mirror of
https://github.com/DragonOS-Community/DragonOS.git
synced 2025-06-09 07:06:47 +00:00
* feat(kprobe): Add basic kprobe support for x86_64 * feat: add ebpf support (#912) - 实现bpf()一部分命令,包括几种基本map,相关的helper函数 - 实现部分perf相关的数据结构 - 暂时为文件实现简单mmap - 实现一个使用kprobe统计syscall 调用次数的ebpf程序 对eBPF支持程度(基本): - 简单的eBPF程序(没有指定特殊的Map) - 使用内核已经实现的Map的eBPF程序 - 可以和kprobe配合使用 - 内核Map相关的接口定义已经实现,添加新的Map较为简单 不支持的功能: - 区分不同的eBPF程序类型(Network/Cgroup)并限定可调用的helper函数集 - 与内核其它跟踪机制配合(tracepoint) - 其它helper和Map todo - [ ] 修改mmap,需要讨论,因为这个和块缓存层相关 - [x] 添加文档 - [x] 修复可能的错误 - [x] 增加rbpf版本信息 * feat: add /sys/devices/system/cpu/possible file * feat: add /sys/devices/system/cpu/online
1783 lines
70 KiB
Rust
1783 lines
70 KiB
Rust
// SPDX-License-Identifier: (Apache-2.0 OR MIT)
|
|
// Derived from uBPF <https://github.com/iovisor/ubpf>
|
|
// Copyright 2016 6WIND S.A. <quentin.monnet@6wind.com>
|
|
// Copyright 2023 Isovalent, Inc. <quentin@isovalent.com>
|
|
|
|
//! Virtual machine and JIT compiler for eBPF programs.
|
|
#![doc(
|
|
html_logo_url = "https://raw.githubusercontent.com/qmonnet/rbpf/main/misc/rbpf.png",
|
|
html_favicon_url = "https://raw.githubusercontent.com/qmonnet/rbpf/main/misc/rbpf.ico"
|
|
)]
|
|
#![warn(missing_docs)]
|
|
// There are unused mut warnings due to unsafe code.
|
|
#![allow(unused_mut)]
|
|
// Allows old-style clippy
|
|
#![allow(renamed_and_removed_lints)]
|
|
#![cfg_attr(
|
|
clippy,
|
|
allow(
|
|
redundant_field_names,
|
|
single_match,
|
|
cast_lossless,
|
|
doc_markdown,
|
|
match_same_arms,
|
|
unreadable_literal
|
|
)
|
|
)]
|
|
// Configures the crate to be `no_std` when `std` feature is disabled.
|
|
#![cfg_attr(not(feature = "std"), no_std)]
|
|
extern crate alloc;
|
|
use alloc::{collections::BTreeMap, format, vec, vec::Vec};
|
|
|
|
use byteorder::{ByteOrder, LittleEndian};
|
|
|
|
type HashMap<K, V> = BTreeMap<K, V>;
|
|
#[cfg(feature = "cranelift")]
|
|
type HashSet<T> = alloc::collections::BTreeSet<T>;
|
|
mod asm_parser;
|
|
pub mod assembler;
|
|
#[cfg(feature = "cranelift")]
|
|
mod cranelift;
|
|
pub mod disassembler;
|
|
pub mod ebpf;
|
|
pub mod helpers;
|
|
pub mod insn_builder;
|
|
mod interpreter;
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
mod jit;
|
|
#[cfg(not(feature = "std"))]
|
|
mod no_std_error;
|
|
mod stack;
|
|
mod verifier;
|
|
|
|
#[cfg(feature = "std")]
|
|
pub use std::io::{Error, ErrorKind};
|
|
|
|
/// In no_std we use a custom implementation of the error which acts as a
|
|
/// replacement for the io Error.
|
|
#[cfg(not(feature = "std"))]
|
|
pub use crate::no_std_error::{Error, ErrorKind};
|
|
|
|
/// eBPF verification function that returns an error if the program does not meet its requirements.
|
|
///
|
|
/// Some examples of things the verifier may reject the program for:
|
|
///
|
|
/// - Program does not terminate.
|
|
/// - Unknown instructions.
|
|
/// - Bad formed instruction.
|
|
/// - Unknown eBPF helper index.
|
|
pub type Verifier = fn(prog: &[u8]) -> Result<(), Error>;
|
|
|
|
/// eBPF helper function.
|
|
pub type Helper = fn(u64, u64, u64, u64, u64) -> u64;
|
|
|
|
// A metadata buffer with two offset indications. It can be used in one kind of eBPF VM to simulate
|
|
// the use of a metadata buffer each time the program is executed, without the user having to
|
|
// actually handle it. The offsets are used to tell the VM where in the buffer the pointers to
|
|
// packet data start and end should be stored each time the program is run on a new packet.
|
|
struct MetaBuff {
|
|
data_offset: usize,
|
|
data_end_offset: usize,
|
|
buffer: Vec<u8>,
|
|
}
|
|
|
|
/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
|
|
/// on a metadata buffer containing pointers to packet data.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff at offset 8 into R1.
|
|
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
///
|
|
/// // Just for the example we create our metadata buffer from scratch, and we store the pointers
|
|
/// // to packet data start and end in it.
|
|
/// let mut mbuff = [0u8; 32];
|
|
/// unsafe {
|
|
/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
|
|
/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
|
|
/// *data = mem.as_ptr() as u64;
|
|
/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
|
|
/// }
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
///
|
|
/// // Provide both a reference to the packet data, and to the metadata buffer.
|
|
/// let res = vm.execute_program(mem, &mut mbuff).unwrap();
|
|
/// assert_eq!(res, 0x2211);
|
|
/// ```
|
|
pub struct EbpfVmMbuff<'a> {
|
|
prog: Option<&'a [u8]>,
|
|
verifier: Verifier,
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
jit: Option<jit::JitMemory<'a>>,
|
|
#[cfg(feature = "cranelift")]
|
|
cranelift_prog: Option<cranelift::CraneliftProgram>,
|
|
helpers: HashMap<u32, ebpf::Helper>,
|
|
}
|
|
|
|
impl<'a> EbpfVmMbuff<'a> {
|
|
/// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
/// When attempting to load the program, it passes through a simple verifier.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
/// ```
|
|
pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmMbuff<'a>, Error> {
|
|
if let Some(prog) = prog {
|
|
verifier::check(prog)?;
|
|
}
|
|
|
|
Ok(EbpfVmMbuff {
|
|
prog,
|
|
verifier: verifier::check,
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
jit: None,
|
|
#[cfg(feature = "cranelift")]
|
|
cranelift_prog: None,
|
|
helpers: HashMap::new(),
|
|
})
|
|
}
|
|
|
|
/// Load a new eBPF program into the virtual machine instance.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog1 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let prog2 = &[
|
|
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
/// vm.set_program(prog2).unwrap();
|
|
/// ```
|
|
pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
|
|
(self.verifier)(prog)?;
|
|
self.prog = Some(prog);
|
|
Ok(())
|
|
}
|
|
|
|
/// Set a new verifier function. The function should return an `Error` if the program should be
|
|
/// rejected by the virtual machine. If a program has been loaded to the VM already, the
|
|
/// verifier is immediately run.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// use rbpf::{Error, ErrorKind};
|
|
/// use rbpf::ebpf;
|
|
///
|
|
/// // Define a simple verifier function.
