]> git.karo-electronics.de Git - karo-tx-linux.git/blobdiff - lib/test_bpf.c
ARM: dts: add support for TX6S with LVDS output
[karo-tx-linux.git] / lib / test_bpf.c
index e160934430eb8f4dad2ca8c598a96c28f6be9f32..c579e0f58818f8c22709dcce269e33a48265d722 100644 (file)
 #include <linux/netdevice.h>
 #include <linux/if_vlan.h>
 
+/* General test specific settings */
 #define MAX_SUBTESTS   3
+#define MAX_TESTRUNS   10000
 #define MAX_DATA       128
 #define MAX_INSNS      512
 #define MAX_K          0xffffFFFF
 
-/* define few constants used to init test 'skb' */
+/* Few constants used to init test 'skb' */
 #define SKB_TYPE       3
 #define SKB_MARK       0x1234aaaa
 #define SKB_HASH       0x1234aaab
 #define SKB_DEV_IFINDEX        577
 #define SKB_DEV_TYPE   588
 
-/* redefine REGs to make tests less verbose */
-#define R0 BPF_REG_0
-#define R1 BPF_REG_1
-#define R2 BPF_REG_2
-#define R3 BPF_REG_3
-#define R4 BPF_REG_4
-#define R5 BPF_REG_5
-#define R6 BPF_REG_6
-#define R7 BPF_REG_7
-#define R8 BPF_REG_8
-#define R9 BPF_REG_9
-#define R10 BPF_REG_10
+/* Redefine REGs to make tests less verbose */
+#define R0             BPF_REG_0
+#define R1             BPF_REG_1
+#define R2             BPF_REG_2
+#define R3             BPF_REG_3
+#define R4             BPF_REG_4
+#define R5             BPF_REG_5
+#define R6             BPF_REG_6
+#define R7             BPF_REG_7
+#define R8             BPF_REG_8
+#define R9             BPF_REG_9
+#define R10            BPF_REG_10
+
+/* Flags that can be passed to test cases */
+#define FLAG_NO_DATA           BIT(0)
+#define FLAG_EXPECTED_FAIL     BIT(1)
+
+enum {
+       CLASSIC  = BIT(6),      /* Old BPF instructions only. */
+       INTERNAL = BIT(7),      /* Extended instruction set.  */
+};
+
+#define TEST_TYPE_MASK         (CLASSIC | INTERNAL)
 
