linfeng fae6e9ade4
feat(ebpf):[WIP] add eBPF support (#948)
* feat(kprobe): Add basic kprobe support for x86_64

* feat: add ebpf support (#912)

- 实现bpf()一部分命令,包括几种基本map,相关的helper函数
- 实现部分perf相关的数据结构
- 暂时为文件实现简单mmap
- 实现一个使用kprobe统计syscall 调用次数的ebpf程序

对eBPF支持程度(基本):

- 简单的eBPF程序(没有指定特殊的Map)
- 使用内核已经实现的Map的eBPF程序
- 可以和kprobe配合使用
- 内核Map相关的接口定义已经实现,添加新的Map较为简单

不支持的功能:
- 区分不同的eBPF程序类型(Network/Cgroup)并限定可调用的helper函数集
- 与内核其它跟踪机制配合(tracepoint)
- 其它helper和Map


todo

- [ ]  修改mmap,需要讨论,因为这个和块缓存层相关
- [x]  添加文档
- [x]  修复可能的错误
- [x] 增加rbpf版本信息

* feat: add /sys/devices/system/cpu/possible file

* feat: add /sys/devices/system/cpu/online
2024-10-25 15:59:57 +08:00

1783 lines
70 KiB
Rust

// SPDX-License-Identifier: (Apache-2.0 OR MIT)
// Derived from uBPF <https://github.com/iovisor/ubpf>
// Copyright 2016 6WIND S.A. <quentin.monnet@6wind.com>
// Copyright 2023 Isovalent, Inc. <quentin@isovalent.com>
//! Virtual machine and JIT compiler for eBPF programs.
#![doc(
html_logo_url = "https://raw.githubusercontent.com/qmonnet/rbpf/main/misc/rbpf.png",
html_favicon_url = "https://raw.githubusercontent.com/qmonnet/rbpf/main/misc/rbpf.ico"
)]
#![warn(missing_docs)]
// There are unused mut warnings due to unsafe code.
#![allow(unused_mut)]
// Allows old-style clippy
#![allow(renamed_and_removed_lints)]
#![cfg_attr(
clippy,
allow(
redundant_field_names,
single_match,
cast_lossless,
doc_markdown,
match_same_arms,
unreadable_literal
)
)]
// Configures the crate to be `no_std` when `std` feature is disabled.
#![cfg_attr(not(feature = "std"), no_std)]
extern crate alloc;
use alloc::{collections::BTreeMap, format, vec, vec::Vec};
use byteorder::{ByteOrder, LittleEndian};
type HashMap<K, V> = BTreeMap<K, V>;
#[cfg(feature = "cranelift")]
type HashSet<T> = alloc::collections::BTreeSet<T>;
mod asm_parser;
pub mod assembler;
#[cfg(feature = "cranelift")]
mod cranelift;
pub mod disassembler;
pub mod ebpf;
pub mod helpers;
pub mod insn_builder;
mod interpreter;
#[cfg(all(not(windows), feature = "std"))]
mod jit;
#[cfg(not(feature = "std"))]
mod no_std_error;
mod stack;
mod verifier;
#[cfg(feature = "std")]
pub use std::io::{Error, ErrorKind};
/// In no_std we use a custom implementation of the error which acts as a
/// replacement for the io Error.
#[cfg(not(feature = "std"))]
pub use crate::no_std_error::{Error, ErrorKind};
/// eBPF verification function that returns an error if the program does not meet its requirements.
///
/// Some examples of things the verifier may reject the program for:
///
/// - Program does not terminate.
/// - Unknown instructions.
/// - Bad formed instruction.
/// - Unknown eBPF helper index.
pub type Verifier = fn(prog: &[u8]) -> Result<(), Error>;
/// eBPF helper function.
pub type Helper = fn(u64, u64, u64, u64, u64) -> u64;
// A metadata buffer with two offset indications. It can be used in one kind of eBPF VM to simulate
// the use of a metadata buffer each time the program is executed, without the user having to
// actually handle it. The offsets are used to tell the VM where in the buffer the pointers to
// packet data start and end should be stored each time the program is run on a new packet.
struct MetaBuff {
data_offset: usize,
data_end_offset: usize,
buffer: Vec<u8>,
}
/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
/// on a metadata buffer containing pointers to packet data.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff at offset 8 into R1.
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
///
/// // Just for the example we create our metadata buffer from scratch, and we store the pointers
/// // to packet data start and end in it.
/// let mut mbuff = [0u8; 32];
/// unsafe {
/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
/// *data = mem.as_ptr() as u64;
/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
/// }
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
///
/// // Provide both a reference to the packet data, and to the metadata buffer.
/// let res = vm.execute_program(mem, &mut mbuff).unwrap();
/// assert_eq!(res, 0x2211);
/// ```
pub struct EbpfVmMbuff<'a> {
prog: Option<&'a [u8]>,
verifier: Verifier,
#[cfg(all(not(windows), feature = "std"))]
jit: Option<jit::JitMemory<'a>>,
#[cfg(feature = "cranelift")]
cranelift_prog: Option<cranelift::CraneliftProgram>,
helpers: HashMap<u32, ebpf::Helper>,
}
impl<'a> EbpfVmMbuff<'a> {
/// Create a new virtual machine instance, and load an eBPF program into that instance.