|
|
/// fn verifier(prog: &[u8]) -> Result<(), Error> {
|
|
/// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
|
|
/// if last_insn.opc != ebpf::EXIT {
|
|
/// return Err(Error::new(ErrorKind::Other,
|
|
/// "[Verifier] Error: program does not end with “EXIT” instruction"));
|
|
/// }
|
|
/// Ok(())
|
|
/// }
|
|
///
|
|
/// let prog1 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
/// // Change the verifier.
|
|
/// vm.set_verifier(verifier).unwrap();
|
|
/// ```
|
|
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
if let Some(prog) = self.prog {
|
|
verifier(prog)?;
|
|
}
|
|
self.verifier = verifier;
|
|
Ok(())
|
|
}
|
|
|
|
/// Register a built-in or user-defined helper function in order to use it later from within
|
|
/// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
|
|
///
|
|
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
|
|
/// program. You should be able to change registered helpers after compiling, but not to add
|
|
/// new ones (i.e. with new keys).
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// use rbpf::helpers;
|
|
///
|
|
/// // This program was compiled with clang, from a C program containing the following single
|
|
/// // instruction: `return bpf_trace_printk("foo %c %c %c\n", 10, 1, 2, 3);`
|
|
/// let prog = &[
|
|
/// 0x18, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load 0 as u64 into r1 (That would be
|
|
/// 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // replaced by tc by the address of
|
|
/// // the format string, in the .map
|
|
/// // section of the ELF file).
|
|
/// 0xb7, 0x02, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, // mov r2, 10
|
|
/// 0xb7, 0x03, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // mov r3, 1
|
|
/// 0xb7, 0x04, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, // mov r4, 2
|
|
/// 0xb7, 0x05, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // mov r5, 3
|
|
/// 0x85, 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, // call helper with key 6
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
///
|
|
/// // Register a helper.
|
|
/// // On running the program this helper will print the content of registers r3, r4 and r5 to
|
|
/// // standard output.
|
|
/// # #[cfg(feature = "std")]
|
|
/// vm.register_helper(6, helpers::bpf_trace_printf).unwrap();
|
|
/// ```
|
|
pub fn register_helper(&mut self, key: u32, function: Helper) -> Result<(), Error> {
|
|
self.helpers.insert(key, function);
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the program loaded, with the given packet data and metadata buffer.
|
|
///
|
|
/// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
/// address of the beginning and of the end of the memory area used for packet data from the
|
|
/// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
|
|
/// pointers are correctly stored in the buffer.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
///
|
|
/// // Just for the example we create our metadata buffer from scratch, and we store the
|
|
/// // pointers to packet data start and end in it.
|
|
/// let mut mbuff = [0u8; 32];
|
|
/// unsafe {
|
|
/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
|
|
/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
|
|
/// *data = mem.as_ptr() as u64;
|
|
/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
|
|
/// }
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
///
|
|
/// // Provide both a reference to the packet data, and to the metadata buffer.
|
|
/// let res = vm.execute_program(mem, &mut mbuff).unwrap();
|
|
/// assert_eq!(res, 0x2211);
|
|
/// ```
|
|
pub fn execute_program(&self, mem: &[u8], mbuff: &[u8]) -> Result<u64, Error> {
|
|
interpreter::execute_program(self.prog, mem, mbuff, &self.helpers)
|
|
}
|
|
|
|
/// JIT-compile the loaded program. No argument required for this.
|
|
///
|
|
/// If using helper functions, be sure to register them into the VM before calling this
|
|
/// function.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
///
|
|
/// vm.jit_compile();
|
|
/// ```
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
pub fn jit_compile(&mut self) -> Result<(), Error> {
|
|
let prog = match self.prog {
|
|
Some(prog) => prog,
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: No program set, call prog_set() to load one",
|
|
))?,
|
|
};
|
|
self.jit = Some(jit::JitMemory::new(prog, &self.helpers, true, false)?);
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the previously JIT-compiled program, with the given packet data and metadata
|
|
/// buffer, in a manner very similar to `execute_program()`.
|
|
///
|
|
/// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
/// address of the beginning and of the end of the memory area used for packet data from the
|
|
/// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
|
|
/// pointers are correctly stored in the buffer.
|
|
///
|
|
/// # Safety
|
|
///
|
|
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
|
|
/// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
|
|
/// very bad (program may segfault). It may be wise to check that the program works with the
|
|
/// interpreter before running the JIT-compiled version of it.
|
|
///
|
|
/// For this reason the function should be called from within an `unsafe` bloc.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into r1.
|
|
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
///
|
|
/// // Just for the example we create our metadata buffer from scratch, and we store the
|
|
/// // pointers to packet data start and end in it.
|
|
/// let mut mbuff = [0u8; 32];
|
|
/// unsafe {
|
|
/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
|
|
/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
|
|
/// *data = mem.as_ptr() as u64;
|
|
/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
|
|
/// }
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
///
|
|
/// # #[cfg(all(not(windows), feature = "std"))]
|
|
/// vm.jit_compile();
|
|
///
|
|
/// // Provide both a reference to the packet data, and to the metadata buffer.
|
|
/// # #[cfg(all(not(windows), feature = "std"))]
|
|
/// unsafe {
|
|
/// let res = vm.execute_program_jit(mem, &mut mbuff).unwrap();
|
|
/// assert_eq!(res, 0x2211);
|
|
/// }
|
|
/// ```
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
pub unsafe fn execute_program_jit(
|
|
&self,
|
|
mem: &mut [u8],
|
|
mbuff: &'a mut [u8],
|
|
) -> Result<u64, Error> {
|
|
// If packet data is empty, do not send the address of an empty slice; send a null pointer
|
|
// as first argument instead, as this is uBPF's behavior (empty packet should not happen
|
|
// in the kernel; anyway the verifier would prevent the use of uninitialized registers).
