|
@@ -1,1782 +0,0 @@
|
|
|
-// SPDX-License-Identifier: (Apache-2.0 OR MIT)
|
|
|
-// Derived from uBPF <https://github.com/iovisor/ubpf>
|
|
|
-// Copyright 2016 6WIND S.A. <quentin.monnet@6wind.com>
|
|
|
-// Copyright 2023 Isovalent, Inc. <quentin@isovalent.com>
|
|
|
-
|
|
|
-//! Virtual machine and JIT compiler for eBPF programs.
|
|
|
-#![doc(
|
|
|
- html_logo_url = "https://raw.githubusercontent.com/qmonnet/rbpf/main/misc/rbpf.png",
|
|
|
- html_favicon_url = "https://raw.githubusercontent.com/qmonnet/rbpf/main/misc/rbpf.ico"
|
|
|
-)]
|
|
|
-#![warn(missing_docs)]
|
|
|
-// There are unused mut warnings due to unsafe code.
|
|
|
-#![allow(unused_mut)]
|
|
|
-// Allows old-style clippy
|
|
|
-#![allow(renamed_and_removed_lints)]
|
|
|
-#![cfg_attr(
|
|
|
- clippy,
|
|
|
- allow(
|
|
|
- redundant_field_names,
|
|
|
- single_match,
|
|
|
- cast_lossless,
|
|
|
- doc_markdown,
|
|
|
- match_same_arms,
|
|
|
- unreadable_literal
|
|
|
- )
|
|
|
-)]
|
|
|
-// Configures the crate to be `no_std` when `std` feature is disabled.
|
|
|
-#![cfg_attr(not(feature = "std"), no_std)]
|
|
|
-extern crate alloc;
|
|
|
-use alloc::{collections::BTreeMap, format, vec, vec::Vec};
|
|
|
-
|
|
|
-use byteorder::{ByteOrder, LittleEndian};
|
|
|
-
|
|
|
-type HashMap<K, V> = BTreeMap<K, V>;
|
|
|
-#[cfg(feature = "cranelift")]
|
|
|
-type HashSet<T> = alloc::collections::BTreeSet<T>;
|
|
|
-mod asm_parser;
|
|
|
-pub mod assembler;
|
|
|
-#[cfg(feature = "cranelift")]
|
|
|
-mod cranelift;
|
|
|
-pub mod disassembler;
|
|
|
-pub mod ebpf;
|
|
|
-pub mod helpers;
|
|
|
-pub mod insn_builder;
|
|
|
-mod interpreter;
|
|
|
-#[cfg(all(not(windows), feature = "std"))]
|
|
|
-mod jit;
|
|
|
-#[cfg(not(feature = "std"))]
|
|
|
-mod no_std_error;
|
|
|
-mod stack;
|
|
|
-mod verifier;
|
|
|
-
|
|
|
-#[cfg(feature = "std")]
|
|
|
-pub use std::io::{Error, ErrorKind};
|
|
|
-
|
|
|
-/// In no_std we use a custom implementation of the error which acts as a
|
|
|
-/// replacement for the io Error.
|
|
|
-#[cfg(not(feature = "std"))]
|
|
|
-pub use crate::no_std_error::{Error, ErrorKind};
|
|
|
-
|
|
|
-/// eBPF verification function that returns an error if the program does not meet its requirements.
|
|
|
-///
|
|
|
-/// Some examples of things the verifier may reject the program for:
|
|
|
-///
|
|
|
-/// - Program does not terminate.
|
|
|
-/// - Unknown instructions.
|
|
|
-/// - Bad formed instruction.
|
|
|
-/// - Unknown eBPF helper index.
|
|
|
-pub type Verifier = fn(prog: &[u8]) -> Result<(), Error>;
|
|
|
-
|
|
|
-/// eBPF helper function.
|
|
|
-pub type Helper = fn(u64, u64, u64, u64, u64) -> u64;
|
|
|
-
|
|
|
-// A metadata buffer with two offset indications. It can be used in one kind of eBPF VM to simulate
|
|
|
-// the use of a metadata buffer each time the program is executed, without the user having to
|
|
|
-// actually handle it. The offsets are used to tell the VM where in the buffer the pointers to
|
|
|
-// packet data start and end should be stored each time the program is run on a new packet.
|
|
|
-struct MetaBuff {
|
|
|
- data_offset: usize,
|
|
|
- data_end_offset: usize,
|
|
|
- buffer: Vec<u8>,
|
|
|
-}
|
|
|
-
|
|
|
-/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
|
|
|
-/// on a metadata buffer containing pointers to packet data.
|
|
|
-///
|
|
|
-/// # Examples
|
|
|
-///
|
|
|
-/// ```
|
|
|
-/// let prog = &[
|
|
|
-/// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff at offset 8 into R1.
|
|
|
-/// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
|
-/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
-/// ];
|
|
|
-/// let mem = &mut [
|
|
|
-/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
-/// ];
|
|
|
-///
|
|
|
-/// // Just for the example we create our metadata buffer from scratch, and we store the pointers
|
|
|
-/// // to packet data start and end in it.
|
|
|
-/// let mut mbuff = [0u8; 32];
|
|
|
-/// unsafe {
|
|
|
-/// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
|
|
|
-/// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
|
|
|
-/// *data = mem.as_ptr() as u64;
|
|
|
-/// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
|
|
|
-/// }
|
|
|
-///
|
|
|
-/// // Instantiate a VM.
|
|
|
-/// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
|
-///
|
|
|
-/// // Provide both a reference to the packet data, and to the metadata buffer.