 struct bpf_test {
        const char *descr;
        union {
                struct sock_filter insns[MAX_INSNS];
                struct sock_filter_int insns_int[MAX_INSNS];
-       };
-       enum {
-               NO_DATA,
-               EXPECTED_FAIL,
-               SKB,
-               SKB_INT
-       } data_type;
+       } u;
+       __u8 aux;
        __u8 data[MAX_DATA];
        struct {
                int data_size;
@@ -71,7 +79,7 @@ struct bpf_test {
 static struct bpf_test tests[] = {
        {
                "TAX",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_IMM, 1),
                        BPF_STMT(BPF_MISC | BPF_TAX, 0),
                        BPF_STMT(BPF_LD | BPF_IMM, 2),
@@ -84,25 +92,25 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_LD | BPF_B | BPF_IND, 1),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { 10, 20, 30, 40, 50 },
                { { 2, 10 }, { 3, 20 }, { 4, 30 } },
        },
        {
                "TXA",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LDX | BPF_LEN, 0),
                        BPF_STMT(BPF_MISC | BPF_TXA, 0),
                        BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0) /* A == len * 2 */
                },
-               SKB,
+               CLASSIC,
                { 10, 20, 30, 40, 50 },
                { { 1, 2 }, { 3, 6 }, { 4, 8 } },
        },
        {
                "ADD_SUB_MUL_K",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_IMM, 1),
                        BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 2),
                        BPF_STMT(BPF_LDX | BPF_IMM, 3),
@@ -111,13 +119,13 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_ALU | BPF_MUL | BPF_K, 3),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               0,
+               CLASSIC | FLAG_NO_DATA,
                { },
                { { 0, 0xfffffffd } }
        },
        {
                "DIV_KX",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_IMM, 8),
                        BPF_STMT(BPF_ALU | BPF_DIV | BPF_K, 2),
                        BPF_STMT(BPF_MISC | BPF_TAX, 0),
@@ -129,13 +137,13 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               0,
+               CLASSIC | FLAG_NO_DATA,
                { },
                { { 0, 0x40000001 } }
        },
        {
                "AND_OR_LSH_K",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_IMM, 0xff),
                        BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0xf0),
                        BPF_STMT(BPF_ALU | BPF_LSH | BPF_K, 27),
@@ -145,47 +153,59 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               0,
+               CLASSIC | FLAG_NO_DATA,
                { },
                { { 0, 0x800000ff }, { 1, 0x800000ff } },
        },
+       {
+               "LD_IMM_0",
+               .u.insns = {
+                       BPF_STMT(BPF_LD | BPF_IMM, 0), /* ld #0 */
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0, 1, 0),
+                       BPF_STMT(BPF_RET | BPF_K, 0),
+                       BPF_STMT(BPF_RET | BPF_K, 1),
+               },
+               CLASSIC,
+               { },
+               { { 1, 1 } },
+       },
        {
                "LD_IND",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LDX | BPF_LEN, 0),
                        BPF_STMT(BPF_LD | BPF_H | BPF_IND, MAX_K),
                        BPF_STMT(BPF_RET | BPF_K, 1)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, 0 }, { 10, 0 }, { 60, 0 } },
        },
        {
                "LD_ABS",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS, 1000),
                        BPF_STMT(BPF_RET | BPF_K, 1)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, 0 }, { 10, 0 }, { 60, 0 } },
        },
        {
                "LD_ABS_LL",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_B | BPF_ABS, SKF_LL_OFF),
                        BPF_STMT(BPF_MISC | BPF_TAX, 0),
                        BPF_STMT(BPF_LD | BPF_B | BPF_ABS, SKF_LL_OFF + 1),
                        BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { 1, 2, 3 },
                { { 1, 0 }, { 2, 3 } },
        },
        {
                "LD_IND_LL",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_IMM, SKF_LL_OFF - 1),
                        BPF_STMT(BPF_LDX | BPF_LEN, 0),
                        BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
@@ -193,26 +213,26 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_LD | BPF_B | BPF_IND, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { 1, 2, 3, 0xff },
                { { 1, 1 }, { 3, 3 }, { 4, 0xff } },
        },
        {
                "LD_ABS_NET",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_B | BPF_ABS, SKF_NET_OFF),
                        BPF_STMT(BPF_MISC | BPF_TAX, 0),
                        BPF_STMT(BPF_LD | BPF_B | BPF_ABS, SKF_NET_OFF + 1),
                        BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 2, 3 },
                { { 15, 0 }, { 16, 3 } },
        },
        {
                "LD_IND_NET",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_IMM, SKF_NET_OFF - 15),
                        BPF_STMT(BPF_LDX | BPF_LEN, 0),
                        BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
@@ -220,13 +240,13 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_LD | BPF_B | BPF_IND, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 2, 3 },
                { { 14, 0 }, { 15, 1 }, { 17, 3 } },
        },
        {
                "LD_PKTTYPE",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_PKTTYPE),
                        BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, SKB_TYPE, 1, 0),
@@ -241,46 +261,46 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_RET | BPF_K, 1),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, 3 }, { 10, 3 } },
        },
        {
                "LD_MARK",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_MARK),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, SKB_MARK}, { 10, SKB_MARK} },
        },
        {
                "LD_RXHASH",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_RXHASH),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, SKB_HASH}, { 10, SKB_HASH} },
        },
        {
                "LD_QUEUE",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_QUEUE),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, SKB_QUEUE_MAP }, { 10, SKB_QUEUE_MAP } },
        },
        {
                "LD_PROTOCOL",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 1),
                        BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 20, 1, 0),
                        BPF_STMT(BPF_RET | BPF_K, 0),
@@ -293,18 +313,18 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_MISC | BPF_TXA, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { 10, 20, 30 },
                { { 10, ETH_P_IP }, { 100, ETH_P_IP } },
        },
        {
                "LD_VLAN_TAG",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_VLAN_TAG),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                {
                        { 1, SKB_VLAN_TCI & ~VLAN_TAG_PRESENT },
@@ -313,12 +333,12 @@ static struct bpf_test tests[] = {
        },
        {
                "LD_VLAN_TAG_PRESENT",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_VLAN_TAG_PRESENT),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                {
                        { 1, !!(SKB_VLAN_TCI & VLAN_TAG_PRESENT) },
@@ -327,29 +347,29 @@ static struct bpf_test tests[] = {
        },
        {