|
|
// See `mul_loop` test.
|
|
let mem_ptr = match mem.len() {
|
|
0 => std::ptr::null_mut(),
|
|
_ => mem.as_ptr() as *mut u8,
|
|
};
|
|
// The last two arguments are not used in this function. They would be used if there was a
|
|
// need to indicate to the JIT at which offset in the mbuff mem_ptr and mem_ptr + mem.len()
|
|
// should be stored; this is what happens with struct EbpfVmFixedMbuff.
|
|
match &self.jit {
|
|
Some(jit) => Ok(jit.get_prog()(
|
|
mbuff.as_ptr() as *mut u8,
|
|
mbuff.len(),
|
|
mem_ptr,
|
|
mem.len(),
|
|
0,
|
|
0,
|
|
)),
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: program has not been JIT-compiled",
|
|
)),
|
|
}
|
|
}
|
|
|
|
/// Compile the loaded program using the Cranelift JIT.
|
|
///
|
|
/// If using helper functions, be sure to register them into the VM before calling this
|
|
/// function.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
///
|
|
/// vm.cranelift_compile();
|
|
/// ```
|
|
#[cfg(feature = "cranelift")]
|
|
pub fn cranelift_compile(&mut self) -> Result<(), Error> {
|
|
use crate::cranelift::CraneliftCompiler;
|
|
|
|
let prog = match self.prog {
|
|
Some(prog) => prog,
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: No program set, call prog_set() to load one",
|
|
))?,
|
|
};
|
|
|
|
let mut compiler = CraneliftCompiler::new(self.helpers.clone());
|
|
let program = compiler.compile_function(prog)?;
|
|
|
|
self.cranelift_prog = Some(program);
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the previously compiled program, with the given packet data and metadata
|
|
/// buffer, in a manner very similar to `execute_program()`.
|
|
///
|
|
/// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
/// address of the beginning and of the end of the memory area used for packet data from the
|
|
/// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
|
|
/// pointers are correctly stored in the buffer.
|
|
///
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into r1.
|
|
/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
///
|
|
/// // Just for the example we create our metadata buffer from scratch, and we store the
|
|
/// // pointers to packet data start and end in it.
|
|
/// let mut mbuff = [0u8; 32];
|
|
/// unsafe {
|
|
/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
|
|
/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
|
|
/// *data = mem.as_ptr() as u64;
|
|
/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
|
|
/// }
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
///
|
|
/// vm.cranelift_compile();
|
|
///
|
|
/// // Provide both a reference to the packet data, and to the metadata buffer.
|
|
/// let res = vm.execute_program_cranelift(mem, &mut mbuff).unwrap();
|
|
/// assert_eq!(res, 0x2211);
|
|
/// ```
|
|
#[cfg(feature = "cranelift")]
|
|
pub fn execute_program_cranelift(
|
|
&self,
|
|
mem: &mut [u8],
|
|
mbuff: &'a mut [u8],
|
|
) -> Result<u64, Error> {
|
|
// If packet data is empty, do not send the address of an empty slice; send a null pointer
|
|
// as first argument instead, as this is uBPF's behavior (empty packet should not happen
|
|
// in the kernel; anyway the verifier would prevent the use of uninitialized registers).
|
|
// See `mul_loop` test.
|
|
let mem_ptr = match mem.len() {
|
|
0 => core::ptr::null_mut(),
|
|
_ => mem.as_ptr() as *mut u8,
|
|
};
|
|
|
|
// The last two arguments are not used in this function. They would be used if there was a
|
|
// need to indicate to the JIT at which offset in the mbuff mem_ptr and mem_ptr + mem.len()
|
|
// should be stored; this is what happens with struct EbpfVmFixedMbuff.
|
|
match &self.cranelift_prog {
|
|
Some(prog) => {
|
|
Ok(prog.execute(mem_ptr, mem.len(), mbuff.as_ptr() as *mut u8, mbuff.len()))
|
|
}
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: program has not been compiled with cranelift",
|
|
)),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
|
|
/// on a metadata buffer containing pointers to packet data, but it internally handles the buffer
|
|
/// so as to save the effort to manually handle the metadata buffer for the user.
|
|
///
|
|
/// This struct implements a static internal buffer that is passed to the program. The user has to
|
|
/// indicate the offset values at which the eBPF program expects to find the start and the end of
|
|
/// packet data in the buffer. On calling the `execute_program()` or `execute_program_jit()` functions, the
|
|
/// struct automatically updates the addresses in this static buffer, at the appointed offsets, for
|
|
/// the start and the end of the packet data the program is called upon.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// This was compiled with clang from the following program, in C:
|
|
///
|
|
/// ```c
|
|
/// #include <linux/bpf.h>
|
|
/// #include "path/to/linux/samples/bpf/bpf_helpers.h"
|
|
///
|
|
/// SEC(".classifier")
|
|
/// int classifier(struct __sk_buff *skb)
|
|
/// {
|
|
/// void *data = (void *)(long)skb->data;
|
|
/// void *data_end = (void *)(long)skb->data_end;
|
|
///
|
|
/// // Check program is long enough.
|
|
/// if (data + 5 > data_end)
|
|
/// return 0;
|
|
///
|
|
/// return *((char *)data + 5);
|
|
/// }
|
|
/// ```
|
|
///
|
|
/// Some small modifications have been brought to have it work, see comments.
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// // Here opcode 0x61 had to be replace by 0x79 so as to load a 8-bytes long address.
|
|
/// // Also, offset 0x4c had to be replace with e.g. 0x40 so as to prevent the two pointers
|
|
/// // from overlapping in the buffer.
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load pointer to mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// // Here opcode 0x61 had to be replace by 0x79 so as to load a 8-bytes long address.