/// When attempting to load the program, it passes through a simple verifier.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
/// ```
pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmMbuff<'a>, Error> {
if let Some(prog) = prog {
verifier::check(prog)?;
}
Ok(EbpfVmMbuff {
prog,
verifier: verifier::check,
#[cfg(all(not(windows), feature = "std"))]
jit: None,
#[cfg(feature = "cranelift")]
cranelift_prog: None,
helpers: HashMap::new(),
})
}
/// Load a new eBPF program into the virtual machine instance.
///
/// # Examples
///
/// ```
/// let prog1 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let prog2 = &[
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
/// vm.set_program(prog2).unwrap();
/// ```
pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
(self.verifier)(prog)?;
self.prog = Some(prog);
Ok(())
}
/// Set a new verifier function. The function should return an `Error` if the program should be
/// rejected by the virtual machine. If a program has been loaded to the VM already, the
/// verifier is immediately run.
///
/// # Examples
///
/// ```
/// use rbpf::{Error, ErrorKind};
/// use rbpf::ebpf;
///
/// // Define a simple verifier function.
/// fn verifier(prog: &[u8]) -> Result<(), Error> {
/// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
/// if last_insn.opc != ebpf::EXIT {
/// return Err(Error::new(ErrorKind::Other,
/// "[Verifier] Error: program does not end with “EXIT” instruction"));
/// }
/// Ok(())
/// }
///
/// let prog1 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
/// // Change the verifier.
/// vm.set_verifier(verifier).unwrap();
/// ```
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
if let Some(prog) = self.prog {
verifier(prog)?;
}
self.verifier = verifier;
Ok(())
}
/// Register a built-in or user-defined helper function in order to use it later from within
/// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
///
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
/// program. You should be able to change registered helpers after compiling, but not to add
/// new ones (i.e. with new keys).
///
/// # Examples
///
/// ```
/// use rbpf::helpers;
///
/// // This program was compiled with clang, from a C program containing the following single
/// // instruction: `return bpf_trace_printk("foo %c %c %c\n", 10, 1, 2, 3);`
/// let prog = &[
/// 0x18, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load 0 as u64 into r1 (That would be
/// 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // replaced by tc by the address of
/// // the format string, in the .map
/// // section of the ELF file).
/// 0xb7, 0x02, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, // mov r2, 10
/// 0xb7, 0x03, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // mov r3, 1
/// 0xb7, 0x04, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, // mov r4, 2
/// 0xb7, 0x05, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // mov r5, 3
/// 0x85, 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, // call helper with key 6
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
///
/// // Register a helper.
/// // On running the program this helper will print the content of registers r3, r4 and r5 to
/// // standard output.
/// # #[cfg(feature = "std")]
/// vm.register_helper(6, helpers::bpf_trace_printf).unwrap();
/// ```
pub fn register_helper(&mut self, key: u32, function: Helper) -> Result<(), Error> {
self.helpers.insert(key, function);
Ok(())
}
/// Execute the program loaded, with the given packet data and metadata buffer.
///
/// If the program is made to be compatible with Linux kernel, it is expected to load the
/// address of the beginning and of the end of the memory area used for packet data from the
/// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
/// pointers are correctly stored in the buffer.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
///
/// // Just for the example we create our metadata buffer from scratch, and we store the
/// // pointers to packet data start and end in it.
/// let mut mbuff = [0u8; 32];
/// unsafe {
/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
/// *data = mem.as_ptr() as u64;
/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
/// }
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
///
/// // Provide both a reference to the packet data, and to the metadata buffer.
/// let res = vm.execute_program(mem, &mut mbuff).unwrap();
/// assert_eq!(res, 0x2211);
/// ```
pub fn execute_program(&self, mem: &[u8], mbuff: &[u8]) -> Result<u64, Error> {
interpreter::execute_program(self.prog, mem, mbuff, &self.helpers)
}
/// JIT-compile the loaded program. No argument required for this.
///
/// If using helper functions, be sure to register them into the VM before calling this
/// function.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
///
/// vm.jit_compile();
/// ```
#[cfg(all(not(windows), feature = "std"))]
pub fn jit_compile(&mut self) -> Result<(), Error> {
let prog = match self.prog {
Some(prog) => prog,
None => Err(Error::new(
ErrorKind::Other,
"Error: No program set, call prog_set() to load one",
))?,
};
self.jit = Some(jit::JitMemory::new(prog, &self.helpers, true, false)?);
Ok(())
}
/// Execute the previously JIT-compiled program, with the given packet data and metadata
/// buffer, in a manner very similar to `execute_program()`.
///
/// If the program is made to be compatible with Linux kernel, it is expected to load the
/// address of the beginning and of the end of the memory area used for packet data from the
/// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
/// pointers are correctly stored in the buffer.
///
/// # Safety
///
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
/// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
/// very bad (program may segfault). It may be wise to check that the program works with the
/// interpreter before running the JIT-compiled version of it.
///
/// For this reason the function should be called from within an `unsafe` bloc.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into r1.
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
///
/// // Just for the example we create our metadata buffer from scratch, and we store the
/// // pointers to packet data start and end in it.
/// let mut mbuff = [0u8; 32];
/// unsafe {
/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
/// *data = mem.as_ptr() as u64;
/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
/// }
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
///
/// # #[cfg(all(not(windows), feature = "std"))]
/// vm.jit_compile();
///
/// // Provide both a reference to the packet data, and to the metadata buffer.