                "LD_IFINDEX",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_IFINDEX),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, SKB_DEV_IFINDEX }, { 10, SKB_DEV_IFINDEX } },
        },
        {
                "LD_HATYPE",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_HATYPE),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, SKB_DEV_TYPE }, { 10, SKB_DEV_TYPE } },
        },
        {
                "LD_CPU",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_CPU),
                        BPF_STMT(BPF_MISC | BPF_TAX, 0),
@@ -358,61 +378,69 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_ALU | BPF_SUB | BPF_X, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, 0 }, { 10, 0 } },
        },
        {
                "LD_NLATTR",
-               .insns = {
-                       BPF_STMT(BPF_LDX | BPF_IMM, 1),
+               .u.insns = {
+                       BPF_STMT(BPF_LDX | BPF_IMM, 2),
                        BPF_STMT(BPF_MISC | BPF_TXA, 0),
                        BPF_STMT(BPF_LDX | BPF_IMM, 3),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
-               { 0xff, 4, 0, 2, 0, 4, 0, 3, 0 },
-               { { 4, 0 }, { 20, 5 } },
+               CLASSIC,
+#ifdef __BIG_ENDIAN
+               { 0xff, 0xff, 0, 4, 0, 2, 0, 4, 0, 3 },
+#else
+               { 0xff, 0xff, 4, 0, 2, 0, 4, 0, 3, 0 },
+#endif
+               { { 4, 0 }, { 20, 6 } },
        },
        {
                "LD_NLATTR_NEST",
-               .insns = {
-                       BPF_STMT(BPF_LD | BPF_IMM, 1),
+               .u.insns = {
+                       BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_LDX | BPF_IMM, 3),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR_NEST),
-                       BPF_STMT(BPF_LD | BPF_IMM, 1),
+                       BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR_NEST),
-                       BPF_STMT(BPF_LD | BPF_IMM, 1),
+                       BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR_NEST),
-                       BPF_STMT(BPF_LD | BPF_IMM, 1),
+                       BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR_NEST),
-                       BPF_STMT(BPF_LD | BPF_IMM, 1),
+                       BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR_NEST),
-                       BPF_STMT(BPF_LD | BPF_IMM, 1),
+                       BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR_NEST),
-                       BPF_STMT(BPF_LD | BPF_IMM, 1),
+                       BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR_NEST),
-                       BPF_STMT(BPF_LD | BPF_IMM, 1),
+                       BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_NLATTR_NEST),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
-               { 0xff, 12, 0, 1, 0, 4, 0, 2, 0, 4, 0, 3, 0 },
-               { { 4, 0 }, { 20, 9 } },
+               CLASSIC,
+#ifdef __BIG_ENDIAN
+               { 0xff, 0xff, 0, 12, 0, 1, 0, 4, 0, 2, 0, 4, 0, 3 },
+#else
+               { 0xff, 0xff, 12, 0, 1, 0, 4, 0, 2, 0, 4, 0, 3, 0 },
+#endif
+               { { 4, 0 }, { 20, 10 } },
        },
        {
                "LD_PAYLOAD_OFF",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_PAY_OFFSET),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
@@ -425,7 +453,7 @@ static struct bpf_test tests[] = {
                                 SKF_AD_OFF + SKF_AD_PAY_OFFSET),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                /* 00:00:00:00:00:00 > 00:00:00:00:00:00, ethtype IPv4 (0x0800),
                 * length 98: 127.0.0.1 > 127.0.0.1: ICMP echo request,
                 * id 9737, seq 1, length 64
@@ -439,20 +467,20 @@ static struct bpf_test tests[] = {
        },
        {
                "LD_ANC_XOR",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_IMM, 10),
                        BPF_STMT(BPF_LDX | BPF_IMM, 300),
                        BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
                                 SKF_AD_OFF + SKF_AD_ALU_XOR_X),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 4, 10 ^ 300 }, { 20, 10 ^ 300 } },
        },
        {
                "SPILL_FILL",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LDX | BPF_LEN, 0),
                        BPF_STMT(BPF_LD | BPF_IMM, 2),
                        BPF_STMT(BPF_ALU | BPF_RSH, 1),
@@ -468,39 +496,39 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_ALU | BPF_XOR | BPF_X, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
+               CLASSIC,
                { },
                { { 1, 0x80000001 }, { 2, 0x80000002 }, { 60, 0x80000000 ^ 60 } }
        },
        {
                "JEQ",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LDX | BPF_LEN, 0),
                        BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 2),
                        BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_X, 0, 0, 1),
                        BPF_STMT(BPF_RET | BPF_K, 1),
                        BPF_STMT(BPF_RET | BPF_K, MAX_K)
                },
-               SKB,
+               CLASSIC,
                { 3, 3, 3, 3, 3 },
                { { 1, 0 }, { 3, 1 }, { 4, MAX_K } },
        },
        {
                "JGT",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LDX | BPF_LEN, 0),
                        BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 2),
                        BPF_JUMP(BPF_JMP | BPF_JGT | BPF_X, 0, 0, 1),
                        BPF_STMT(BPF_RET | BPF_K, 1),
                        BPF_STMT(BPF_RET | BPF_K, MAX_K)
                },
-               SKB,
+               CLASSIC,
                { 4, 4, 4, 3, 3 },
                { { 2, 0 }, { 3, 1 }, { 4, MAX_K } },
        },
        {
                "JGE",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LDX | BPF_LEN, 0),
                        BPF_STMT(BPF_LD | BPF_B | BPF_IND, MAX_K),
                        BPF_JUMP(BPF_JMP | BPF_JGE | BPF_K, 1, 1, 0),
@@ -513,13 +541,13 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_RET | BPF_K, 40),
                        BPF_STMT(BPF_RET | BPF_K, MAX_K)
                },
-               SKB,
+               CLASSIC,
                { 1, 2, 3, 4, 5 },
                { { 1, 20 }, { 3, 40 }, { 5, MAX_K } },
        },
        {
                "JSET",
-               .insns = {
+               .u.insns = {
                        BPF_JUMP(BPF_JMP | BPF_JA, 0, 0, 0),
                        BPF_JUMP(BPF_JMP | BPF_JA, 1, 1, 1),
                        BPF_JUMP(BPF_JMP | BPF_JA, 0, 0, 0),
@@ -545,39 +573,39 @@ static struct bpf_test tests[] = {
                        BPF_STMT(BPF_RET | BPF_K, 30),
                        BPF_STMT(BPF_RET | BPF_K, MAX_K)
                },
-               SKB,
+               CLASSIC,
                { 0, 0xAA, 0x55, 1 },
                { { 4, 10 }, { 5, 20 }, { 6, MAX_K } },
        },
        {
                "tcpdump port 22",
-               .insns = {
-                       { 0x28,  0,  0, 0x0000000c },
-                       { 0x15,  0,  8, 0x000086dd },
-                       { 0x30,  0,  0, 0x00000014 },
-                       { 0x15,  2,  0, 0x00000084 },
-                       { 0x15,  1,  0, 0x00000006 },
-                       { 0x15,  0, 17, 0x00000011 },
-                       { 0x28,  0,  0, 0x00000036 },
-                       { 0x15, 14,  0, 0x00000016 },
-                       { 0x28,  0,  0, 0x00000038 },
-                       { 0x15, 12, 13, 0x00000016 },
-                       { 0x15,  0, 12, 0x00000800 },
-                       { 0x30,  0,  0, 0x00000017 },
-                       { 0x15,  2,  0, 0x00000084 },
-                       { 0x15,  1,  0, 0x00000006 },