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load ptr to mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
/// 0x67, 0x00, 0x00, 0x00, 0x38, 0x00, 0x00, 0x00, // r0 >>= 56
|
|
/// 0xc7, 0x00, 0x00, 0x00, 0x38, 0x00, 0x00, 0x00, // r0 <<= 56 (arsh) extend byte sign to u64
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem1 = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
/// let mem2 = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
///
|
|
/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
|
|
/// let res = vm.execute_program(mem1).unwrap();
|
|
/// assert_eq!(res, 0xffffffffffffffdd);
|
|
///
|
|
/// let res = vm.execute_program(mem2).unwrap();
|
|
/// assert_eq!(res, 0x27);
|
|
/// ```
|
|
pub struct EbpfVmFixedMbuff<'a> {
|
|
parent: EbpfVmMbuff<'a>,
|
|
mbuff: MetaBuff,
|
|
}
|
|
|
|
impl<'a> EbpfVmFixedMbuff<'a> {
|
|
/// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
/// When attempting to load the program, it passes through a simple verifier.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
/// ```
|
|
pub fn new(
|
|
prog: Option<&'a [u8]>,
|
|
data_offset: usize,
|
|
data_end_offset: usize,
|
|
) -> Result<EbpfVmFixedMbuff<'a>, Error> {
|
|
let parent = EbpfVmMbuff::new(prog)?;
|
|
let get_buff_len = |x: usize, y: usize| if x >= y { x + 8 } else { y + 8 };
|
|
let buffer = vec![0u8; get_buff_len(data_offset, data_end_offset)];
|
|
let mbuff = MetaBuff {
|
|
data_offset,
|
|
data_end_offset,
|
|
buffer,
|
|
};
|
|
Ok(EbpfVmFixedMbuff { parent, mbuff })
|
|
}
|
|
|
|
/// Load a new eBPF program into the virtual machine instance.
|
|
///
|
|
/// At the same time, load new offsets for storing pointers to start and end of packet data in
|
|
/// the internal metadata buffer.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog1 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let prog2 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27,
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog1), 0, 0).unwrap();
|
|
/// vm.set_program(prog2, 0x40, 0x50);
|
|
///
|
|
/// let res = vm.execute_program(mem).unwrap();
|
|
/// assert_eq!(res, 0x27);
|
|
/// ```
|
|
pub fn set_program(
|
|
&mut self,
|
|
prog: &'a [u8],
|
|
data_offset: usize,
|
|
data_end_offset: usize,
|
|
) -> Result<(), Error> {
|
|
let get_buff_len = |x: usize, y: usize| if x >= y { x + 8 } else { y + 8 };
|
|
let buffer = vec![0u8; get_buff_len(data_offset, data_end_offset)];
|
|
self.mbuff.buffer = buffer;
|
|
self.mbuff.data_offset = data_offset;
|
|
self.mbuff.data_end_offset = data_end_offset;
|
|
self.parent.set_program(prog)?;
|
|
Ok(())
|
|
}
|
|
|
|
/// Set a new verifier function. The function should return an `Error` if the program should be
|
|
/// rejected by the virtual machine. If a program has been loaded to the VM already, the
|
|
/// verifier is immediately run.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// use rbpf::{Error, ErrorKind};
|
|
/// use rbpf::ebpf;
|
|
///
|
|
/// // Define a simple verifier function.
|
|
/// fn verifier(prog: &[u8]) -> Result<(), Error> {
|
|
/// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
|
|
/// if last_insn.opc != ebpf::EXIT {
|
|
/// return Err(Error::new(ErrorKind::Other,
|
|
/// "[Verifier] Error: program does not end with “EXIT” instruction"));
|
|
/// }
|
|
/// Ok(())
|
|
/// }
|
|
///
|
|
/// let prog1 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
/// // Change the verifier.
|
|
/// vm.set_verifier(verifier).unwrap();
|
|
/// ```
|
|
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
self.parent.set_verifier(verifier)
|
|
}
|
|
|
|
/// Register a built-in or user-defined helper function in order to use it later from within
|
|
/// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
|
|
///
|
|
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
|
|
/// program. You should be able to change registered helpers after compiling, but not to add
|
|
/// new ones (i.e. with new keys).
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// #[cfg(feature = "std")] {
|
|
/// use rbpf::helpers;
|
|
///
|
|
/// // This program was compiled with clang, from a C program containing the following single
|
|
/// // instruction: `return bpf_trace_printk("foo %c %c %c\n", 10, 1, 2, 3);`
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 6 instructions
|
|
/// 0x71, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r1
|
|
/// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
|
|
/// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
|
|
/// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
|
|
/// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
|
|
/// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x09,
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
///
|
|
/// // Register a helper. This helper will store the result of the square root of r1 into r0.
|
|
/// vm.register_helper(1, helpers::sqrti);
|
|
///
|
|
/// let res = vm.execute_program(mem).unwrap();
|
|
/// assert_eq!(res, 3);
|
|
/// }
|
|
/// ```
|
|
pub fn register_helper(
|
|
&mut self,
|
|
key: u32,
|
|
function: fn(u64, u64, u64, u64, u64) -> u64,
|
|
) -> Result<(), Error> {
|
|
self.parent.register_helper(key, function)
|
|
}
|
|
|
|
/// Execute the program loaded, with the given packet data.
|
|
///
|
|
/// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
/// address of the beginning and of the end of the memory area used for packet data from some
|
|
/// metadata buffer, which in the case of this VM is handled internally. The offsets at which
|
|
/// the addresses should be placed should have be set at the creation of the VM.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
///
|
|
/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
|
|
/// let res = vm.execute_program(mem).unwrap();
|
|
/// assert_eq!(res, 0xdd);
|
|
/// ```
|
|
pub fn execute_program(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
let l = self.mbuff.buffer.len();
|
|
// Can this ever happen? Probably not, should be ensured at mbuff creation.
|
|
if self.mbuff.data_offset + 8 > l || self.mbuff.data_end_offset + 8 > l {
|
|
Err(Error::new(ErrorKind::Other, format!("Error: buffer too small ({:?}), cannot use data_offset {:?} and data_end_offset {:?}",
|
|
l, self.mbuff.data_offset, self.mbuff.data_end_offset)))?;
|
|
}
|
|
LittleEndian::write_u64(
|
|
&mut self.mbuff.buffer[(self.mbuff.data_offset)..],
|
|
mem.as_ptr() as u64,
|
|
);
|
|
LittleEndian::write_u64(
|
|
&mut self.mbuff.buffer[(self.mbuff.data_end_offset)..],
|
|
mem.as_ptr() as u64 + mem.len() as u64,
|
|
);
|
|
self.parent.execute_program(mem, &self.mbuff.buffer)
|
|
}
|
|
|
|
/// JIT-compile the loaded program. No argument required for this.