/// # #[cfg(all(not(windows), feature = "std"))]
/// unsafe {
/// let res = vm.execute_program_jit(mem, &mut mbuff).unwrap();
/// assert_eq!(res, 0x2211);
/// }
/// ```
#[cfg(all(not(windows), feature = "std"))]
pub unsafe fn execute_program_jit(
&self,
mem: &mut [u8],
mbuff: &'a mut [u8],
) -> Result<u64, Error> {
// If packet data is empty, do not send the address of an empty slice; send a null pointer
// as first argument instead, as this is uBPF's behavior (empty packet should not happen
// in the kernel; anyway the verifier would prevent the use of uninitialized registers).
// See `mul_loop` test.
let mem_ptr = match mem.len() {
0 => std::ptr::null_mut(),
_ => mem.as_ptr() as *mut u8,
};
// The last two arguments are not used in this function. They would be used if there was a
// need to indicate to the JIT at which offset in the mbuff mem_ptr and mem_ptr + mem.len()
// should be stored; this is what happens with struct EbpfVmFixedMbuff.
match &self.jit {
Some(jit) => Ok(jit.get_prog()(
mbuff.as_ptr() as *mut u8,
mbuff.len(),
mem_ptr,
mem.len(),
0,
0,
)),
None => Err(Error::new(
ErrorKind::Other,
"Error: program has not been JIT-compiled",
)),
}
}
/// Compile the loaded program using the Cranelift JIT.
///
/// If using helper functions, be sure to register them into the VM before calling this
/// function.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
///
/// vm.cranelift_compile();
/// ```
#[cfg(feature = "cranelift")]
pub fn cranelift_compile(&mut self) -> Result<(), Error> {
use crate::cranelift::CraneliftCompiler;
let prog = match self.prog {
Some(prog) => prog,
None => Err(Error::new(
ErrorKind::Other,
"Error: No program set, call prog_set() to load one",
))?,
};
let mut compiler = CraneliftCompiler::new(self.helpers.clone());
let program = compiler.compile_function(prog)?;
self.cranelift_prog = Some(program);
Ok(())
}
/// Execute the previously compiled program, with the given packet data and metadata
/// buffer, in a manner very similar to `execute_program()`.
///
/// If the program is made to be compatible with Linux kernel, it is expected to load the
/// address of the beginning and of the end of the memory area used for packet data from the
/// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
/// pointers are correctly stored in the buffer.
///
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into r1.
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
///
/// // Just for the example we create our metadata buffer from scratch, and we store the
/// // pointers to packet data start and end in it.
/// let mut mbuff = [0u8; 32];
/// unsafe {
/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
/// *data = mem.as_ptr() as u64;
/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
/// }
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
///
/// vm.cranelift_compile();
///
/// // Provide both a reference to the packet data, and to the metadata buffer.
/// let res = vm.execute_program_cranelift(mem, &mut mbuff).unwrap();
/// assert_eq!(res, 0x2211);
/// ```
#[cfg(feature = "cranelift")]
pub fn execute_program_cranelift(
&self,
mem: &mut [u8],
mbuff: &'a mut [u8],
) -> Result<u64, Error> {
// If packet data is empty, do not send the address of an empty slice; send a null pointer
// as first argument instead, as this is uBPF's behavior (empty packet should not happen
// in the kernel; anyway the verifier would prevent the use of uninitialized registers).
// See `mul_loop` test.
let mem_ptr = match mem.len() {
0 => core::ptr::null_mut(),
_ => mem.as_ptr() as *mut u8,
};
// The last two arguments are not used in this function. They would be used if there was a
// need to indicate to the JIT at which offset in the mbuff mem_ptr and mem_ptr + mem.len()
// should be stored; this is what happens with struct EbpfVmFixedMbuff.
match &self.cranelift_prog {
Some(prog) => {
Ok(prog.execute(mem_ptr, mem.len(), mbuff.as_ptr() as *mut u8, mbuff.len()))
}
None => Err(Error::new(
ErrorKind::Other,
"Error: program has not been compiled with cranelift",
)),
}
}
}
/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
/// on a metadata buffer containing pointers to packet data, but it internally handles the buffer
/// so as to save the effort to manually handle the metadata buffer for the user.
///
/// This struct implements a static internal buffer that is passed to the program. The user has to
/// indicate the offset values at which the eBPF program expects to find the start and the end of
/// packet data in the buffer. On calling the `execute_program()` or `execute_program_jit()` functions, the
/// struct automatically updates the addresses in this static buffer, at the appointed offsets, for
/// the start and the end of the packet data the program is called upon.
///
/// # Examples
///
/// This was compiled with clang from the following program, in C:
///
/// ```c
/// #include <linux/bpf.h>
/// #include "path/to/linux/samples/bpf/bpf_helpers.h"
///
/// SEC(".classifier")
/// int classifier(struct __sk_buff *skb)
/// {
/// void *data = (void *)(long)skb->data;
/// void *data_end = (void *)(long)skb->data_end;
///
/// // Check program is long enough.
/// if (data + 5 > data_end)
/// return 0;
///
/// return *((char *)data + 5);
/// }
/// ```
///
/// Some small modifications have been brought to have it work, see comments.
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// // Here opcode 0x61 had to be replace by 0x79 so as to load a 8-bytes long address.
/// // Also, offset 0x4c had to be replace with e.g. 0x40 so as to prevent the two pointers
/// // from overlapping in the buffer.
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load pointer to mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// // Here opcode 0x61 had to be replace by 0x79 so as to load a 8-bytes long address.