|
|
|
-/// let res = vm.execute_program(mem, &mut mbuff).unwrap();
|
|
|
-/// assert_eq!(res, 0x2211);
|
|
|
-/// ```
|
|
|
-pub struct EbpfVmMbuff<'a> {
|
|
|
- prog: Option<&'a [u8]>,
|
|
|
- verifier: Verifier,
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- jit: Option<jit::JitMemory<'a>>,
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- cranelift_prog: Option<cranelift::CraneliftProgram>,
|
|
|
- helpers: HashMap<u32, ebpf::Helper>,
|
|
|
-}
|
|
|
-
|
|
|
-impl<'a> EbpfVmMbuff<'a> {
|
|
|
- /// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
|
- /// When attempting to load the program, it passes through a simple verifier.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
|
- /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmMbuff<'a>, Error> {
|
|
|
- if let Some(prog) = prog {
|
|
|
- verifier::check(prog)?;
|
|
|
- }
|
|
|
-
|
|
|
- Ok(EbpfVmMbuff {
|
|
|
- prog,
|
|
|
- verifier: verifier::check,
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- jit: None,
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- cranelift_prog: None,
|
|
|
- helpers: HashMap::new(),
|
|
|
- })
|
|
|
- }
|
|
|
-
|
|
|
- /// Load a new eBPF program into the virtual machine instance.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog1 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let prog2 = &[
|
|
|
- /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
|
- /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
|
- /// vm.set_program(prog2).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
|
|
|
- (self.verifier)(prog)?;
|
|
|
- self.prog = Some(prog);
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Set a new verifier function. The function should return an `Error` if the program should be
|
|
|
- /// rejected by the virtual machine. If a program has been loaded to the VM already, the
|
|
|
- /// verifier is immediately run.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// use rbpf::{Error, ErrorKind};
|
|
|
- /// use rbpf::ebpf;
|
|
|
- ///
|
|
|
- /// // Define a simple verifier function.
|
|
|
- /// fn verifier(prog: &[u8]) -> Result<(), Error> {
|
|
|
- /// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
|
|
|
- /// if last_insn.opc != ebpf::EXIT {
|
|
|
- /// return Err(Error::new(ErrorKind::Other,
|
|
|
- /// "[Verifier] Error: program does not end with “EXIT” instruction"));
|
|
|
- /// }
|
|
|
- /// Ok(())
|
|
|
- /// }
|
|
|
- ///
|
|
|
- /// let prog1 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
|
- /// // Change the verifier.
|
|
|
- /// vm.set_verifier(verifier).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
|
- if let Some(prog) = self.prog {
|
|
|
- verifier(prog)?;
|
|
|
- }
|
|
|
- self.verifier = verifier;
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Register a built-in or user-defined helper function in order to use it later from within
|
|
|
- /// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
|
|
|
- ///
|
|
|
- /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
|
|
|
- /// program. You should be able to change registered helpers after compiling, but not to add
|
|
|
- /// new ones (i.e. with new keys).
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// use rbpf::helpers;
|
|
|
- ///
|
|
|
- /// // This program was compiled with clang, from a C program containing the following single
|
|
|
- /// // instruction: `return bpf_trace_printk("foo %c %c %c\n", 10, 1, 2, 3);`
|
|
|
- /// let prog = &[
|
|
|
- /// 0x18, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load 0 as u64 into r1 (That would be
|
|
|
- /// 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // replaced by tc by the address of
|
|
|
- /// // the format string, in the .map
|
|
|
- /// // section of the ELF file).
|
|
|
- /// 0xb7, 0x02, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, // mov r2, 10
|
|
|
- /// 0xb7, 0x03, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // mov r3, 1
|
|
|
- /// 0xb7, 0x04, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, // mov r4, 2
|
|
|
- /// 0xb7, 0x05, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // mov r5, 3
|
|
|
- /// 0x85, 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, // call helper with key 6
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// // Register a helper.
|
|
|
- /// // On running the program this helper will print the content of registers r3, r4 and r5 to
|
|
|
- /// // standard output.
|
|
|
- /// # #[cfg(feature = "std")]
|
|
|
- /// vm.register_helper(6, helpers::bpf_trace_printf).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn register_helper(&mut self, key: u32, function: Helper) -> Result<(), Error> {
|
|
|
- self.helpers.insert(key, function);
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the program loaded, with the given packet data and metadata buffer.
|
|
|
- ///
|
|
|
- /// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
|
- /// address of the beginning and of the end of the memory area used for packet data from the
|
|
|
- /// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
|
|
|
- /// pointers are correctly stored in the buffer.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
|
- /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Just for the example we create our metadata buffer from scratch, and we store the
|
|
|
- /// // pointers to packet data start and end in it.
|
|
|
- /// let mut mbuff = [0u8; 32];
|
|
|
- /// unsafe {
|
|
|
- /// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
|
|
|
- /// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
|
|
|
- /// *data = mem.as_ptr() as u64;
|
|
|
- /// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
|
|
|
- /// }
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// // Provide both a reference to the packet data, and to the metadata buffer.
|
|
|
- /// let res = vm.execute_program(mem, &mut mbuff).unwrap();
|
|
|
- /// assert_eq!(res, 0x2211);
|
|
|
- /// ```
|
|
|
- pub fn execute_program(&self, mem: &[u8], mbuff: &[u8]) -> Result<u64, Error> {
|
|
|
- interpreter::execute_program(self.prog, mem, mbuff, &self.helpers)
|
|
|
- }
|
|
|
-
|
|
|
- /// JIT-compile the loaded program. No argument required for this.
|
|
|
- ///
|
|
|
- /// If using helper functions, be sure to register them into the VM before calling this
|
|
|
- /// function.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
|
- /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// vm.jit_compile();
|
|
|
- /// ```
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- pub fn jit_compile(&mut self) -> Result<(), Error> {
|
|
|
- let prog = match self.prog {
|
|
|
- Some(prog) => prog,
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: No program set, call prog_set() to load one",
|
|
|
- ))?,
|
|
|
- };
|
|
|
- self.jit = Some(jit::JitMemory::new(prog, &self.helpers, true, false)?);
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously JIT-compiled program, with the given packet data and metadata
|
|
|
- /// buffer, in a manner very similar to `execute_program()`.