|
|
///
|
|
/// If using helper functions, be sure to register them into the VM before calling this
|
|
/// function.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
///
|
|
/// vm.jit_compile();
|
|
/// ```
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
pub fn jit_compile(&mut self) -> Result<(), Error> {
|
|
let prog = match self.parent.prog {
|
|
Some(prog) => prog,
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: No program set, call prog_set() to load one",
|
|
))?,
|
|
};
|
|
self.parent.jit = Some(jit::JitMemory::new(prog, &self.parent.helpers, true, true)?);
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the previously JIT-compiled program, with the given packet data, in a manner very
|
|
/// similar to `execute_program()`.
|
|
///
|
|
/// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
/// address of the beginning and of the end of the memory area used for packet data from some
|
|
/// metadata buffer, which in the case of this VM is handled internally. The offsets at which
|
|
/// the addresses should be placed should have be set at the creation of the VM.
|
|
///
|
|
/// # Safety
|
|
///
|
|
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
|
|
/// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
|
|
/// very bad (program may segfault). It may be wise to check that the program works with the
|
|
/// interpreter before running the JIT-compiled version of it.
|
|
///
|
|
/// For this reason the function should be called from within an `unsafe` bloc.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
///
|
|
/// # #[cfg(all(not(windows), feature = "std"))]
|
|
/// vm.jit_compile();
|
|
///
|
|
/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
|
|
/// # #[cfg(all(not(windows), feature = "std"))]
|
|
/// unsafe {
|
|
/// let res = vm.execute_program_jit(mem).unwrap();
|
|
/// assert_eq!(res, 0xdd);
|
|
/// }
|
|
/// ```
|
|
// This struct redefines the `execute_program_jit()` function, in order to pass the offsets
|
|
// associated with the fixed mbuff.
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
pub unsafe fn execute_program_jit(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
// If packet data is empty, do not send the address of an empty slice; send a null pointer
|
|
// as first argument instead, as this is uBPF's behavior (empty packet should not happen
|
|
// in the kernel; anyway the verifier would prevent the use of uninitialized registers).
|
|
// See `mul_loop` test.
|
|
let mem_ptr = match mem.len() {
|
|
0 => core::ptr::null_mut(),
|
|
_ => mem.as_ptr() as *mut u8,
|
|
};
|
|
|
|
match &self.parent.jit {
|
|
Some(jit) => Ok(jit.get_prog()(
|
|
self.mbuff.buffer.as_ptr() as *mut u8,
|
|
self.mbuff.buffer.len(),
|
|
mem_ptr,
|
|
mem.len(),
|
|
self.mbuff.data_offset,
|
|
self.mbuff.data_end_offset,
|
|
)),
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: program has not been JIT-compiled",
|
|
)),
|
|
}
|
|
}
|
|
|
|
/// Compile the loaded program using the Cranelift JIT.
|
|
///
|
|
/// If using helper functions, be sure to register them into the VM before calling this
|
|
/// function.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
///
|
|
/// vm.cranelift_compile();
|
|
/// ```
|
|
#[cfg(feature = "cranelift")]
|
|
pub fn cranelift_compile(&mut self) -> Result<(), Error> {
|
|
use crate::cranelift::CraneliftCompiler;
|
|
|
|
let prog = match self.parent.prog {
|
|
Some(prog) => prog,
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: No program set, call prog_set() to load one",
|
|
))?,
|
|
};
|
|
|
|
let mut compiler = CraneliftCompiler::new(self.parent.helpers.clone());
|
|
let program = compiler.compile_function(prog)?;
|
|
|
|
self.parent.cranelift_prog = Some(program);
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the previously compiled program, with the given packet data and metadata
|
|
/// buffer, in a manner very similar to `execute_program()`.
|
|
///
|
|
/// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
/// address of the beginning and of the end of the memory area used for packet data from some
|
|
/// metadata buffer, which in the case of this VM is handled internally. The offsets at which
|
|
/// the addresses should be placed should have be set at the creation of the VM.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
/// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
///
|
|
/// vm.cranelift_compile();
|
|
///
|
|
/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
|
|
/// let res = vm.execute_program_cranelift(mem).unwrap();
|
|
/// assert_eq!(res, 0xdd);
|
|
/// ```
|
|
#[cfg(feature = "cranelift")]
|
|
pub fn execute_program_cranelift(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
// If packet data is empty, do not send the address of an empty slice; send a null pointer
|
|
// as first argument instead, as this is uBPF's behavior (empty packet should not happen
|
|
// in the kernel; anyway the verifier would prevent the use of uninitialized registers).
|
|
// See `mul_loop` test.
|
|
let mem_ptr = match mem.len() {
|
|
0 => core::ptr::null_mut(),
|
|
_ => mem.as_ptr() as *mut u8,
|
|
};
|
|
|
|
let l = self.mbuff.buffer.len();
|
|
// Can this ever happen? Probably not, should be ensured at mbuff creation.
|
|
if self.mbuff.data_offset + 8 > l || self.mbuff.data_end_offset + 8 > l {
|
|
Err(Error::new(ErrorKind::Other, format!("Error: buffer too small ({:?}), cannot use data_offset {:?} and data_end_offset {:?}",
|
|
l, self.mbuff.data_offset, self.mbuff.data_end_offset)))?;
|
|
}
|
|
LittleEndian::write_u64(
|
|
&mut self.mbuff.buffer[(self.mbuff.data_offset)..],
|
|
mem.as_ptr() as u64,
|
|
);
|
|
LittleEndian::write_u64(
|
|
&mut self.mbuff.buffer[(self.mbuff.data_end_offset)..],
|
|
mem.as_ptr() as u64 + mem.len() as u64,
|
|
);
|
|
|
|
match &self.parent.cranelift_prog {
|
|
Some(prog) => Ok(prog.execute(
|
|
mem_ptr,
|
|
mem.len(),
|
|
self.mbuff.buffer.as_ptr() as *mut u8,
|
|
self.mbuff.buffer.len(),
|
|
)),
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: program has not been compiled with cranelift",
|
|
)),
|
|
}
|
|
}
|
|
}
|
|
|
|
/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
|
|
/// directly on the memory area representing packet data.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
///
|
|
/// // Provide only a reference to the packet data.