-                       { 0x15,  0,  8, 0x00000011 },
-                       { 0x28,  0,  0, 0x00000014 },
-                       { 0x45,  6,  0, 0x00001fff },
-                       { 0xb1,  0,  0, 0x0000000e },
-                       { 0x48,  0,  0, 0x0000000e },
-                       { 0x15,  2,  0, 0x00000016 },
-                       { 0x48,  0,  0, 0x00000010 },
-                       { 0x15,  0,  1, 0x00000016 },
-                       { 0x06,  0,  0, 0x0000ffff },
-                       { 0x06,  0,  0, 0x00000000 },
+               .u.insns = {
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 12),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x86dd, 0, 8), /* IPv6 */
+                       BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 20),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x84, 2, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x6, 1, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x11, 0, 17),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 54),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 22, 14, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 56),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 22, 12, 13),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x0800, 0, 12), /* IPv4 */
+                       BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 23),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x84, 2, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x6, 1, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x11, 0, 8),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 20),
+                       BPF_JUMP(BPF_JMP | BPF_JSET | BPF_K, 0x1fff, 6, 0),
+                       BPF_STMT(BPF_LDX | BPF_B | BPF_MSH, 14),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_IND, 14),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 22, 2, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_IND, 16),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 22, 0, 1),
+                       BPF_STMT(BPF_RET | BPF_K, 0xffff),
+                       BPF_STMT(BPF_RET | BPF_K, 0),
                },
-               SKB,
+               CLASSIC,
                /* 3c:07:54:43:e5:76 > 10:bf:48:d6:43:d6, ethertype IPv4(0x0800)
                 * length 114: 10.1.1.149.49700 > 10.1.2.10.22: Flags [P.],
                 * seq 1305692979:1305693027, ack 3650467037, win 65535,
@@ -596,46 +624,46 @@ static struct bpf_test tests[] = {
        },
        {
                "tcpdump complex",
-               .insns = {
+               .u.insns = {
                        /* tcpdump -nei eth0 'tcp port 22 and (((ip[2:2] -
                         * ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0) and
                         * (len > 115 or len < 30000000000)' -d
                         */
-                       { 0x28,  0,  0, 0x0000000c },
-                       { 0x15, 30,  0, 0x000086dd },
-                       { 0x15,  0, 29, 0x00000800 },
-                       { 0x30,  0,  0, 0x00000017 },
-                       { 0x15,  0, 27, 0x00000006 },
-                       { 0x28,  0,  0, 0x00000014 },
-                       { 0x45, 25,  0, 0x00001fff },
-                       { 0xb1,  0,  0, 0x0000000e },
-                       { 0x48,  0,  0, 0x0000000e },
-                       { 0x15,  2,  0, 0x00000016 },
-                       { 0x48,  0,  0, 0x00000010 },
-                       { 0x15,  0, 20, 0x00000016 },
-                       { 0x28,  0,  0, 0x00000010 },
-                       { 0x02,  0,  0, 0x00000001 },
-                       { 0x30,  0,  0, 0x0000000e },
-                       { 0x54,  0,  0, 0x0000000f },
-                       { 0x64,  0,  0, 0x00000002 },
-                       { 0x07,  0,  0, 0x00000005 },
-                       { 0x60,  0,  0, 0x00000001 },
-                       { 0x1c,  0,  0, 0x00000000 },
-                       { 0x02,  0,  0, 0x00000005 },
-                       { 0xb1,  0,  0, 0x0000000e },
-                       { 0x50,  0,  0, 0x0000001a },
-                       { 0x54,  0,  0, 0x000000f0 },
-                       { 0x74,  0,  0, 0x00000002 },
-                       { 0x07,  0,  0, 0x00000009 },
-                       { 0x60,  0,  0, 0x00000005 },
-                       { 0x1d,  4,  0, 0x00000000 },
-                       { 0x80,  0,  0, 0x00000000 },
-                       { 0x25,  1,  0, 0x00000073 },
-                       { 0x35,  1,  0, 0xfc23ac00 },
-                       { 0x06,  0,  0, 0x0000ffff },
-                       { 0x06,  0,  0, 0x00000000 },
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 12),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x86dd, 30, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x800, 0, 29),
+                       BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 23),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 0x6, 0, 27),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 20),
+                       BPF_JUMP(BPF_JMP | BPF_JSET | BPF_K, 0x1fff, 25, 0),
+                       BPF_STMT(BPF_LDX | BPF_B | BPF_MSH, 14),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_IND, 14),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 22, 2, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_IND, 16),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_K, 22, 0, 20),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 16),
+                       BPF_STMT(BPF_ST, 1),
+                       BPF_STMT(BPF_LD | BPF_B | BPF_ABS, 14),
+                       BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0xf),
+                       BPF_STMT(BPF_ALU | BPF_LSH | BPF_K, 2),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0x5), /* libpcap emits K on TAX */
+                       BPF_STMT(BPF_LD | BPF_MEM, 1),
+                       BPF_STMT(BPF_ALU | BPF_SUB | BPF_X, 0),
+                       BPF_STMT(BPF_ST, 5),
+                       BPF_STMT(BPF_LDX | BPF_B | BPF_MSH, 14),
+                       BPF_STMT(BPF_LD | BPF_B | BPF_IND, 26),
+                       BPF_STMT(BPF_ALU | BPF_AND | BPF_K, 0xf0),
+                       BPF_STMT(BPF_ALU | BPF_RSH | BPF_K, 2),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0x9), /* libpcap emits K on TAX */
+                       BPF_STMT(BPF_LD | BPF_MEM, 5),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ | BPF_X, 0, 4, 0),
+                       BPF_STMT(BPF_LD | BPF_LEN, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JGT | BPF_K, 0x73, 1, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JGE | BPF_K, 0xfc23ac00, 1, 0),
+                       BPF_STMT(BPF_RET | BPF_K, 0xffff),
+                       BPF_STMT(BPF_RET | BPF_K, 0),
                },
-               SKB,
+               CLASSIC,
                { 0x10, 0xbf, 0x48, 0xd6, 0x43, 0xd6,
                  0x3c, 0x07, 0x54, 0x43, 0xe5, 0x76,
                  0x08, 0x00,
@@ -649,18 +677,18 @@ static struct bpf_test tests[] = {
        },
        {
                "RET_A",
-               .insns = {
+               .u.insns = {
                        /* check that unitialized X and A contain zeros */
                        BPF_STMT(BPF_MISC | BPF_TXA, 0),
                        BPF_STMT(BPF_RET | BPF_A, 0)
                },
-               SKB,
-               {},
+               CLASSIC,
+               { },
                { {1, 0}, {2, 0} },
        },
        {
                "INT: ADD trivial",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_IMM(BPF_MOV, R1, 1),
                        BPF_ALU64_IMM(BPF_ADD, R1, 2),
                        BPF_ALU64_IMM(BPF_MOV, R2, 3),