|
|
|
- ///
|
|
|
- /// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
|
- /// address of the beginning and of the end of the memory area used for packet data from the
|
|
|
- /// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
|
|
|
- /// pointers are correctly stored in the buffer.
|
|
|
- ///
|
|
|
- /// # Safety
|
|
|
- ///
|
|
|
- /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
|
|
|
- /// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
|
|
|
- /// very bad (program may segfault). It may be wise to check that the program works with the
|
|
|
- /// interpreter before running the JIT-compiled version of it.
|
|
|
- ///
|
|
|
- /// For this reason the function should be called from within an `unsafe` bloc.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into r1.
|
|
|
- /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Just for the example we create our metadata buffer from scratch, and we store the
|
|
|
- /// // pointers to packet data start and end in it.
|
|
|
- /// let mut mbuff = [0u8; 32];
|
|
|
- /// unsafe {
|
|
|
- /// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
|
|
|
- /// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
|
|
|
- /// *data = mem.as_ptr() as u64;
|
|
|
- /// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
|
|
|
- /// }
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// # #[cfg(all(not(windows), feature = "std"))]
|
|
|
- /// vm.jit_compile();
|
|
|
- ///
|
|
|
- /// // Provide both a reference to the packet data, and to the metadata buffer.
|
|
|
- /// # #[cfg(all(not(windows), feature = "std"))]
|
|
|
- /// unsafe {
|
|
|
- /// let res = vm.execute_program_jit(mem, &mut mbuff).unwrap();
|
|
|
- /// assert_eq!(res, 0x2211);
|
|
|
- /// }
|
|
|
- /// ```
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- pub unsafe fn execute_program_jit(
|
|
|
- &self,
|
|
|
- mem: &mut [u8],
|
|
|
- mbuff: &'a mut [u8],
|
|
|
- ) -> Result<u64, Error> {
|
|
|
- // If packet data is empty, do not send the address of an empty slice; send a null pointer
|
|
|
- // as first argument instead, as this is uBPF's behavior (empty packet should not happen
|
|
|
- // in the kernel; anyway the verifier would prevent the use of uninitialized registers).
|
|
|
- // See `mul_loop` test.
|
|
|
- let mem_ptr = match mem.len() {
|
|
|
- 0 => std::ptr::null_mut(),
|
|
|
- _ => mem.as_ptr() as *mut u8,
|
|
|
- };
|
|
|
- // The last two arguments are not used in this function. They would be used if there was a
|
|
|
- // need to indicate to the JIT at which offset in the mbuff mem_ptr and mem_ptr + mem.len()
|
|
|
- // should be stored; this is what happens with struct EbpfVmFixedMbuff.
|
|
|
- match &self.jit {
|
|
|
- Some(jit) => Ok(jit.get_prog()(
|
|
|
- mbuff.as_ptr() as *mut u8,
|
|
|
- mbuff.len(),
|
|
|
- mem_ptr,
|
|
|
- mem.len(),
|
|
|
- 0,
|
|
|
- 0,
|
|
|
- )),
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: program has not been JIT-compiled",
|
|
|
- )),
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- /// Compile the loaded program using the Cranelift JIT.
|
|
|
- ///
|
|
|
- /// If using helper functions, be sure to register them into the VM before calling this
|
|
|
- /// function.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
|
|
|
- /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// vm.cranelift_compile();
|
|
|
- /// ```
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- pub fn cranelift_compile(&mut self) -> Result<(), Error> {
|
|
|
- use crate::cranelift::CraneliftCompiler;
|
|
|
-
|
|
|
- let prog = match self.prog {
|
|
|
- Some(prog) => prog,
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: No program set, call prog_set() to load one",
|
|
|
- ))?,
|
|
|
- };
|
|
|
-
|
|
|
- let mut compiler = CraneliftCompiler::new(self.helpers.clone());
|
|
|
- let program = compiler.compile_function(prog)?;
|
|
|
-
|
|
|
- self.cranelift_prog = Some(program);
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously compiled program, with the given packet data and metadata
|
|
|
- /// buffer, in a manner very similar to `execute_program()`.
|
|
|
- ///
|
|
|
- /// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
|
- /// address of the beginning and of the end of the memory area used for packet data from the
|
|
|
- /// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
|
|
|
- /// pointers are correctly stored in the buffer.
|
|
|
- ///
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into r1.
|
|
|
- /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Just for the example we create our metadata buffer from scratch, and we store the
|
|
|
- /// // pointers to packet data start and end in it.
|
|
|
- /// let mut mbuff = [0u8; 32];
|
|
|
- /// unsafe {
|
|
|
- /// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
|
|
|
- /// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
|
|
|
- /// *data = mem.as_ptr() as u64;
|
|
|
- /// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
|
|
|
- /// }
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// vm.cranelift_compile();
|
|
|
- ///
|
|
|
- /// // Provide both a reference to the packet data, and to the metadata buffer.
|
|
|
- /// let res = vm.execute_program_cranelift(mem, &mut mbuff).unwrap();
|
|
|
- /// assert_eq!(res, 0x2211);
|
|
|
- /// ```
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- pub fn execute_program_cranelift(
|
|
|
- &self,
|
|
|
- mem: &mut [u8],
|
|
|
- mbuff: &'a mut [u8],
|
|
|
- ) -> Result<u64, Error> {
|
|
|
- // If packet data is empty, do not send the address of an empty slice; send a null pointer
|
|
|
- // as first argument instead, as this is uBPF's behavior (empty packet should not happen
|
|
|
- // in the kernel; anyway the verifier would prevent the use of uninitialized registers).
|
|
|
- // See `mul_loop` test.