|
|
/// let res = vm.execute_program(mem).unwrap();
|
|
/// assert_eq!(res, 0x22cc);
|
|
/// ```
|
|
pub struct EbpfVmRaw<'a> {
|
|
parent: EbpfVmMbuff<'a>,
|
|
}
|
|
|
|
impl<'a> EbpfVmRaw<'a> {
|
|
/// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
/// When attempting to load the program, it passes through a simple verifier.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
/// ```
|
|
pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmRaw<'a>, Error> {
|
|
let parent = EbpfVmMbuff::new(prog)?;
|
|
Ok(EbpfVmRaw { parent })
|
|
}
|
|
|
|
/// Load a new eBPF program into the virtual machine instance.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog1 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let prog2 = &[
|
|
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27,
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog1)).unwrap();
|
|
/// vm.set_program(prog2);
|
|
///
|
|
/// let res = vm.execute_program(mem).unwrap();
|
|
/// assert_eq!(res, 0x22cc);
|
|
/// ```
|
|
pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
|
|
self.parent.set_program(prog)?;
|
|
Ok(())
|
|
}
|
|
|
|
/// Set a new verifier function. The function should return an `Error` if the program should be
|
|
/// rejected by the virtual machine. If a program has been loaded to the VM already, the
|
|
/// verifier is immediately run.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// use rbpf::{Error, ErrorKind};
|
|
/// use rbpf::ebpf;
|
|
///
|
|
/// // Define a simple verifier function.
|
|
/// fn verifier(prog: &[u8]) -> Result<(), Error> {
|
|
/// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
|
|
/// if last_insn.opc != ebpf::EXIT {
|
|
/// return Err(Error::new(ErrorKind::Other,
|
|
/// "[Verifier] Error: program does not end with “EXIT” instruction"));
|
|
/// }
|
|
/// Ok(())
|
|
/// }
|
|
///
|
|
/// let prog1 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
/// // Change the verifier.
|
|
/// vm.set_verifier(verifier).unwrap();
|
|
/// ```
|
|
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
self.parent.set_verifier(verifier)
|
|
}
|
|
|
|
/// Register a built-in or user-defined helper function in order to use it later from within
|
|
/// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
|
|
///
|
|
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
|
|
/// program. You should be able to change registered helpers after compiling, but not to add
|
|
/// new ones (i.e. with new keys).
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// #[cfg(feature = "std")] {
|
|
/// use rbpf::helpers;
|
|
///
|
|
/// let prog = &[
|
|
/// 0x79, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxdw r1, r1[0x00]
|
|
/// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
|
|
/// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
|
|
/// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
|
|
/// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
|
|
/// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mem = &mut [
|
|
/// 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
///
|
|
/// // Register a helper. This helper will store the result of the square root of r1 into r0.
|
|
/// vm.register_helper(1, helpers::sqrti);
|
|
///
|
|
/// let res = vm.execute_program(mem).unwrap();
|
|
/// assert_eq!(res, 0x10000000);
|
|
/// }
|
|
/// ```
|
|
pub fn register_helper(
|
|
&mut self,
|
|
key: u32,
|
|
function: fn(u64, u64, u64, u64, u64) -> u64,
|
|
) -> Result<(), Error> {
|
|
self.parent.register_helper(key, function)
|
|
}
|
|
|
|
/// Register a set of built-in or user-defined helper functions in order to use them later from
|
|
/// within the eBPF program. The helpers are registered into a hashmap, so the `key` can be any
|
|
/// `u32`.
|
|
#[allow(clippy::type_complexity)]
|
|
pub fn register_helper_set(
|
|
&mut self,
|
|
helpers: &HashMap<u32, fn(u64, u64, u64, u64, u64) -> u64>,
|
|
) -> Result<(), Error> {
|
|
for (key, function) in helpers {
|
|
self.parent.register_helper(*key, *function)?;
|
|
}
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the program loaded, with the given packet data.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
///
|
|
/// let res = vm.execute_program(mem).unwrap();
|
|
/// assert_eq!(res, 0x22cc);
|
|
/// ```
|
|
pub fn execute_program(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
self.parent.execute_program(mem, &[])
|
|
}
|
|
|
|
/// JIT-compile the loaded program. No argument required for this.
|
|
///
|
|
/// If using helper functions, be sure to register them into the VM before calling this
|
|
/// function.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
///
|
|
/// vm.jit_compile();
|
|
/// ```
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
pub fn jit_compile(&mut self) -> Result<(), Error> {
|
|
let prog = match self.parent.prog {
|
|
Some(prog) => prog,
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: No program set, call prog_set() to load one",
|
|
))?,
|
|
};
|
|
self.parent.jit = Some(jit::JitMemory::new(
|
|
prog,
|
|
&self.parent.helpers,
|
|
false,
|
|
false,
|
|
)?);
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the previously JIT-compiled program, with the given packet data, in a manner very
|
|
/// similar to `execute_program()`.
|
|
///
|
|
/// # Safety
|
|
///
|
|
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
|
|
/// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
|
|
/// very bad (program may segfault). It may be wise to check that the program works with the
|
|
/// interpreter before running the JIT-compiled version of it.
|
|
///
|
|
/// For this reason the function should be called from within an `unsafe` bloc.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
///
|
|
/// # #[cfg(all(not(windows), feature = "std"))]
|
|
/// vm.jit_compile();
|
|
///
|
|
/// # #[cfg(all(not(windows), feature = "std"))]
|
|
/// unsafe {
|
|
/// let res = vm.execute_program_jit(mem).unwrap();
|
|
/// assert_eq!(res, 0x22cc);
|
|
/// }
|
|
/// ```
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
pub unsafe fn execute_program_jit(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
let mut mbuff = vec![];
|
|
self.parent.execute_program_jit(mem, &mut mbuff)
|
|
}
|
|
|
|
/// Compile the loaded program using the Cranelift JIT.