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load ptr to mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
/// 0x67, 0x00, 0x00, 0x00, 0x38, 0x00, 0x00, 0x00, // r0 >>= 56
/// 0xc7, 0x00, 0x00, 0x00, 0x38, 0x00, 0x00, 0x00, // r0 <<= 56 (arsh) extend byte sign to u64
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem1 = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
/// let mem2 = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
/// ];
///
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
///
/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
/// let res = vm.execute_program(mem1).unwrap();
/// assert_eq!(res, 0xffffffffffffffdd);
///
/// let res = vm.execute_program(mem2).unwrap();
/// assert_eq!(res, 0x27);
/// ```
pub struct EbpfVmFixedMbuff<'a> {
parent: EbpfVmMbuff<'a>,
mbuff: MetaBuff,
}
impl<'a> EbpfVmFixedMbuff<'a> {
/// Create a new virtual machine instance, and load an eBPF program into that instance.
/// When attempting to load the program, it passes through a simple verifier.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
/// ```
pub fn new(
prog: Option<&'a [u8]>,
data_offset: usize,
data_end_offset: usize,
) -> Result<EbpfVmFixedMbuff<'a>, Error> {
let parent = EbpfVmMbuff::new(prog)?;
let get_buff_len = |x: usize, y: usize| if x >= y { x + 8 } else { y + 8 };
let buffer = vec![0u8; get_buff_len(data_offset, data_end_offset)];
let mbuff = MetaBuff {
data_offset,
data_end_offset,
buffer,
};
Ok(EbpfVmFixedMbuff { parent, mbuff })
}
/// Load a new eBPF program into the virtual machine instance.
///
/// At the same time, load new offsets for storing pointers to start and end of packet data in
/// the internal metadata buffer.
///
/// # Examples
///
/// ```
/// let prog1 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let prog2 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27,
/// ];
///
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog1), 0, 0).unwrap();
/// vm.set_program(prog2, 0x40, 0x50);
///
/// let res = vm.execute_program(mem).unwrap();
/// assert_eq!(res, 0x27);
/// ```
pub fn set_program(
&mut self,
prog: &'a [u8],
data_offset: usize,
data_end_offset: usize,
) -> Result<(), Error> {
let get_buff_len = |x: usize, y: usize| if x >= y { x + 8 } else { y + 8 };
let buffer = vec![0u8; get_buff_len(data_offset, data_end_offset)];
self.mbuff.buffer = buffer;
self.mbuff.data_offset = data_offset;
self.mbuff.data_end_offset = data_end_offset;
self.parent.set_program(prog)?;
Ok(())
}
/// Set a new verifier function. The function should return an `Error` if the program should be
/// rejected by the virtual machine. If a program has been loaded to the VM already, the
/// verifier is immediately run.
///
/// # Examples
///
/// ```
/// use rbpf::{Error, ErrorKind};
/// use rbpf::ebpf;
///
/// // Define a simple verifier function.
/// fn verifier(prog: &[u8]) -> Result<(), Error> {
/// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
/// if last_insn.opc != ebpf::EXIT {
/// return Err(Error::new(ErrorKind::Other,
/// "[Verifier] Error: program does not end with “EXIT” instruction"));
/// }
/// Ok(())
/// }
///
/// let prog1 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
/// // Change the verifier.
/// vm.set_verifier(verifier).unwrap();
/// ```
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
self.parent.set_verifier(verifier)
}
/// Register a built-in or user-defined helper function in order to use it later from within
/// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
///
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
/// program. You should be able to change registered helpers after compiling, but not to add
/// new ones (i.e. with new keys).
///
/// # Examples
///
/// ```
/// #[cfg(feature = "std")] {
/// use rbpf::helpers;
///
/// // This program was compiled with clang, from a C program containing the following single
/// // instruction: `return bpf_trace_printk("foo %c %c %c\n", 10, 1, 2, 3);`
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 6 instructions
/// 0x71, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r1
/// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
/// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
/// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
/// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
/// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x09,
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
///
/// // Register a helper. This helper will store the result of the square root of r1 into r0.
/// vm.register_helper(1, helpers::sqrti);
///
/// let res = vm.execute_program(mem).unwrap();
/// assert_eq!(res, 3);
/// }
/// ```
pub fn register_helper(
&mut self,
key: u32,
function: fn(u64, u64, u64, u64, u64) -> u64,
) -> Result<(), Error> {
self.parent.register_helper(key, function)
}
/// Execute the program loaded, with the given packet data.
///
/// If the program is made to be compatible with Linux kernel, it is expected to load the
/// address of the beginning and of the end of the memory area used for packet data from some
/// metadata buffer, which in the case of this VM is handled internally. The offsets at which
/// the addresses should be placed should have be set at the creation of the VM.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
///
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
///
/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
/// let res = vm.execute_program(mem).unwrap();
/// assert_eq!(res, 0xdd);
/// ```
pub fn execute_program(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
let l = self.mbuff.buffer.len();
// Can this ever happen? Probably not, should be ensured at mbuff creation.
if self.mbuff.data_offset + 8 > l || self.mbuff.data_end_offset + 8 > l {
Err(Error::new(ErrorKind::Other, format!("Error: buffer too small ({:?}), cannot use data_offset {:?} and data_end_offset {:?}",
l, self.mbuff.data_offset, self.mbuff.data_end_offset)))?;
}
LittleEndian::write_u64(
&mut self.mbuff.buffer[(self.mbuff.data_offset)..],
mem.as_ptr() as u64,
);
LittleEndian::write_u64(
&mut self.mbuff.buffer[(self.mbuff.data_end_offset)..],
mem.as_ptr() as u64 + mem.len() as u64,
);
self.parent.execute_program(mem, &self.mbuff.buffer)
}
/// JIT-compile the loaded program. No argument required for this.