|
|
|
- let mem_ptr = match mem.len() {
|
|
|
- 0 => core::ptr::null_mut(),
|
|
|
- _ => mem.as_ptr() as *mut u8,
|
|
|
- };
|
|
|
-
|
|
|
- // The last two arguments are not used in this function. They would be used if there was a
|
|
|
- // need to indicate to the JIT at which offset in the mbuff mem_ptr and mem_ptr + mem.len()
|
|
|
- // should be stored; this is what happens with struct EbpfVmFixedMbuff.
|
|
|
- match &self.cranelift_prog {
|
|
|
- Some(prog) => {
|
|
|
- Ok(prog.execute(mem_ptr, mem.len(), mbuff.as_ptr() as *mut u8, mbuff.len()))
|
|
|
- }
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: program has not been compiled with cranelift",
|
|
|
- )),
|
|
|
- }
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
|
|
|
-/// on a metadata buffer containing pointers to packet data, but it internally handles the buffer
|
|
|
-/// so as to save the effort to manually handle the metadata buffer for the user.
|
|
|
-///
|
|
|
-/// This struct implements a static internal buffer that is passed to the program. The user has to
|
|
|
-/// indicate the offset values at which the eBPF program expects to find the start and the end of
|
|
|
-/// packet data in the buffer. On calling the `execute_program()` or `execute_program_jit()` functions, the
|
|
|
-/// struct automatically updates the addresses in this static buffer, at the appointed offsets, for
|
|
|
-/// the start and the end of the packet data the program is called upon.
|
|
|
-///
|
|
|
-/// # Examples
|
|
|
-///
|
|
|
-/// This was compiled with clang from the following program, in C:
|
|
|
-///
|
|
|
-/// ```c
|
|
|
-/// #include <linux/bpf.h>
|
|
|
-/// #include "path/to/linux/samples/bpf/bpf_helpers.h"
|
|
|
-///
|
|
|
-/// SEC(".classifier")
|
|
|
-/// int classifier(struct __sk_buff *skb)
|
|
|
-/// {
|
|
|
-/// void *data = (void *)(long)skb->data;
|
|
|
-/// void *data_end = (void *)(long)skb->data_end;
|
|
|
-///
|
|
|
-/// // Check program is long enough.
|
|
|
-/// if (data + 5 > data_end)
|
|
|
-/// return 0;
|
|
|
-///
|
|
|
-/// return *((char *)data + 5);
|
|
|
-/// }
|
|
|
-/// ```
|
|
|
-///
|
|
|
-/// Some small modifications have been brought to have it work, see comments.
|
|
|
-///
|
|
|
-/// ```
|
|
|
-/// let prog = &[
|
|
|
-/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
-/// // Here opcode 0x61 had to be replace by 0x79 so as to load a 8-bytes long address.
|
|
|
-/// // Also, offset 0x4c had to be replace with e.g. 0x40 so as to prevent the two pointers
|
|
|
-/// // from overlapping in the buffer.
|
|
|
-/// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load pointer to mem from r1[0x40] to r2
|
|
|
-/// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
-/// // Here opcode 0x61 had to be replace by 0x79 so as to load a 8-bytes long address.
|
|
|
-/// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load ptr to mem_end from r1[0x50] to r1
|
|
|
-/// 0x2d, 0x12, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
|
-/// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
|
-/// 0x67, 0x00, 0x00, 0x00, 0x38, 0x00, 0x00, 0x00, // r0 >>= 56
|
|
|
-/// 0xc7, 0x00, 0x00, 0x00, 0x38, 0x00, 0x00, 0x00, // r0 <<= 56 (arsh) extend byte sign to u64
|
|
|
-/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
-/// ];
|
|
|
-/// let mem1 = &mut [
|
|
|
-/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
-/// ];
|
|
|
-/// let mem2 = &mut [
|
|
|
-/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
|
|
|
-/// ];
|
|
|
-///
|
|
|
-/// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
|
-/// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
|
-///
|
|
|
-/// // Provide only a reference to the packet data. We do not manage the metadata buffer.
|
|
|
-/// let res = vm.execute_program(mem1).unwrap();
|
|
|
-/// assert_eq!(res, 0xffffffffffffffdd);
|
|
|
-///
|
|
|
-/// let res = vm.execute_program(mem2).unwrap();
|
|
|
-/// assert_eq!(res, 0x27);
|
|
|
-/// ```
|
|
|
-pub struct EbpfVmFixedMbuff<'a> {
|
|
|
- parent: EbpfVmMbuff<'a>,
|
|
|
- mbuff: MetaBuff,
|
|
|
-}
|
|
|
-
|
|
|
-impl<'a> EbpfVmFixedMbuff<'a> {
|
|
|
- /// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
|
- /// When attempting to load the program, it passes through a simple verifier.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
|
- /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
- /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
|
- /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
|
- /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
|
- /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn new(
|
|
|
- prog: Option<&'a [u8]>,
|
|
|
- data_offset: usize,
|
|
|
- data_end_offset: usize,
|
|
|
- ) -> Result<EbpfVmFixedMbuff<'a>, Error> {
|
|
|
- let parent = EbpfVmMbuff::new(prog)?;
|
|
|
- let get_buff_len = |x: usize, y: usize| if x >= y { x + 8 } else { y + 8 };
|
|
|
- let buffer = vec![0u8; get_buff_len(data_offset, data_end_offset)];
|
|
|
- let mbuff = MetaBuff {
|
|
|
- data_offset,
|
|
|
- data_end_offset,
|
|
|
- buffer,
|
|
|
- };
|
|
|
- Ok(EbpfVmFixedMbuff { parent, mbuff })
|
|
|
- }
|
|
|
-
|
|
|
- /// Load a new eBPF program into the virtual machine instance.