|
|
///
|
|
/// If using helper functions, be sure to register them into the VM before calling this
|
|
/// function.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
///
|
|
/// vm.cranelift_compile();
|
|
/// ```
|
|
#[cfg(feature = "cranelift")]
|
|
pub fn cranelift_compile(&mut self) -> Result<(), Error> {
|
|
use crate::cranelift::CraneliftCompiler;
|
|
|
|
let prog = match self.parent.prog {
|
|
Some(prog) => prog,
|
|
None => Err(Error::new(
|
|
ErrorKind::Other,
|
|
"Error: No program set, call prog_set() to load one",
|
|
))?,
|
|
};
|
|
|
|
let mut compiler = CraneliftCompiler::new(self.parent.helpers.clone());
|
|
let program = compiler.compile_function(prog)?;
|
|
|
|
self.parent.cranelift_prog = Some(program);
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the previously compiled program, with the given packet data, in a manner very
|
|
/// similar to `execute_program()`.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mem = &mut [
|
|
/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
///
|
|
/// vm.cranelift_compile();
|
|
///
|
|
/// let res = vm.execute_program_cranelift(mem).unwrap();
|
|
/// assert_eq!(res, 0x22cc);
|
|
/// ```
|
|
#[cfg(feature = "cranelift")]
|
|
pub fn execute_program_cranelift(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
let mut mbuff = vec![];
|
|
self.parent.execute_program_cranelift(mem, &mut mbuff)
|
|
}
|
|
}
|
|
|
|
/// A virtual machine to run eBPF program. This kind of VM is used for programs that do not work
|
|
/// with any memory area—no metadata buffer, no packet data either.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0xb7, 0x01, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // mov r1, 1
|
|
/// 0xb7, 0x02, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, // mov r2, 2
|
|
/// 0xb7, 0x03, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // mov r3, 3
|
|
/// 0xb7, 0x04, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, // mov r4, 4
|
|
/// 0xb7, 0x05, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // mov r5, 5
|
|
/// 0xb7, 0x06, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, // mov r6, 6
|
|
/// 0xb7, 0x07, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00, // mov r7, 7
|
|
/// 0xb7, 0x08, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, // mov r8, 8
|
|
/// 0x4f, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // or r0, r5
|
|
/// 0x47, 0x00, 0x00, 0x00, 0xa0, 0x00, 0x00, 0x00, // or r0, 0xa0
|
|
/// 0x57, 0x00, 0x00, 0x00, 0xa3, 0x00, 0x00, 0x00, // and r0, 0xa3
|
|
/// 0xb7, 0x09, 0x00, 0x00, 0x91, 0x00, 0x00, 0x00, // mov r9, 0x91
|
|
/// 0x5f, 0x90, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // and r0, r9
|
|
/// 0x67, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, // lsh r0, 32
|
|
/// 0x67, 0x00, 0x00, 0x00, 0x16, 0x00, 0x00, 0x00, // lsh r0, 22
|
|
/// 0x6f, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // lsh r0, r8
|
|
/// 0x77, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, // rsh r0, 32
|
|
/// 0x77, 0x00, 0x00, 0x00, 0x13, 0x00, 0x00, 0x00, // rsh r0, 19
|
|
/// 0x7f, 0x70, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // rsh r0, r7
|
|
/// 0xa7, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // xor r0, 0x03
|
|
/// 0xaf, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // xor r0, r2
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
///
|
|
/// // Provide only a reference to the packet data.
|
|
/// let res = vm.execute_program().unwrap();
|
|
/// assert_eq!(res, 0x11);
|
|
/// ```
|
|
pub struct EbpfVmNoData<'a> {
|
|
parent: EbpfVmRaw<'a>,
|
|
}
|
|
|
|
impl<'a> EbpfVmNoData<'a> {
|
|
/// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
/// When attempting to load the program, it passes through a simple verifier.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let vm = rbpf::EbpfVmNoData::new(Some(prog));
|
|
/// ```
|
|
pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmNoData<'a>, Error> {
|
|
let parent = EbpfVmRaw::new(prog)?;
|
|
Ok(EbpfVmNoData { parent })
|
|
}
|
|
|
|
/// Load a new eBPF program into the virtual machine instance.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog1 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
/// let prog2 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog1)).unwrap();
|
|
///
|
|
/// let res = vm.execute_program().unwrap();
|
|
/// assert_eq!(res, 0x2211);
|
|
///
|
|
/// vm.set_program(prog2);
|
|
///
|
|
/// let res = vm.execute_program().unwrap();
|
|
/// assert_eq!(res, 0x1122);
|
|
/// ```
|
|
pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
|
|
self.parent.set_program(prog)?;
|
|
Ok(())
|
|
}
|
|
|
|
/// Set a new verifier function. The function should return an `Error` if the program should be
|
|
/// rejected by the virtual machine. If a program has been loaded to the VM already, the
|
|
/// verifier is immediately run.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// use rbpf::{Error, ErrorKind};
|
|
/// use rbpf::ebpf;
|
|
///
|
|
/// // Define a simple verifier function.
|
|
/// fn verifier(prog: &[u8]) -> Result<(), Error> {
|
|
/// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
|
|
/// if last_insn.opc != ebpf::EXIT {
|
|
/// return Err(Error::new(ErrorKind::Other,
|
|
/// "[Verifier] Error: program does not end with “EXIT” instruction"));
|
|
/// }
|
|
/// Ok(())
|
|
/// }
|
|
///
|
|
/// let prog1 = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// // Instantiate a VM.
|
|
/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
/// // Change the verifier.
|
|
/// vm.set_verifier(verifier).unwrap();
|
|
/// ```
|
|
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
self.parent.set_verifier(verifier)
|
|
}
|
|
|
|
/// Register a built-in or user-defined helper function in order to use it later from within
|
|
/// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
|
|
///
|
|
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
|
|
/// program. You should be able to change registered helpers after compiling, but not to add
|
|
/// new ones (i.e. with new keys).
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// #[cfg(feature = "std")] {
|
|
/// use rbpf::helpers;
|
|
///
|
|
/// let prog = &[
|
|
/// 0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, // mov r1, 0x010000000
|
|
/// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
|
|
/// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
|
|
/// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
|
|
/// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
|
|
/// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
///
|
|
/// // Register a helper. This helper will store the result of the square root of r1 into r0.
|
|
/// vm.register_helper(1, helpers::sqrti).unwrap();
|
|
///
|
|
/// let res = vm.execute_program().unwrap();
|
|
/// assert_eq!(res, 0x1000);
|
|
/// }
|
|
/// ```
|
|
pub fn register_helper(
|
|
&mut self,
|
|
key: u32,
|
|
function: fn(u64, u64, u64, u64, u64) -> u64,
|
|
) -> Result<(), Error> {
|
|
self.parent.register_helper(key, function)
|
|
}
|
|
|
|
/// JIT-compile the loaded program. No argument required for this.
|
|
///
|
|
/// If using helper functions, be sure to register them into the VM before calling this
|
|
/// function.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
///
|
|
///
|
|
/// vm.jit_compile();
|
|
/// ```
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
pub fn jit_compile(&mut self) -> Result<(), Error> {
|
|
self.parent.jit_compile()
|
|
}
|
|
|
|
/// Execute the program loaded, without providing pointers to any memory area whatsoever.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
///
|
|
/// // For this kind of VM, the `execute_program()` function needs no argument.