///
/// If using helper functions, be sure to register them into the VM before calling this
/// function.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
///
/// vm.jit_compile();
/// ```
#[cfg(all(not(windows), feature = "std"))]
pub fn jit_compile(&mut self) -> Result<(), Error> {
let prog = match self.parent.prog {
Some(prog) => prog,
None => Err(Error::new(
ErrorKind::Other,
"Error: No program set, call prog_set() to load one",
))?,
};
self.parent.jit = Some(jit::JitMemory::new(prog, &self.parent.helpers, true, true)?);
Ok(())
}
/// Execute the previously JIT-compiled program, with the given packet data, in a manner very
/// similar to `execute_program()`.
///
/// If the program is made to be compatible with Linux kernel, it is expected to load the
/// address of the beginning and of the end of the memory area used for packet data from some
/// metadata buffer, which in the case of this VM is handled internally. The offsets at which
/// the addresses should be placed should have be set at the creation of the VM.
///
/// # Safety
///
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
/// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
/// very bad (program may segfault). It may be wise to check that the program works with the
/// interpreter before running the JIT-compiled version of it.
///
/// For this reason the function should be called from within an `unsafe` bloc.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
///
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
///
/// # #[cfg(all(not(windows), feature = "std"))]
/// vm.jit_compile();
///
/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
/// # #[cfg(all(not(windows), feature = "std"))]
/// unsafe {
/// let res = vm.execute_program_jit(mem).unwrap();
/// assert_eq!(res, 0xdd);
/// }
/// ```
// This struct redefines the `execute_program_jit()` function, in order to pass the offsets
// associated with the fixed mbuff.
#[cfg(all(not(windows), feature = "std"))]
pub unsafe fn execute_program_jit(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
// If packet data is empty, do not send the address of an empty slice; send a null pointer
// as first argument instead, as this is uBPF's behavior (empty packet should not happen
// in the kernel; anyway the verifier would prevent the use of uninitialized registers).
// See `mul_loop` test.
let mem_ptr = match mem.len() {
0 => core::ptr::null_mut(),
_ => mem.as_ptr() as *mut u8,
};
match &self.parent.jit {
Some(jit) => Ok(jit.get_prog()(
self.mbuff.buffer.as_ptr() as *mut u8,
self.mbuff.buffer.len(),
mem_ptr,
mem.len(),
self.mbuff.data_offset,
self.mbuff.data_end_offset,
)),
None => Err(Error::new(
ErrorKind::Other,
"Error: program has not been JIT-compiled",
)),
}
}
/// Compile the loaded program using the Cranelift JIT.
///
/// If using helper functions, be sure to register them into the VM before calling this
/// function.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
///
/// vm.cranelift_compile();
/// ```
#[cfg(feature = "cranelift")]
pub fn cranelift_compile(&mut self) -> Result<(), Error> {
use crate::cranelift::CraneliftCompiler;
let prog = match self.parent.prog {
Some(prog) => prog,
None => Err(Error::new(
ErrorKind::Other,
"Error: No program set, call prog_set() to load one",
))?,
};
let mut compiler = CraneliftCompiler::new(self.parent.helpers.clone());
let program = compiler.compile_function(prog)?;
self.parent.cranelift_prog = Some(program);
Ok(())
}
/// Execute the previously compiled program, with the given packet data and metadata
/// buffer, in a manner very similar to `execute_program()`.
///
/// If the program is made to be compatible with Linux kernel, it is expected to load the
/// address of the beginning and of the end of the memory area used for packet data from some
/// metadata buffer, which in the case of this VM is handled internally. The offsets at which
/// the addresses should be placed should have be set at the creation of the VM.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
///
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
///
/// vm.cranelift_compile();
///
/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
/// let res = vm.execute_program_cranelift(mem).unwrap();
/// assert_eq!(res, 0xdd);
/// ```
#[cfg(feature = "cranelift")]
pub fn execute_program_cranelift(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
// If packet data is empty, do not send the address of an empty slice; send a null pointer
// as first argument instead, as this is uBPF's behavior (empty packet should not happen
// in the kernel; anyway the verifier would prevent the use of uninitialized registers).
// See `mul_loop` test.
let mem_ptr = match mem.len() {
0 => core::ptr::null_mut(),
_ => mem.as_ptr() as *mut u8,
};
let l = self.mbuff.buffer.len();
// Can this ever happen? Probably not, should be ensured at mbuff creation.
if self.mbuff.data_offset + 8 > l || self.mbuff.data_end_offset + 8 > l {
Err(Error::new(ErrorKind::Other, format!("Error: buffer too small ({:?}), cannot use data_offset {:?} and data_end_offset {:?}",
l, self.mbuff.data_offset, self.mbuff.data_end_offset)))?;
}
LittleEndian::write_u64(
&mut self.mbuff.buffer[(self.mbuff.data_offset)..],
mem.as_ptr() as u64,
);
LittleEndian::write_u64(
&mut self.mbuff.buffer[(self.mbuff.data_end_offset)..],
mem.as_ptr() as u64 + mem.len() as u64,
);
match &self.parent.cranelift_prog {
Some(prog) => Ok(prog.execute(
mem_ptr,
mem.len(),
self.mbuff.buffer.as_ptr() as *mut u8,
self.mbuff.buffer.len(),
)),
None => Err(Error::new(
ErrorKind::Other,
"Error: program has not been compiled with cranelift",
)),
}
}
}
/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
/// directly on the memory area representing packet data.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
/// ];
///
/// // Instantiate a VM.