|
|
|
- ///
|
|
|
- /// At the same time, load new offsets for storing pointers to start and end of packet data in
|
|
|
- /// the internal metadata buffer.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog1 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let prog2 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
|
- /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
- /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
|
- /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
|
- /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27,
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog1), 0, 0).unwrap();
|
|
|
- /// vm.set_program(prog2, 0x40, 0x50);
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0x27);
|
|
|
- /// ```
|
|
|
- pub fn set_program(
|
|
|
- &mut self,
|
|
|
- prog: &'a [u8],
|
|
|
- data_offset: usize,
|
|
|
- data_end_offset: usize,
|
|
|
- ) -> Result<(), Error> {
|
|
|
- let get_buff_len = |x: usize, y: usize| if x >= y { x + 8 } else { y + 8 };
|
|
|
- let buffer = vec![0u8; get_buff_len(data_offset, data_end_offset)];
|
|
|
- self.mbuff.buffer = buffer;
|
|
|
- self.mbuff.data_offset = data_offset;
|
|
|
- self.mbuff.data_end_offset = data_end_offset;
|
|
|
- self.parent.set_program(prog)?;
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Set a new verifier function. The function should return an `Error` if the program should be
|
|
|
- /// rejected by the virtual machine. If a program has been loaded to the VM already, the
|
|
|
- /// verifier is immediately run.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// use rbpf::{Error, ErrorKind};
|
|
|
- /// use rbpf::ebpf;
|
|
|
- ///
|
|
|
- /// // Define a simple verifier function.
|
|
|
- /// fn verifier(prog: &[u8]) -> Result<(), Error> {
|
|
|
- /// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
|
|
|
- /// if last_insn.opc != ebpf::EXIT {
|
|
|
- /// return Err(Error::new(ErrorKind::Other,
|
|
|
- /// "[Verifier] Error: program does not end with “EXIT” instruction"));
|
|
|
- /// }
|
|
|
- /// Ok(())
|
|
|
- /// }
|
|
|
- ///
|
|
|
- /// let prog1 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
|
- /// // Change the verifier.
|
|
|
- /// vm.set_verifier(verifier).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
|
- self.parent.set_verifier(verifier)
|
|
|
- }
|
|
|
-
|
|
|
- /// Register a built-in or user-defined helper function in order to use it later from within
|
|
|
- /// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
|
|
|
- ///
|
|
|
- /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
|
|
|
- /// program. You should be able to change registered helpers after compiling, but not to add
|
|
|
- /// new ones (i.e. with new keys).
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// #[cfg(feature = "std")] {
|
|
|
- /// use rbpf::helpers;
|
|
|
- ///
|
|
|
- /// // This program was compiled with clang, from a C program containing the following single
|
|
|
- /// // instruction: `return bpf_trace_printk("foo %c %c %c\n", 10, 1, 2, 3);`
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
|
- /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
- /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
|
- /// 0x2d, 0x12, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 6 instructions
|
|
|
- /// 0x71, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r1
|
|
|
- /// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
|
|
|
- /// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
|
|
|
- /// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
|
|
|
- /// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
|
|
|
- /// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x09,
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
|
- ///
|
|
|
- /// // Register a helper. This helper will store the result of the square root of r1 into r0.
|
|
|
- /// vm.register_helper(1, helpers::sqrti);
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program(mem).unwrap();
|
|
|
- /// assert_eq!(res, 3);
|
|
|
- /// }
|
|
|
- /// ```
|
|
|
- pub fn register_helper(
|
|
|
- &mut self,
|
|
|
- key: u32,
|
|
|
- function: fn(u64, u64, u64, u64, u64) -> u64,
|
|
|
- ) -> Result<(), Error> {
|
|
|
- self.parent.register_helper(key, function)
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the program loaded, with the given packet data.
|
|
|
- ///
|
|
|
- /// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
|
- /// address of the beginning and of the end of the memory area used for packet data from some
|
|
|
- /// metadata buffer, which in the case of this VM is handled internally. The offsets at which
|
|
|
- /// the addresses should be placed should have be set at the creation of the VM.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
|
- /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
- /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
|
- /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
|
- /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
|
- /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
|
- ///
|
|
|
- /// // Provide only a reference to the packet data. We do not manage the metadata buffer.
|
|
|
- /// let res = vm.execute_program(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0xdd);
|
|
|
- /// ```
|
|
|
- pub fn execute_program(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
|
- let l = self.mbuff.buffer.len();
|
|
|
- // Can this ever happen? Probably not, should be ensured at mbuff creation.
|
|
|
- if self.mbuff.data_offset + 8 > l || self.mbuff.data_end_offset + 8 > l {
|
|
|
- Err(Error::new(ErrorKind::Other, format!("Error: buffer too small ({:?}), cannot use data_offset {:?} and data_end_offset {:?}",
|
|
|
- l, self.mbuff.data_offset, self.mbuff.data_end_offset)))?;
|
|
|
- }
|
|
|
- LittleEndian::write_u64(
|
|
|
- &mut self.mbuff.buffer[(self.mbuff.data_offset)..],
|
|
|
- mem.as_ptr() as u64,
|
|
|
- );
|
|
|
- LittleEndian::write_u64(
|
|
|
- &mut self.mbuff.buffer[(self.mbuff.data_end_offset)..],
|
|
|
- mem.as_ptr() as u64 + mem.len() as u64,
|
|
|
- );
|
|
|
- self.parent.execute_program(mem, &self.mbuff.buffer)
|
|
|
- }
|
|
|
-
|
|
|
- /// JIT-compile the loaded program. No argument required for this.
|
|
|
- ///
|
|
|
- /// If using helper functions, be sure to register them into the VM before calling this
|
|
|
- /// function.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
|
- /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
- /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
|
- /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
|
- /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
|
- /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
|
- ///
|
|
|
- /// vm.jit_compile();
|
|
|
- /// ```
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- pub fn jit_compile(&mut self) -> Result<(), Error> {
|
|
|
- let prog = match self.parent.prog {
|
|
|
- Some(prog) => prog,
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: No program set, call prog_set() to load one",
|
|
|
- ))?,
|
|
|
- };
|
|
|
- self.parent.jit = Some(jit::JitMemory::new(prog, &self.parent.helpers, true, true)?);
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously JIT-compiled program, with the given packet data, in a manner very
|
|
|
- /// similar to `execute_program()`.