@@ -670,13 +698,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU64_REG(BPF_MOV, R0, R1),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 0xfffffffd } }
        },
        {
                "INT: MUL_X",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_IMM(BPF_MOV, R0, -1),
                        BPF_ALU64_IMM(BPF_MOV, R1, -1),
                        BPF_ALU64_IMM(BPF_MOV, R2, 3),
@@ -686,13 +714,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU64_IMM(BPF_MOV, R0, 1),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 1 } }
        },
        {
                "INT: MUL_X2",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU32_IMM(BPF_MOV, R0, -1),
                        BPF_ALU32_IMM(BPF_MOV, R1, -1),
                        BPF_ALU32_IMM(BPF_MOV, R2, 3),
@@ -703,13 +731,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU32_IMM(BPF_MOV, R0, 1),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 1 } }
        },
        {
                "INT: MUL32_X",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU32_IMM(BPF_MOV, R0, -1),
                        BPF_ALU64_IMM(BPF_MOV, R1, -1),
                        BPF_ALU32_IMM(BPF_MOV, R2, 3),
@@ -720,7 +748,7 @@ static struct bpf_test tests[] = {
                        BPF_ALU32_IMM(BPF_MOV, R0, 1),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 1 } }
        },
@@ -730,7 +758,7 @@ static struct bpf_test tests[] = {
                 * different asm code.
                 */
                "INT: ADD 64-bit",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_IMM(BPF_MOV, R0, 0),
                        BPF_ALU64_IMM(BPF_MOV, R1, 1),
                        BPF_ALU64_IMM(BPF_MOV, R2, 2),
@@ -882,13 +910,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU64_REG(BPF_MOV, R0, R9),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 2957380 } }
        },
        {
                "INT: ADD 32-bit",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU32_IMM(BPF_MOV, R0, 20),
                        BPF_ALU32_IMM(BPF_MOV, R1, 1),
                        BPF_ALU32_IMM(BPF_MOV, R2, 2),
@@ -1028,13 +1056,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU32_REG(BPF_MOV, R0, R9),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 2957380 } }
        },
        {       /* Mainly checking JIT here. */
                "INT: SUB",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_IMM(BPF_MOV, R0, 0),
                        BPF_ALU64_IMM(BPF_MOV, R1, 1),
                        BPF_ALU64_IMM(BPF_MOV, R2, 2),
@@ -1161,13 +1189,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU64_REG(BPF_SUB, R0, R9),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 11 } }
        },
        {       /* Mainly checking JIT here. */
                "INT: XOR",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_REG(BPF_SUB, R0, R0),
                        BPF_ALU64_REG(BPF_XOR, R1, R1),
                        BPF_JMP_REG(BPF_JEQ, R0, R1, 1),
@@ -1227,13 +1255,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU64_IMM(BPF_MOV, R0, 1),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 1 } }
        },
        {       /* Mainly checking JIT here. */
                "INT: MUL",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_IMM(BPF_MOV, R0, 11),
                        BPF_ALU64_IMM(BPF_MOV, R1, 1),
                        BPF_ALU64_IMM(BPF_MOV, R2, 2),
@@ -1289,13 +1317,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU64_REG(BPF_MOV, R0, R2),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, 0x35d97ef2 } }
        },
        {
                "INT: ALU MIX",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_IMM(BPF_MOV, R0, 11),
                        BPF_ALU64_IMM(BPF_ADD, R0, -1),
                        BPF_ALU64_IMM(BPF_MOV, R2, 2),
@@ -1309,13 +1337,13 @@ static struct bpf_test tests[] = {
                        BPF_ALU64_IMM(BPF_MOV, R0, -1),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { },
                { { 0, -1 } }
        },
        {
                "INT: DIV + ABS",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_REG(BPF_MOV, R6, R1),
                        BPF_LD_ABS(BPF_B, 3),
                        BPF_ALU64_IMM(BPF_MOV, R2, 2),
@@ -1326,79 +1354,354 @@ static struct bpf_test tests[] = {
                        BPF_LD_IND(BPF_B, R8, -70),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { 10, 20, 30, 40, 50 },
                { { 4, 0 }, { 5, 10 } }
        },
        {
                "INT: DIV by zero",
-               .insns_int = {
+               .u.insns_int = {
                        BPF_ALU64_REG(BPF_MOV, R6, R1),
                        BPF_ALU64_IMM(BPF_MOV, R7, 0),
                        BPF_LD_ABS(BPF_B, 3),
                        BPF_ALU32_REG(BPF_DIV, R0, R7),
                        BPF_EXIT_INSN(),
                },
-               SKB_INT,
+               INTERNAL,
                { 10, 20, 30, 40, 50 },
                { { 3, 0 }, { 4, 0 } }
        },
        {
                "check: missing ret",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_LD | BPF_IMM, 1),
                },
-               EXPECTED_FAIL,
+               CLASSIC | FLAG_NO_DATA | FLAG_EXPECTED_FAIL,
                { },
                { }
        },
        {
                "check: div_k_0",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_ALU | BPF_DIV | BPF_K, 0),
                        BPF_STMT(BPF_RET | BPF_K, 0)
                },
-               EXPECTED_FAIL,
+               CLASSIC | FLAG_NO_DATA | FLAG_EXPECTED_FAIL,
                { },
                { }
        },
        {
                "check: unknown insn",
-               .insns = {
+               .u.insns = {
                        /* seccomp insn, rejected in socket filter */
                        BPF_STMT(BPF_LDX | BPF_W | BPF_ABS, 0),
                        BPF_STMT(BPF_RET | BPF_K, 0)
                },
-               EXPECTED_FAIL,
+               CLASSIC | FLAG_EXPECTED_FAIL,
                { },
                { }
        },
        {
                "check: out of range spill/fill",
-               .insns = {
+               .u.insns = {
                        BPF_STMT(BPF_STX, 16),
                        BPF_STMT(BPF_RET | BPF_K, 0)
                },
-               EXPECTED_FAIL,
+               CLASSIC | FLAG_NO_DATA | FLAG_EXPECTED_FAIL,
                { },
                { }
        },
+       {
+               "JUMPS + HOLES",
+               .u.insns = {
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JGE, 0, 13, 15),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ, 0x90c2894d, 3, 4),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ, 0x90c2894d, 1, 2),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JGE, 0, 14, 15),
+                       BPF_JUMP(BPF_JMP | BPF_JGE, 0, 13, 14),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ, 0x2ac28349, 2, 3),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ, 0x2ac28349, 1, 2),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JGE, 0, 14, 15),
+                       BPF_JUMP(BPF_JMP | BPF_JGE, 0, 13, 14),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ, 0x90d2ff41, 2, 3),
+                       BPF_JUMP(BPF_JMP | BPF_JEQ, 0x90d2ff41, 1, 2),
+                       BPF_STMT(BPF_LD | BPF_H | BPF_ABS, 0),
+                       BPF_STMT(BPF_RET | BPF_A, 0),
+                       BPF_STMT(BPF_RET | BPF_A, 0),
+               },
+               CLASSIC,
+               { 0x00, 0x1b, 0x21, 0x3c, 0x9d, 0xf8,
+                 0x90, 0xe2, 0xba, 0x0a, 0x56, 0xb4,
+                 0x08, 0x00,
+                 0x45, 0x00, 0x00, 0x28, 0x00, 0x00,