/// let vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
///
/// // Provide only a reference to the packet data.
/// let res = vm.execute_program(mem).unwrap();
/// assert_eq!(res, 0x22cc);
/// ```
pub struct EbpfVmRaw<'a> {
parent: EbpfVmMbuff<'a>,
}
impl<'a> EbpfVmRaw<'a> {
/// Create a new virtual machine instance, and load an eBPF program into that instance.
/// When attempting to load the program, it passes through a simple verifier.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
/// ```
pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmRaw<'a>, Error> {
let parent = EbpfVmMbuff::new(prog)?;
Ok(EbpfVmRaw { parent })
}
/// Load a new eBPF program into the virtual machine instance.
///
/// # Examples
///
/// ```
/// let prog1 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let prog2 = &[
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27,
/// ];
///
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog1)).unwrap();
/// vm.set_program(prog2);
///
/// let res = vm.execute_program(mem).unwrap();
/// assert_eq!(res, 0x22cc);
/// ```
pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
self.parent.set_program(prog)?;
Ok(())
}
/// Set a new verifier function. The function should return an `Error` if the program should be
/// rejected by the virtual machine. If a program has been loaded to the VM already, the
/// verifier is immediately run.
///
/// # Examples
///
/// ```
/// use rbpf::{Error, ErrorKind};
/// use rbpf::ebpf;
///
/// // Define a simple verifier function.
/// fn verifier(prog: &[u8]) -> Result<(), Error> {
/// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
/// if last_insn.opc != ebpf::EXIT {
/// return Err(Error::new(ErrorKind::Other,
/// "[Verifier] Error: program does not end with “EXIT” instruction"));
/// }
/// Ok(())
/// }
///
/// let prog1 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
/// // Change the verifier.
/// vm.set_verifier(verifier).unwrap();
/// ```
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
self.parent.set_verifier(verifier)
}
/// Register a built-in or user-defined helper function in order to use it later from within
/// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
///
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
/// program. You should be able to change registered helpers after compiling, but not to add
/// new ones (i.e. with new keys).
///
/// # Examples
///
/// ```
/// #[cfg(feature = "std")] {
/// use rbpf::helpers;
///
/// let prog = &[
/// 0x79, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxdw r1, r1[0x00]
/// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
/// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
/// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
/// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
/// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mem = &mut [
/// 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
///
/// // Register a helper. This helper will store the result of the square root of r1 into r0.
/// vm.register_helper(1, helpers::sqrti);
///
/// let res = vm.execute_program(mem).unwrap();
/// assert_eq!(res, 0x10000000);
/// }
/// ```
pub fn register_helper(
&mut self,
key: u32,
function: fn(u64, u64, u64, u64, u64) -> u64,
) -> Result<(), Error> {
self.parent.register_helper(key, function)
}
/// Register a set of built-in or user-defined helper functions in order to use them later from
/// within the eBPF program. The helpers are registered into a hashmap, so the `key` can be any
/// `u32`.
#[allow(clippy::type_complexity)]
pub fn register_helper_set(
&mut self,
helpers: &HashMap<u32, fn(u64, u64, u64, u64, u64) -> u64>,
) -> Result<(), Error> {
for (key, function) in helpers {
self.parent.register_helper(*key, *function)?;
}
Ok(())
}
/// Execute the program loaded, with the given packet data.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
/// ];
///
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
///
/// let res = vm.execute_program(mem).unwrap();
/// assert_eq!(res, 0x22cc);
/// ```
pub fn execute_program(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
self.parent.execute_program(mem, &[])
}
/// JIT-compile the loaded program. No argument required for this.
///
/// If using helper functions, be sure to register them into the VM before calling this
/// function.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
///
/// vm.jit_compile();
/// ```
#[cfg(all(not(windows), feature = "std"))]
pub fn jit_compile(&mut self) -> Result<(), Error> {
let prog = match self.parent.prog {
Some(prog) => prog,
None => Err(Error::new(
ErrorKind::Other,
"Error: No program set, call prog_set() to load one",
))?,
};
self.parent.jit = Some(jit::JitMemory::new(
prog,
&self.parent.helpers,
false,
false,
)?);
Ok(())
}
/// Execute the previously JIT-compiled program, with the given packet data, in a manner very
/// similar to `execute_program()`.
///
/// # Safety
///
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
/// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
/// very bad (program may segfault). It may be wise to check that the program works with the
/// interpreter before running the JIT-compiled version of it.
///
/// For this reason the function should be called from within an `unsafe` bloc.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
/// ];
///
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
///
/// # #[cfg(all(not(windows), feature = "std"))]
/// vm.jit_compile();
///
/// # #[cfg(all(not(windows), feature = "std"))]
/// unsafe {
/// let res = vm.execute_program_jit(mem).unwrap();
/// assert_eq!(res, 0x22cc);
/// }
/// ```
#[cfg(all(not(windows), feature = "std"))]
pub unsafe fn execute_program_jit(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
let mut mbuff = vec![];
self.parent.execute_program_jit(mem, &mut mbuff)
}
/// Compile the loaded program using the Cranelift JIT.