|
|
|
- ///
|
|
|
- /// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
|
- /// address of the beginning and of the end of the memory area used for packet data from some
|
|
|
- /// metadata buffer, which in the case of this VM is handled internally. The offsets at which
|
|
|
- /// the addresses should be placed should have be set at the creation of the VM.
|
|
|
- ///
|
|
|
- /// # Safety
|
|
|
- ///
|
|
|
- /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
|
|
|
- /// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
|
|
|
- /// very bad (program may segfault). It may be wise to check that the program works with the
|
|
|
- /// interpreter before running the JIT-compiled version of it.
|
|
|
- ///
|
|
|
- /// For this reason the function should be called from within an `unsafe` bloc.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
|
- /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
- /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
|
- /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
|
- /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
|
- /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
|
- ///
|
|
|
- /// # #[cfg(all(not(windows), feature = "std"))]
|
|
|
- /// vm.jit_compile();
|
|
|
- ///
|
|
|
- /// // Provide only a reference to the packet data. We do not manage the metadata buffer.
|
|
|
- /// # #[cfg(all(not(windows), feature = "std"))]
|
|
|
- /// unsafe {
|
|
|
- /// let res = vm.execute_program_jit(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0xdd);
|
|
|
- /// }
|
|
|
- /// ```
|
|
|
- // This struct redefines the `execute_program_jit()` function, in order to pass the offsets
|
|
|
- // associated with the fixed mbuff.
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- pub unsafe fn execute_program_jit(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
|
- // If packet data is empty, do not send the address of an empty slice; send a null pointer
|
|
|
- // as first argument instead, as this is uBPF's behavior (empty packet should not happen
|
|
|
- // in the kernel; anyway the verifier would prevent the use of uninitialized registers).
|
|
|
- // See `mul_loop` test.
|
|
|
- let mem_ptr = match mem.len() {
|
|
|
- 0 => core::ptr::null_mut(),
|
|
|
- _ => mem.as_ptr() as *mut u8,
|
|
|
- };
|
|
|
-
|
|
|
- match &self.parent.jit {
|
|
|
- Some(jit) => Ok(jit.get_prog()(
|
|
|
- self.mbuff.buffer.as_ptr() as *mut u8,
|
|
|
- self.mbuff.buffer.len(),
|
|
|
- mem_ptr,
|
|
|
- mem.len(),
|
|
|
- self.mbuff.data_offset,
|
|
|
- self.mbuff.data_end_offset,
|
|
|
- )),
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: program has not been JIT-compiled",
|
|
|
- )),
|
|
|
- }
|
|
|
- }
|
|
|
-
|
|
|
- /// Compile the loaded program using the Cranelift JIT.
|
|
|
- ///
|
|
|
- /// If using helper functions, be sure to register them into the VM before calling this
|
|
|
- /// function.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
|
- /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
- /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
|
- /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
|
- /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
|
- /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
|
- ///
|
|
|
- /// vm.cranelift_compile();
|
|
|
- /// ```
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- pub fn cranelift_compile(&mut self) -> Result<(), Error> {
|
|
|
- use crate::cranelift::CraneliftCompiler;
|
|
|
-
|
|
|
- let prog = match self.parent.prog {
|
|
|
- Some(prog) => prog,
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: No program set, call prog_set() to load one",
|
|
|
- ))?,
|
|
|
- };
|
|
|
-
|
|
|
- let mut compiler = CraneliftCompiler::new(self.parent.helpers.clone());
|
|
|
- let program = compiler.compile_function(prog)?;
|
|
|
-
|
|
|
- self.parent.cranelift_prog = Some(program);
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously compiled program, with the given packet data and metadata
|
|
|
- /// buffer, in a manner very similar to `execute_program()`.
|
|
|
- ///
|
|
|
- /// If the program is made to be compatible with Linux kernel, it is expected to load the
|
|
|
- /// address of the beginning and of the end of the memory area used for packet data from some
|
|
|
- /// metadata buffer, which in the case of this VM is handled internally. The offsets at which
|
|
|
- /// the addresses should be placed should have be set at the creation of the VM.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
|
|
|
- /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
|
|
|
- /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
|
|
|
- /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
|
|
|
- /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
|
|
|
- /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
|
|
|
- ///
|
|
|
- /// vm.cranelift_compile();
|
|
|
- ///
|
|
|
- /// // Provide only a reference to the packet data. We do not manage the metadata buffer.
|
|
|
- /// let res = vm.execute_program_cranelift(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0xdd);
|
|
|
- /// ```
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- pub fn execute_program_cranelift(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
|
- // If packet data is empty, do not send the address of an empty slice; send a null pointer
|
|
|
- // as first argument instead, as this is uBPF's behavior (empty packet should not happen
|
|
|
- // in the kernel; anyway the verifier would prevent the use of uninitialized registers).
|
|
|
- // See `mul_loop` test.
|
|
|
- let mem_ptr = match mem.len() {
|
|
|
- 0 => core::ptr::null_mut(),
|
|
|
- _ => mem.as_ptr() as *mut u8,
|
|
|
- };
|
|
|
-
|
|
|
- let l = self.mbuff.buffer.len();
|
|
|
- // Can this ever happen? Probably not, should be ensured at mbuff creation.
