058     BPF_MOV64_IMM(BPF_REG_0, 1),
0059     BPF_EXIT_INSN(),
0060     BPF_LD_IMM64(BPF_REG_3, 0xfefefeULL),
0061     BPF_ALU64_REG(BPF_MUL, BPF_REG_3, BPF_REG_1),
0062     BPF_JMP_REG(BPF_JEQ, BPF_REG_3, BPF_REG_2, 2),
0063     BPF_MOV64_IMM(BPF_REG_0, 1),
0064     BPF_EXIT_INSN(),
0065     BPF_LD_IMM64(BPF_REG_3, 0xfefefeULL),
0066     BPF_ALU64_IMM(BPF_MUL, BPF_REG_3, 0xefefef),
0067     BPF_JMP_REG(BPF_JEQ, BPF_REG_3, BPF_REG_2, 2),
0068     BPF_MOV64_IMM(BPF_REG_0, 1),
0069     BPF_EXIT_INSN(),
0070     BPF_MOV32_REG(BPF_REG_2, BPF_REG_2),
0071     BPF_LD_IMM64(BPF_REG_0, 0xfefefeULL),
0072     BPF_ALU32_REG(BPF_MUL, BPF_REG_0, BPF_REG_1),
0073     BPF_JMP_REG(BPF_JEQ, BPF_REG_0, BPF_REG_2, 2),
0074     BPF_MOV64_IMM(BPF_REG_0, 1),
0075     BPF_EXIT_INSN(),
0076     BPF_LD_IMM64(BPF_REG_3, 0xfefefeULL),
0077     BPF_ALU32_REG(BPF_MUL, BPF_REG_3, BPF_REG_1),
0078     BPF_JMP_REG(BPF_JEQ, BPF_REG_3, BPF_REG_2, 2),
0079     BPF_MOV64_IMM(BPF_REG_0, 1),
0080     BPF_EXIT_INSN(),
0081     BPF_LD_IMM64(BPF_REG_3, 0xfefefeULL),
0082     BPF_ALU32_IMM(BPF_MUL, BPF_REG_3, 0xefefef),
0083     BPF_JMP_REG(BPF_JEQ, BPF_REG_3, BPF_REG_2, 2),
0084     BPF_MOV64_IMM(BPF_REG_0, 1),
0085     BPF_EXIT_INSN(),
0086     BPF_LD_IMM64(BPF_REG_0, 0xfefefeULL),
0087     BPF_LD_IMM64(BPF_REG_2, 0x2ad4d4aaULL),
0088     BPF_ALU32_IMM(BPF_MUL, BPF_REG_0, 0x2b),
0089     BPF_JMP_REG(BPF_JEQ, BPF_REG_0, BPF_REG_2, 2),
0090     BPF_MOV64_IMM(BPF_REG_0, 1),
0091     BPF_EXIT_INSN(),
0092     BPF_LD_IMM64(BPF_REG_0, 0x952a7bbcULL),
0093     BPF_LD_IMM64(BPF_REG_1, 0xfefefeULL),
0094     BPF_LD_IMM64(BPF_REG_5, 0xeeff0d413122ULL),
0095     BPF_ALU32_REG(BPF_MUL, BPF_REG_5, BPF_REG_1),
0096     BPF_JMP_REG(BPF_JEQ, BPF_REG_5, BPF_REG_0, 2),
0097     BPF_MOV64_IMM(BPF_REG_0, 1),
0098     BPF_EXIT_INSN(),
0099     BPF_MOV64_IMM(BPF_REG_0, 2),
0100     BPF_EXIT_INSN(),
0101     },
0102     .result = ACCEPT,
0103     .retval = 2,
0104 },
0105 {
0106     "jit: various div tests",
0107     .insns = {
0108     BPF_LD_IMM64(BPF_REG_2, 0xefeffeULL),
0109     BPF_LD_IMM64(BPF_REG_0, 0xeeff0d413122ULL),
0110     BPF_LD_IMM64(BPF_REG_1, 0xfefeeeULL),
0111     BPF_ALU64_REG(BPF_DIV, BPF_REG_0, BPF_REG_1),
0112     BPF_JMP_REG(BPF_JEQ, BPF_REG_0, BPF_REG_2, 2),
0113     BPF_MOV64_IMM(BPF_REG_0, 1),
0114     BPF_EXIT_INSN(),
0115     BPF_LD_IMM64(BPF_REG_3, 0xeeff0d413122ULL),
0116     BPF_ALU64_IMM(BPF_DIV, BPF_REG_3, 0xfefeeeULL),
0117     BPF_JMP_REG(BPF_JEQ, BPF_REG_3, BPF_REG_2, 2),
0118     BPF_MOV64_IMM(BPF_REG_0, 1),
0119     BPF_EXIT_INSN(),