///
/// If using helper functions, be sure to register them into the VM before calling this
/// function.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
///
/// vm.cranelift_compile();
/// ```
#[cfg(feature = "cranelift")]
pub fn cranelift_compile(&mut self) -> Result<(), Error> {
use crate::cranelift::CraneliftCompiler;
let prog = match self.parent.prog {
Some(prog) => prog,
None => Err(Error::new(
ErrorKind::Other,
"Error: No program set, call prog_set() to load one",
))?,
};
let mut compiler = CraneliftCompiler::new(self.parent.helpers.clone());
let program = compiler.compile_function(prog)?;
self.parent.cranelift_prog = Some(program);
Ok(())
}
/// Execute the previously compiled program, with the given packet data, in a manner very
/// similar to `execute_program()`.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mem = &mut [
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
/// ];
///
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
///
/// vm.cranelift_compile();
///
/// let res = vm.execute_program_cranelift(mem).unwrap();
/// assert_eq!(res, 0x22cc);
/// ```
#[cfg(feature = "cranelift")]
pub fn execute_program_cranelift(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
let mut mbuff = vec![];
self.parent.execute_program_cranelift(mem, &mut mbuff)
}
}
/// A virtual machine to run eBPF program. This kind of VM is used for programs that do not work
/// with any memory area—no metadata buffer, no packet data either.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0xb7, 0x01, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // mov r1, 1
/// 0xb7, 0x02, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, // mov r2, 2
/// 0xb7, 0x03, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // mov r3, 3
/// 0xb7, 0x04, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, // mov r4, 4
/// 0xb7, 0x05, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // mov r5, 5
/// 0xb7, 0x06, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, // mov r6, 6
/// 0xb7, 0x07, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00, // mov r7, 7
/// 0xb7, 0x08, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, // mov r8, 8
/// 0x4f, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // or r0, r5
/// 0x47, 0x00, 0x00, 0x00, 0xa0, 0x00, 0x00, 0x00, // or r0, 0xa0
/// 0x57, 0x00, 0x00, 0x00, 0xa3, 0x00, 0x00, 0x00, // and r0, 0xa3
/// 0xb7, 0x09, 0x00, 0x00, 0x91, 0x00, 0x00, 0x00, // mov r9, 0x91
/// 0x5f, 0x90, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // and r0, r9
/// 0x67, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, // lsh r0, 32
/// 0x67, 0x00, 0x00, 0x00, 0x16, 0x00, 0x00, 0x00, // lsh r0, 22
/// 0x6f, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // lsh r0, r8
/// 0x77, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, // rsh r0, 32
/// 0x77, 0x00, 0x00, 0x00, 0x13, 0x00, 0x00, 0x00, // rsh r0, 19
/// 0x7f, 0x70, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // rsh r0, r7
/// 0xa7, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // xor r0, 0x03
/// 0xaf, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // xor r0, r2
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
///
/// // Provide only a reference to the packet data.
/// let res = vm.execute_program().unwrap();
/// assert_eq!(res, 0x11);
/// ```
pub struct EbpfVmNoData<'a> {
parent: EbpfVmRaw<'a>,
}
impl<'a> EbpfVmNoData<'a> {
/// Create a new virtual machine instance, and load an eBPF program into that instance.
/// When attempting to load the program, it passes through a simple verifier.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let vm = rbpf::EbpfVmNoData::new(Some(prog));
/// ```
pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmNoData<'a>, Error> {
let parent = EbpfVmRaw::new(prog)?;
Ok(EbpfVmNoData { parent })
}
/// Load a new eBPF program into the virtual machine instance.
///
/// # Examples
///
/// ```
/// let prog1 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
/// let prog2 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog1)).unwrap();
///
/// let res = vm.execute_program().unwrap();
/// assert_eq!(res, 0x2211);
///
/// vm.set_program(prog2);
///
/// let res = vm.execute_program().unwrap();
/// assert_eq!(res, 0x1122);
/// ```
pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
self.parent.set_program(prog)?;
Ok(())
}
/// Set a new verifier function. The function should return an `Error` if the program should be
/// rejected by the virtual machine. If a program has been loaded to the VM already, the
/// verifier is immediately run.
///
/// # Examples
///
/// ```
/// use rbpf::{Error, ErrorKind};
/// use rbpf::ebpf;
///
/// // Define a simple verifier function.
/// fn verifier(prog: &[u8]) -> Result<(), Error> {
/// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
/// if last_insn.opc != ebpf::EXIT {
/// return Err(Error::new(ErrorKind::Other,
/// "[Verifier] Error: program does not end with “EXIT” instruction"));
/// }
/// Ok(())
/// }
///
/// let prog1 = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// // Instantiate a VM.
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
/// // Change the verifier.
/// vm.set_verifier(verifier).unwrap();
/// ```
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
self.parent.set_verifier(verifier)
}
/// Register a built-in or user-defined helper function in order to use it later from within
/// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
///
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
/// program. You should be able to change registered helpers after compiling, but not to add
/// new ones (i.e. with new keys).
///
/// # Examples
///
/// ```
/// #[cfg(feature = "std")] {
/// use rbpf::helpers;
///
/// let prog = &[
/// 0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, // mov r1, 0x010000000
/// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
/// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
/// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
/// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
/// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
///
/// // Register a helper. This helper will store the result of the square root of r1 into r0.
/// vm.register_helper(1, helpers::sqrti).unwrap();
///
/// let res = vm.execute_program().unwrap();
/// assert_eq!(res, 0x1000);
/// }
/// ```
pub fn register_helper(
&mut self,
key: u32,
function: fn(u64, u64, u64, u64, u64) -> u64,
) -> Result<(), Error> {
self.parent.register_helper(key, function)
}
/// JIT-compile the loaded program. No argument required for this.