+                 0x20, 0x00, 0x40, 0x11, 0x00, 0x00, /* IP header */
+                 0xc0, 0xa8, 0x33, 0x01,
+                 0xc0, 0xa8, 0x33, 0x02,
+                 0xbb, 0xb6,
+                 0xa9, 0xfa,
+                 0x00, 0x14, 0x00, 0x00,
+                 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc,
+                 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc,
+                 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc,
+                 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc,
+                 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc,
+                 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc,
+                 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc,
+                 0xcc, 0xcc, 0xcc, 0xcc },
+               { { 88, 0x001b } }
+       },
+       {
+               "check: RET X",
+               .u.insns = {
+                       BPF_STMT(BPF_RET | BPF_X, 0),
+               },
+               CLASSIC | FLAG_NO_DATA | FLAG_EXPECTED_FAIL,
+               { },
+               { },
+       },
+       {
+               "check: LDX + RET X",
+               .u.insns = {
+                       BPF_STMT(BPF_LDX | BPF_IMM, 42),
+                       BPF_STMT(BPF_RET | BPF_X, 0),
+               },
+               CLASSIC | FLAG_NO_DATA | FLAG_EXPECTED_FAIL,
+               { },
+               { },
+       },
+       {       /* Mainly checking JIT here. */
+               "M[]: alt STX + LDX",
+               .u.insns = {
+                       BPF_STMT(BPF_LDX | BPF_IMM, 100),
+                       BPF_STMT(BPF_STX, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 0),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 1),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 1),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 2),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 2),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 3),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 3),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 4),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 4),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 5),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 5),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 6),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 6),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 7),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 7),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 8),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 8),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 9),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 9),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 10),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 10),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 11),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 11),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 12),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 12),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 13),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 13),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 14),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 14),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_STX, 15),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 15),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, 1),
+                       BPF_STMT(BPF_MISC | BPF_TAX, 0),
+                       BPF_STMT(BPF_RET | BPF_A, 0),
+               },
+               CLASSIC | FLAG_NO_DATA,
+               { },
+               { { 0, 116 } },
+       },
+       {       /* Mainly checking JIT here. */
+               "M[]: full STX + full LDX",
+               .u.insns = {
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xbadfeedb),
+                       BPF_STMT(BPF_STX, 0),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xecabedae),
+                       BPF_STMT(BPF_STX, 1),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xafccfeaf),
+                       BPF_STMT(BPF_STX, 2),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xbffdcedc),
+                       BPF_STMT(BPF_STX, 3),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xfbbbdccb),
+                       BPF_STMT(BPF_STX, 4),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xfbabcbda),
+                       BPF_STMT(BPF_STX, 5),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xaedecbdb),
+                       BPF_STMT(BPF_STX, 6),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xadebbade),
+                       BPF_STMT(BPF_STX, 7),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xfcfcfaec),
+                       BPF_STMT(BPF_STX, 8),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xbcdddbdc),
+                       BPF_STMT(BPF_STX, 9),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xfeefdfac),
+                       BPF_STMT(BPF_STX, 10),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xcddcdeea),
+                       BPF_STMT(BPF_STX, 11),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xaccfaebb),
+                       BPF_STMT(BPF_STX, 12),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xbdcccdcf),
+                       BPF_STMT(BPF_STX, 13),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xaaedecde),
+                       BPF_STMT(BPF_STX, 14),
+                       BPF_STMT(BPF_LDX | BPF_IMM, 0xfaeacdad),
+                       BPF_STMT(BPF_STX, 15),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 0),
+                       BPF_STMT(BPF_MISC | BPF_TXA, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 1),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 2),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 3),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 4),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 5),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 6),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 7),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 8),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 9),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 10),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 11),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 12),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 13),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 14),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_LDX | BPF_MEM, 15),
+                       BPF_STMT(BPF_ALU | BPF_ADD | BPF_X, 0),
+                       BPF_STMT(BPF_RET | BPF_A, 0),
+               },
+               CLASSIC | FLAG_NO_DATA,
+               { },
+               { { 0, 0x2a5a5e5 } },
+       },
+       {
+               "check: SKF_AD_MAX",
+               .u.insns = {
+                       BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
+                                SKF_AD_OFF + SKF_AD_MAX),
+                       BPF_STMT(BPF_RET | BPF_A, 0),
+               },
+               CLASSIC | FLAG_NO_DATA | FLAG_EXPECTED_FAIL,
+               { },
+               { },
+       },
+       {       /* Passes checker but fails during runtime. */
+               "LD [SKF_AD_OFF-1]",
+               .u.insns = {
+                       BPF_STMT(BPF_LD | BPF_W | BPF_ABS,
+                                SKF_AD_OFF - 1),
+                       BPF_STMT(BPF_RET | BPF_K, 1),
+               },
+               CLASSIC,
+               { },
+               { { 1, 0 } },
+       },
 };
 