|
|
|
- if self.mbuff.data_offset + 8 > l || self.mbuff.data_end_offset + 8 > l {
|
|
|
- Err(Error::new(ErrorKind::Other, format!("Error: buffer too small ({:?}), cannot use data_offset {:?} and data_end_offset {:?}",
|
|
|
- l, self.mbuff.data_offset, self.mbuff.data_end_offset)))?;
|
|
|
- }
|
|
|
- LittleEndian::write_u64(
|
|
|
- &mut self.mbuff.buffer[(self.mbuff.data_offset)..],
|
|
|
- mem.as_ptr() as u64,
|
|
|
- );
|
|
|
- LittleEndian::write_u64(
|
|
|
- &mut self.mbuff.buffer[(self.mbuff.data_end_offset)..],
|
|
|
- mem.as_ptr() as u64 + mem.len() as u64,
|
|
|
- );
|
|
|
-
|
|
|
- match &self.parent.cranelift_prog {
|
|
|
- Some(prog) => Ok(prog.execute(
|
|
|
- mem_ptr,
|
|
|
- mem.len(),
|
|
|
- self.mbuff.buffer.as_ptr() as *mut u8,
|
|
|
- self.mbuff.buffer.len(),
|
|
|
- )),
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: program has not been compiled with cranelift",
|
|
|
- )),
|
|
|
- }
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-/// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
|
|
|
-/// directly on the memory area representing packet data.
|
|
|
-///
|
|
|
-/// # Examples
|
|
|
-///
|
|
|
-/// ```
|
|
|
-/// let prog = &[
|
|
|
-/// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
|
-/// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
|
-/// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
|
-/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
-/// ];
|
|
|
-/// let mem = &mut [
|
|
|
-/// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
|
|
|
-/// ];
|
|
|
-///
|
|
|
-/// // Instantiate a VM.
|
|
|
-/// let vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
|
-///
|
|
|
-/// // Provide only a reference to the packet data.
|
|
|
-/// let res = vm.execute_program(mem).unwrap();
|
|
|
-/// assert_eq!(res, 0x22cc);
|
|
|
-/// ```
|
|
|
-pub struct EbpfVmRaw<'a> {
|
|
|
- parent: EbpfVmMbuff<'a>,
|
|
|
-}
|
|
|
-
|
|
|
-impl<'a> EbpfVmRaw<'a> {
|
|
|
- /// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
|
- /// When attempting to load the program, it passes through a simple verifier.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
|
- /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
|
- /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmRaw<'a>, Error> {
|
|
|
- let parent = EbpfVmMbuff::new(prog)?;
|
|
|
- Ok(EbpfVmRaw { parent })
|
|
|
- }
|
|
|
-
|
|
|
- /// Load a new eBPF program into the virtual machine instance.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog1 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let prog2 = &[
|
|
|
- /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
|
- /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
|
- /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27,
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog1)).unwrap();
|
|
|
- /// vm.set_program(prog2);
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0x22cc);
|
|
|
- /// ```
|
|
|
- pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
|
|
|
- self.parent.set_program(prog)?;
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Set a new verifier function. The function should return an `Error` if the program should be
|
|
|
- /// rejected by the virtual machine. If a program has been loaded to the VM already, the
|
|
|
- /// verifier is immediately run.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// use rbpf::{Error, ErrorKind};
|
|
|
- /// use rbpf::ebpf;
|
|
|
- ///
|
|
|
- /// // Define a simple verifier function.
|
|
|
- /// fn verifier(prog: &[u8]) -> Result<(), Error> {
|
|
|
- /// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
|
|
|
- /// if last_insn.opc != ebpf::EXIT {
|
|
|
- /// return Err(Error::new(ErrorKind::Other,
|
|
|
- /// "[Verifier] Error: program does not end with “EXIT” instruction"));
|
|
|
- /// }
|
|
|
- /// Ok(())
|
|
|
- /// }
|
|
|
- ///
|
|
|
- /// let prog1 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
|
- /// // Change the verifier.
|
|
|
- /// vm.set_verifier(verifier).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
|
- self.parent.set_verifier(verifier)
|
|
|
- }
|
|
|
-
|
|
|
- /// Register a built-in or user-defined helper function in order to use it later from within
|
|
|
- /// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
|
|
|
- ///
|
|
|
- /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
|
|
|
- /// program. You should be able to change registered helpers after compiling, but not to add
|
|
|
- /// new ones (i.e. with new keys).
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// #[cfg(feature = "std")] {
|
|
|
- /// use rbpf::helpers;
|
|
|
- ///
|
|
|
- /// let prog = &[
|
|
|
- /// 0x79, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxdw r1, r1[0x00]
|
|
|
- /// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
|
|
|
- /// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
|
|
|
- /// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
|
|
|
- /// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
|
|
|
- /// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// // Register a helper. This helper will store the result of the square root of r1 into r0.
|
|
|
- /// vm.register_helper(1, helpers::sqrti);
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0x10000000);
|
|
|
- /// }
|
|
|
- /// ```
|
|
|
- pub fn register_helper(
|
|
|
- &mut self,
|
|
|
- key: u32,
|
|
|
- function: fn(u64, u64, u64, u64, u64) -> u64,
|
|
|
- ) -> Result<(), Error> {
|
|
|
- self.parent.register_helper(key, function)
|
|
|
- }
|
|
|
-
|
|
|
- /// Register a set of built-in or user-defined helper functions in order to use them later from
|
|
|
- /// within the eBPF program. The helpers are registered into a hashmap, so the `key` can be any
|
|
|
- /// `u32`.
|
|
|
- #[allow(clippy::type_complexity)]
|
|
|
- pub fn register_helper_set(
|
|
|
- &mut self,
|
|
|
- helpers: &HashMap<u32, fn(u64, u64, u64, u64, u64) -> u64>,
|
|
|
- ) -> Result<(), Error> {
|
|
|
- for (key, function) in helpers {
|
|
|
- self.parent.register_helper(*key, *function)?;
|
|
|
- }
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the program loaded, with the given packet data.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
|
- /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
|
- /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0x22cc);
|
|
|
- /// ```
|
|
|
- pub fn execute_program(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
|
- self.parent.execute_program(mem, &[])
|
|
|
- }
|
|
|
-
|
|
|
- /// JIT-compile the loaded program. No argument required for this.