0120     BPF_LD_IMM64(BPF_REG_2, 0xaa93ULL),
0121     BPF_ALU64_IMM(BPF_MOD, BPF_REG_1, 0xbeefULL),
0122     BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_2, 2),
0123     BPF_MOV64_IMM(BPF_REG_0, 1),
0124     BPF_EXIT_INSN(),
0125     BPF_LD_IMM64(BPF_REG_1, 0xfefeeeULL),
0126     BPF_LD_IMM64(BPF_REG_3, 0xbeefULL),
0127     BPF_ALU64_REG(BPF_MOD, BPF_REG_1, BPF_REG_3),
0128     BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_2, 2),
0129     BPF_MOV64_IMM(BPF_REG_0, 1),
0130     BPF_EXIT_INSN(),
0131     BPF_LD_IMM64(BPF_REG_2, 0x5ee1dULL),
0132     BPF_LD_IMM64(BPF_REG_1, 0xfefeeeULL),
0133     BPF_LD_IMM64(BPF_REG_3, 0x2bULL),
0134     BPF_ALU32_REG(BPF_DIV, BPF_REG_1, BPF_REG_3),
0135     BPF_JMP_REG(BPF_JEQ, BPF_REG_1, BPF_REG_2, 2),
0136     BPF_MOV64_IMM(BPF_REG_0, 1),
0137     BPF_EXIT_INSN(),
0138     BPF_ALU32_REG(BPF_DIV, BPF_REG_1, BPF_REG_1),
0139     BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 1, 2),
0140     BPF_MOV64_IMM(BPF_REG_0, 1),
0141     BPF_EXIT_INSN(),
0142     BPF_ALU64_REG(BPF_MOD, BPF_REG_2, BPF_REG_2),
0143     BPF_JMP_IMM(BPF_JEQ, BPF_REG_2, 0, 2),
0144     BPF_MOV64_IMM(BPF_REG_0, 1),
0145     BPF_EXIT_INSN(),
0146     BPF_MOV64_IMM(BPF_REG_0, 2),
0147     BPF_EXIT_INSN(),
0148     },
0149     .result = ACCEPT,
0150     .retval = 2,
0151 },
0152 {
0153     "jit: jsgt, jslt",
0154     .insns = {
0155     BPF_LD_IMM64(BPF_REG_1, 0x80000000ULL),
0156     BPF_LD_IMM64(BPF_REG_2, 0x0ULL),
0157     BPF_JMP_REG(BPF_JSGT, BPF_REG_1, BPF_REG_2, 2),
0158     BPF_MOV64_IMM(BPF_REG_0, 1),
0159     BPF_EXIT_INSN(),
0160 
0161     BPF_JMP_REG(BPF_JSLT, BPF_REG_2, BPF_REG_1, 2),
0162     BPF_MOV64_IMM(BPF_REG_0, 1),
0163     BPF_EXIT_INSN(),
0164 
0165     BPF_MOV64_IMM(BPF_REG_0, 2),
0166     BPF_EXIT_INSN(),
0167     },
0168     .result = ACCEPT,
0169     .retval = 2,
0170 },
0171 {
0172     "jit: torturous jumps, imm8 nop jmp and pure jump padding",
0173     .insns = { },
0174     .fill_helper = bpf_fill_torturous_jumps,
0175     .prog_type = BPF_PROG_TYPE_SCHED_CLS,
0176     .result = ACCEPT,
0177     .retval = 1,
0178 },
0179 {
0180     "jit: torturous jumps, imm32 nop jmp and jmp_cond padding",
0181     .insns = { },
0182     .fill_helper = bpf_fill_torturous_jumps,
0183     .prog_type = BPF_PROG_TYPE_SCHED_CLS,
0184     .result = ACCEPT,
0185     .retval = 2,
0186 },
0187 {
0188     "jit: torturous jumps in subprog",
0189     .insns = { },
0190     .fill_helper = bpf_fill_torturous_jumps,
0191     .prog_type = BPF_PROG_TYPE_SCHED_CLS,
0192     .result = ACCEPT,
0193     .retval = 3,
0194 },