-static int get_length(struct sock_filter *fp)
-{
-       int len = 0;
-
-       while (fp->code != 0 || fp->k != 0) {
-               fp++;
-               len++;
-       }
-
-       return len;
-}
+static struct net_device dev;
 
-struct net_device dev;
-struct sk_buff *populate_skb(char *buf, int size)
+static struct sk_buff *populate_skb(char *buf, int size)
 {
        struct sk_buff *skb;
 
@@ -1410,6 +1713,8 @@ struct sk_buff *populate_skb(char *buf, int size)
                return NULL;
 
        memcpy(__skb_put(skb, size), buf, size);
+
+       /* Initialize a fake skb with test pattern. */
        skb_reset_mac_header(skb);
        skb->protocol = htons(ETH_P_IP);
        skb->pkt_type = SKB_TYPE;
@@ -1425,43 +1730,148 @@ struct sk_buff *populate_skb(char *buf, int size)
        return skb;
 }
 
-static int run_one(struct sk_filter *fp, struct bpf_test *t)
+static void *generate_test_data(struct bpf_test *test, int sub)
 {
-       u64 start, finish, res, cnt = 100000;
-       int err_cnt = 0, err, i, j;
-       u32 ret = 0;
-       void *data;
+       if (test->aux & FLAG_NO_DATA)
+               return NULL;
 
-       for (i = 0; i < MAX_SUBTESTS; i++) {
-               if (t->test[i].data_size == 0 &&
-                   t->test[i].result == 0)
+       /* Test case expects an skb, so populate one. Various
+        * subtests generate skbs of different sizes based on
+        * the same data.
+        */
+       return populate_skb(test->data, test->test[sub].data_size);
+}
+
+static void release_test_data(const struct bpf_test *test, void *data)
+{
+       if (test->aux & FLAG_NO_DATA)
+               return;
+
+       kfree_skb(data);
+}
+
+static int probe_filter_length(struct sock_filter *fp)
+{
+       int len = 0;
+
+       for (len = MAX_INSNS - 1; len > 0; --len)
+               if (fp[len].code != 0 || fp[len].k != 0)
                        break;
-               if (t->data_type == SKB ||
-                   t->data_type == SKB_INT) {
-                       data = populate_skb(t->data, t->test[i].data_size);
-                       if (!data)
-                               return -ENOMEM;
-               } else {
-                       data = NULL;
+
+       return len + 1;
+}
+
+static struct sk_filter *generate_filter(int which, int *err)
+{
+       struct sk_filter *fp;
+       struct sock_fprog_kern fprog;
+       unsigned int flen = probe_filter_length(tests[which].u.insns);
+       __u8 test_type = tests[which].aux & TEST_TYPE_MASK;
+
+       switch (test_type) {
+       case CLASSIC:
+               fprog.filter = tests[which].u.insns;
+               fprog.len = flen;
+
+               *err = sk_unattached_filter_create(&fp, &fprog);
+               if (tests[which].aux & FLAG_EXPECTED_FAIL) {
+                       if (*err == -EINVAL) {
+                               pr_cont("PASS\n");
+                               /* Verifier rejected filter as expected. */
+                               *err = 0;
+                               return NULL;
+                       } else {
+                               pr_cont("UNEXPECTED_PASS\n");
+                               /* Verifier didn't reject the test that's
+                                * bad enough, just return!
+                                */
+                               *err = -EINVAL;
+                               return NULL;
+                       }
+               }
+               /* We don't expect to fail. */
+               if (*err) {
+                       pr_cont("FAIL to attach err=%d len=%d\n",
+                               *err, fprog.len);
+                       return NULL;
                }
+               break;
 