///
/// If using helper functions, be sure to register them into the VM before calling this
/// function.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
///
///
/// vm.jit_compile();
/// ```
#[cfg(all(not(windows), feature = "std"))]
pub fn jit_compile(&mut self) -> Result<(), Error> {
self.parent.jit_compile()
}
/// Execute the program loaded, without providing pointers to any memory area whatsoever.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
///
/// // For this kind of VM, the `execute_program()` function needs no argument.
/// let res = vm.execute_program().unwrap();
/// assert_eq!(res, 0x1122);
/// ```
pub fn execute_program(&self) -> Result<u64, Error> {
self.parent.execute_program(&mut [])
}
/// Execute the previously JIT-compiled program, without providing pointers to any memory area
/// whatsoever, in a manner very similar to `execute_program()`.
///
/// # Safety
///
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
/// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
/// very bad (program may segfault). It may be wise to check that the program works with the
/// interpreter before running the JIT-compiled version of it.
///
/// For this reason the function should be called from within an `unsafe` bloc.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
///
/// # #[cfg(all(not(windows), feature = "std"))]
/// vm.jit_compile();
///
/// # #[cfg(all(not(windows), feature = "std"))]
/// unsafe {
/// let res = vm.execute_program_jit().unwrap();
/// assert_eq!(res, 0x1122);
/// }
/// ```
#[cfg(all(not(windows), feature = "std"))]
pub unsafe fn execute_program_jit(&self) -> Result<u64, Error> {
self.parent.execute_program_jit(&mut [])
}
/// Compile the loaded program using the Cranelift JIT.
///
/// If using helper functions, be sure to register them into the VM before calling this
/// function.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
///
///
/// vm.cranelift_compile();
/// ```
#[cfg(feature = "cranelift")]
pub fn cranelift_compile(&mut self) -> Result<(), Error> {
self.parent.cranelift_compile()
}
/// Execute the previously JIT-compiled program, without providing pointers to any memory area
/// whatsoever, in a manner very similar to `execute_program()`.
///
/// # Examples
///
/// ```
/// let prog = &[
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
/// ];
///
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
///
/// vm.cranelift_compile();
///
/// let res = vm.execute_program_cranelift().unwrap();
/// assert_eq!(res, 0x1122);
/// ```
#[cfg(feature = "cranelift")]
pub fn execute_program_cranelift(&self) -> Result<u64, Error> {
self.parent.execute_program_cranelift(&mut [])
}
}
/// EbpfVm with Owned data
pub struct EbpfVmRawOwned {
parent: EbpfVmRaw<'static>,
data_len: usize,
data_cap: usize,
}
impl EbpfVmRawOwned {
/// Create a new virtual machine instance, and load an eBPF program into that instance.
/// When attempting to load the program, it passes through a simple verifier.
pub fn new(prog: Option<Vec<u8>>) -> Result<EbpfVmRawOwned, Error> {
let (prog, data_len, data_cap) = match prog {
Some(prog) => {
let data_len = prog.len();
let data_cap = prog.capacity();
let slice = prog.leak();
let slice = unsafe { core::slice::from_raw_parts(slice.as_ptr(), data_len) };
(Some(slice), data_len, data_cap)
}
None => (None, 0, 0),
};
let parent = EbpfVmRaw::new(prog)?;
Ok(Self {
parent,
data_len,
data_cap,
})
}
/// Load a new eBPF program into the virtual machine instance
pub fn set_program(&mut self, prog: Vec<u8>) -> Result<(), Error> {
self.data_len = prog.len();
self.data_cap = prog.capacity();
let slice = prog.leak();
self.parent.set_program(slice)?;
Ok(())
}
/// Set a new verifier function. The function should return an Error if the program should be rejected by the virtual machine.
/// If a program has been loaded to the VM already, the verifier is immediately run.
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
self.parent.set_verifier(verifier)
}
/// Register a built-in or user-defined helper function in order to use it later from within the eBPF program.
/// The helper is registered into a hashmap, so the key can be any u32.
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the program.
/// You should be able to change registered helpers after compiling, but not to add new ones (i. e. with new keys).
pub fn register_helper(
&mut self,
key: u32,
function: fn(u64, u64, u64, u64, u64) -> u64,
) -> Result<(), Error> {
self.parent.register_helper(key, function)
}
/// Register a set of built-in or user-defined helper functions in order to use them later from
/// within the eBPF program. The helpers are registered into a hashmap, so the `key` can be any
/// `u32`.
#[allow(clippy::type_complexity)]
pub fn register_helper_set(
&mut self,
helpers: &HashMap<u32, fn(u64, u64, u64, u64, u64) -> u64>,
) -> Result<(), Error> {
for (key, function) in helpers {
self.parent.register_helper(*key, *function)?;
}
Ok(())
}
/// Execute the previously JIT-compiled program, with the given packet data, in a manner very similar to execute_program().
///
/// Safety
///
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime check for memory access;
/// so if the eBPF program attempts erroneous accesses, this may end very bad (program may segfault).
/// It may be wise to check that the program works with the interpreter before running the JIT-compiled version of it.
///
/// For this reason the function should be called from within an unsafe bloc.
pub fn execute_program(&self, mem: &mut [u8]) -> Result<u64, Error> {
self.parent.execute_program(mem)
}
}
impl Drop for EbpfVmRawOwned {
fn drop(&mut self) {
match self.parent.parent.prog {
Some(prog) => unsafe {
let ptr = prog.as_ptr();
let _prog = Vec::from_raw_parts(ptr as *mut u8, self.data_len, self.data_cap);
},
None => {}
};
}
}