|
|
/// let res = vm.execute_program().unwrap();
|
|
/// assert_eq!(res, 0x1122);
|
|
/// ```
|
|
pub fn execute_program(&self) -> Result<u64, Error> {
|
|
self.parent.execute_program(&mut [])
|
|
}
|
|
|
|
/// Execute the previously JIT-compiled program, without providing pointers to any memory area
|
|
/// whatsoever, in a manner very similar to `execute_program()`.
|
|
///
|
|
/// # Safety
|
|
///
|
|
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
|
|
/// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
|
|
/// very bad (program may segfault). It may be wise to check that the program works with the
|
|
/// interpreter before running the JIT-compiled version of it.
|
|
///
|
|
/// For this reason the function should be called from within an `unsafe` bloc.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
///
|
|
/// # #[cfg(all(not(windows), feature = "std"))]
|
|
/// vm.jit_compile();
|
|
///
|
|
/// # #[cfg(all(not(windows), feature = "std"))]
|
|
/// unsafe {
|
|
/// let res = vm.execute_program_jit().unwrap();
|
|
/// assert_eq!(res, 0x1122);
|
|
/// }
|
|
/// ```
|
|
#[cfg(all(not(windows), feature = "std"))]
|
|
pub unsafe fn execute_program_jit(&self) -> Result<u64, Error> {
|
|
self.parent.execute_program_jit(&mut [])
|
|
}
|
|
|
|
/// Compile the loaded program using the Cranelift JIT.
|
|
///
|
|
/// If using helper functions, be sure to register them into the VM before calling this
|
|
/// function.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
///
|
|
///
|
|
/// vm.cranelift_compile();
|
|
/// ```
|
|
#[cfg(feature = "cranelift")]
|
|
pub fn cranelift_compile(&mut self) -> Result<(), Error> {
|
|
self.parent.cranelift_compile()
|
|
}
|
|
|
|
/// Execute the previously JIT-compiled program, without providing pointers to any memory area
|
|
/// whatsoever, in a manner very similar to `execute_program()`.
|
|
///
|
|
/// # Examples
|
|
///
|
|
/// ```
|
|
/// let prog = &[
|
|
/// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
/// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
/// ];
|
|
///
|
|
/// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
///
|
|
/// vm.cranelift_compile();
|
|
///
|
|
/// let res = vm.execute_program_cranelift().unwrap();
|
|
/// assert_eq!(res, 0x1122);
|
|
/// ```
|
|
#[cfg(feature = "cranelift")]
|
|
pub fn execute_program_cranelift(&self) -> Result<u64, Error> {
|
|
self.parent.execute_program_cranelift(&mut [])
|
|
}
|
|
}
|
|
|
|
/// EbpfVm with Owned data
|
|
pub struct EbpfVmRawOwned {
|
|
parent: EbpfVmRaw<'static>,
|
|
data_len: usize,
|
|
data_cap: usize,
|
|
}
|
|
|
|
impl EbpfVmRawOwned {
|
|
/// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
/// When attempting to load the program, it passes through a simple verifier.
|
|
pub fn new(prog: Option<Vec<u8>>) -> Result<EbpfVmRawOwned, Error> {
|
|
let (prog, data_len, data_cap) = match prog {
|
|
Some(prog) => {
|
|
let data_len = prog.len();
|
|
let data_cap = prog.capacity();
|
|
let slice = prog.leak();
|
|
let slice = unsafe { core::slice::from_raw_parts(slice.as_ptr(), data_len) };
|
|
(Some(slice), data_len, data_cap)
|
|
}
|
|
None => (None, 0, 0),
|
|
};
|
|
let parent = EbpfVmRaw::new(prog)?;
|
|
Ok(Self {
|
|
parent,
|
|
data_len,
|
|
data_cap,
|
|
})
|
|
}
|
|
/// Load a new eBPF program into the virtual machine instance
|
|
pub fn set_program(&mut self, prog: Vec<u8>) -> Result<(), Error> {
|
|
self.data_len = prog.len();
|
|
self.data_cap = prog.capacity();
|
|
let slice = prog.leak();
|
|
self.parent.set_program(slice)?;
|
|
Ok(())
|
|
}
|
|
|
|
/// Set a new verifier function. The function should return an Error if the program should be rejected by the virtual machine.
|
|
/// If a program has been loaded to the VM already, the verifier is immediately run.
|
|
pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
self.parent.set_verifier(verifier)
|
|
}
|
|
|
|
/// Register a built-in or user-defined helper function in order to use it later from within the eBPF program.
|
|
/// The helper is registered into a hashmap, so the key can be any u32.
|
|
/// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the program.
|
|
/// You should be able to change registered helpers after compiling, but not to add new ones (i. e. with new keys).
|
|
pub fn register_helper(
|
|
&mut self,
|
|
key: u32,
|
|
function: fn(u64, u64, u64, u64, u64) -> u64,
|
|
) -> Result<(), Error> {
|
|
self.parent.register_helper(key, function)
|
|
}
|
|
|
|
/// Register a set of built-in or user-defined helper functions in order to use them later from
|
|
/// within the eBPF program. The helpers are registered into a hashmap, so the `key` can be any
|
|
/// `u32`.
|
|
#[allow(clippy::type_complexity)]
|
|
pub fn register_helper_set(
|
|
&mut self,
|
|
helpers: &HashMap<u32, fn(u64, u64, u64, u64, u64) -> u64>,
|
|
) -> Result<(), Error> {
|
|
for (key, function) in helpers {
|
|
self.parent.register_helper(*key, *function)?;
|
|
}
|
|
Ok(())
|
|
}
|
|
|
|
/// Execute the previously JIT-compiled program, with the given packet data, in a manner very similar to execute_program().
|
|
///
|
|
/// Safety
|
|
///
|
|
/// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime check for memory access;
|
|
/// so if the eBPF program attempts erroneous accesses, this may end very bad (program may segfault).
|
|
/// It may be wise to check that the program works with the interpreter before running the JIT-compiled version of it.
|
|
///
|
|
/// For this reason the function should be called from within an unsafe bloc.
|
|
pub fn execute_program(&self, mem: &mut [u8]) -> Result<u64, Error> {
|
|
self.parent.execute_program(mem)
|
|
}
|
|
}
|
|
|
|
impl Drop for EbpfVmRawOwned {
|
|
fn drop(&mut self) {
|
|
match self.parent.parent.prog {
|
|
Some(prog) => unsafe {
|
|
let ptr = prog.as_ptr();
|
|
let _prog = Vec::from_raw_parts(ptr as *mut u8, self.data_len, self.data_cap);
|
|
},
|
|
None => {}
|
|
};
|
|
}
|
|
}
|