-               start = ktime_to_us(ktime_get());
-               for (j = 0; j < cnt; j++)
-                       ret = SK_RUN_FILTER(fp, data);
-               finish = ktime_to_us(ktime_get());
+       case INTERNAL:
+               fp = kzalloc(sk_filter_size(flen), GFP_KERNEL);
+               if (fp == NULL) {
+                       pr_cont("UNEXPECTED_FAIL no memory left\n");
+                       *err = -ENOMEM;
+                       return NULL;
+               }
+
+               fp->len = flen;
+               memcpy(fp->insnsi, tests[which].u.insns_int,
+                      fp->len * sizeof(struct sock_filter_int));
 
-               res = (finish - start) * 1000;
-               do_div(res, cnt);
+               sk_filter_select_runtime(fp);
+               break;
+       }
 
-               err = ret != t->test[i].result;
-               if (!err)
-                       pr_cont("%lld ", res);
+       *err = 0;
+       return fp;
+}
 
-               if (t->data_type == SKB || t->data_type == SKB_INT)
-                       kfree_skb(data);
+static void release_filter(struct sk_filter *fp, int which)
+{
+       __u8 test_type = tests[which].aux & TEST_TYPE_MASK;
 
-               if (err) {
-                       pr_cont("ret %d != %d ", ret, t->test[i].result);
+       switch (test_type) {
+       case CLASSIC:
+               sk_unattached_filter_destroy(fp);
+               break;
+       case INTERNAL:
+               sk_filter_free(fp);
+               break;
+       }
+}
+
+static int __run_one(const struct sk_filter *fp, const void *data,
+                    int runs, u64 *duration)
+{
+       u64 start, finish;
+       int ret, i;
+
+       start = ktime_to_us(ktime_get());
+
+       for (i = 0; i < runs; i++)
+               ret = SK_RUN_FILTER(fp, data);
+
+       finish = ktime_to_us(ktime_get());
+
+       *duration = (finish - start) * 1000ULL;
+       do_div(*duration, runs);
+
+       return ret;
+}
+
+static int run_one(const struct sk_filter *fp, struct bpf_test *test)
+{
+       int err_cnt = 0, i, runs = MAX_TESTRUNS;
+
+       for (i = 0; i < MAX_SUBTESTS; i++) {
+               void *data;
+               u64 duration;
+               u32 ret;
+
+               if (test->test[i].data_size == 0 &&
+                   test->test[i].result == 0)
+                       break;
+
+               data = generate_test_data(test, i);
+               ret = __run_one(fp, data, runs, &duration);
+               release_test_data(test, data);
+
+               if (ret == test->test[i].result) {
+                       pr_cont("%lld ", duration);
+               } else {
+                       pr_cont("ret %d != %d ", ret,
+                               test->test[i].result);
                        err_cnt++;
                }
        }
@@ -1471,65 +1881,37 @@ static int run_one(struct sk_filter *fp, struct bpf_test *t)
 
 static __init int test_bpf(void)
 {
-       struct sk_filter *fp, *fp_ext = NULL;
-       struct sock_fprog fprog;
-       int err, i, err_cnt = 0;
+       int i, err_cnt = 0, pass_cnt = 0;
 
        for (i = 0; i < ARRAY_SIZE(tests); i++) {
-               pr_info("#%d %s ", i, tests[i].descr);
+               struct sk_filter *fp;
+               int err;
 
-               fprog.filter = tests[i].insns;
-               fprog.len = get_length(fprog.filter);
+               pr_info("#%d %s ", i, tests[i].descr);
 
-               if (tests[i].data_type == SKB_INT) {
-                       fp_ext = kzalloc(4096, GFP_KERNEL);
-                       if (!fp_ext)
-                               return -ENOMEM;
-                       fp = fp_ext;
-                       memcpy(fp_ext->insns, tests[i].insns_int,
-                              fprog.len * 8);
-                       fp->len = fprog.len;
-                       sk_filter_select_runtime(fp);
-               } else {
-                       err = sk_unattached_filter_create(&fp, &fprog);
-                       if (tests[i].data_type == EXPECTED_FAIL) {
-                               if (err == -EINVAL) {
-                                       pr_cont("PASS\n");
-                                       continue;
-                               } else {
-                                       pr_cont("UNEXPECTED_PASS\n");
-                                       /* verifier didn't reject the test
-                                        * that's bad enough, just return
-                                        */
-                                       return -EINVAL;
-                               }
+               fp = generate_filter(i, &err);
+               if (fp == NULL) {
+                       if (err == 0) {
+                               pass_cnt++;
+                               continue;
                        }
-                       if (err) {
-                               pr_cont("FAIL to attach err=%d len=%d\n",
-                                       err, fprog.len);
-                               return err;
-                       }
-               }
 
+                       return err;
+               }
                err = run_one(fp, &tests[i]);
-
-               if (tests[i].data_type != SKB_INT)
-                       sk_unattached_filter_destroy(fp);
-               else
-                       sk_filter_free(fp);
+               release_filter(fp, i);
 
                if (err) {
-                       pr_cont("FAIL %d\n", err);
+                       pr_cont("FAIL (%d times)\n", err);
                        err_cnt++;
                } else {
                        pr_cont("PASS\n");
+                       pass_cnt++;
                }
        }
 
-       if (err_cnt)
-               return -EINVAL;
-       else
-               return 0;
+       pr_info("Summary: %d PASSED, %d FAILED\n", pass_cnt, err_cnt);
+       return err_cnt ? -EINVAL : 0;
 }
 
 static int __init test_bpf_init(void)
@@ -1543,4 +1925,5 @@ static void __exit test_bpf_exit(void)
 
 module_init(test_bpf_init);
 module_exit(test_bpf_exit);
+
 MODULE_LICENSE("GPL");