|
|
|
- ///
|
|
|
- /// If using helper functions, be sure to register them into the VM before calling this
|
|
|
- /// function.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
|
- /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
|
- /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// vm.jit_compile();
|
|
|
- /// ```
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- pub fn jit_compile(&mut self) -> Result<(), Error> {
|
|
|
- let prog = match self.parent.prog {
|
|
|
- Some(prog) => prog,
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: No program set, call prog_set() to load one",
|
|
|
- ))?,
|
|
|
- };
|
|
|
- self.parent.jit = Some(jit::JitMemory::new(
|
|
|
- prog,
|
|
|
- &self.parent.helpers,
|
|
|
- false,
|
|
|
- false,
|
|
|
- )?);
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously JIT-compiled program, with the given packet data, in a manner very
|
|
|
- /// similar to `execute_program()`.
|
|
|
- ///
|
|
|
- /// # Safety
|
|
|
- ///
|
|
|
- /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
|
|
|
- /// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
|
|
|
- /// very bad (program may segfault). It may be wise to check that the program works with the
|
|
|
- /// interpreter before running the JIT-compiled version of it.
|
|
|
- ///
|
|
|
- /// For this reason the function should be called from within an `unsafe` bloc.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
|
- /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
|
- /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// # #[cfg(all(not(windows), feature = "std"))]
|
|
|
- /// vm.jit_compile();
|
|
|
- ///
|
|
|
- /// # #[cfg(all(not(windows), feature = "std"))]
|
|
|
- /// unsafe {
|
|
|
- /// let res = vm.execute_program_jit(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0x22cc);
|
|
|
- /// }
|
|
|
- /// ```
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- pub unsafe fn execute_program_jit(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
|
- let mut mbuff = vec![];
|
|
|
- self.parent.execute_program_jit(mem, &mut mbuff)
|
|
|
- }
|
|
|
-
|
|
|
- /// Compile the loaded program using the Cranelift JIT.
|
|
|
- ///
|
|
|
- /// If using helper functions, be sure to register them into the VM before calling this
|
|
|
- /// function.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
|
- /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
|
- /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// vm.cranelift_compile();
|
|
|
- /// ```
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- pub fn cranelift_compile(&mut self) -> Result<(), Error> {
|
|
|
- use crate::cranelift::CraneliftCompiler;
|
|
|
-
|
|
|
- let prog = match self.parent.prog {
|
|
|
- Some(prog) => prog,
|
|
|
- None => Err(Error::new(
|
|
|
- ErrorKind::Other,
|
|
|
- "Error: No program set, call prog_set() to load one",
|
|
|
- ))?,
|
|
|
- };
|
|
|
-
|
|
|
- let mut compiler = CraneliftCompiler::new(self.parent.helpers.clone());
|
|
|
- let program = compiler.compile_function(prog)?;
|
|
|
-
|
|
|
- self.parent.cranelift_prog = Some(program);
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously compiled program, with the given packet data, in a manner very
|
|
|
- /// similar to `execute_program()`.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
|
|
|
- /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
|
|
|
- /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mem = &mut [
|
|
|
- /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// vm.cranelift_compile();
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program_cranelift(mem).unwrap();
|
|
|
- /// assert_eq!(res, 0x22cc);
|
|
|
- /// ```
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- pub fn execute_program_cranelift(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
|
|
|
- let mut mbuff = vec![];
|
|
|
- self.parent.execute_program_cranelift(mem, &mut mbuff)
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-/// A virtual machine to run eBPF program. This kind of VM is used for programs that do not work
|
|
|
-/// with any memory area—no metadata buffer, no packet data either.
|
|
|
-///
|
|
|
-/// # Examples
|
|
|
-///
|
|
|
-/// ```
|
|
|
-/// let prog = &[
|
|
|
-/// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
-/// 0xb7, 0x01, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // mov r1, 1
|
|
|
-/// 0xb7, 0x02, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, // mov r2, 2
|
|
|
-/// 0xb7, 0x03, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // mov r3, 3
|
|
|
-/// 0xb7, 0x04, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, // mov r4, 4
|
|
|
-/// 0xb7, 0x05, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // mov r5, 5
|
|
|
-/// 0xb7, 0x06, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, // mov r6, 6
|
|
|
-/// 0xb7, 0x07, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00, // mov r7, 7
|
|
|
-/// 0xb7, 0x08, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, // mov r8, 8
|
|
|
-/// 0x4f, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // or r0, r5
|
|
|
-/// 0x47, 0x00, 0x00, 0x00, 0xa0, 0x00, 0x00, 0x00, // or r0, 0xa0
|
|
|
-/// 0x57, 0x00, 0x00, 0x00, 0xa3, 0x00, 0x00, 0x00, // and r0, 0xa3
|
|
|
-/// 0xb7, 0x09, 0x00, 0x00, 0x91, 0x00, 0x00, 0x00, // mov r9, 0x91
|
|
|
-/// 0x5f, 0x90, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // and r0, r9
|
|
|
-/// 0x67, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, // lsh r0, 32
|
|
|
-/// 0x67, 0x00, 0x00, 0x00, 0x16, 0x00, 0x00, 0x00, // lsh r0, 22
|
|
|
-/// 0x6f, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // lsh r0, r8
|
|
|
-/// 0x77, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, // rsh r0, 32
|
|
|
-/// 0x77, 0x00, 0x00, 0x00, 0x13, 0x00, 0x00, 0x00, // rsh r0, 19
|
|
|
-/// 0x7f, 0x70, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // rsh r0, r7
|
|
|
-/// 0xa7, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // xor r0, 0x03
|
|
|
-/// 0xaf, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // xor r0, r2
|
|
|
-/// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
-/// ];
|
|
|
-///
|
|
|
-/// // Instantiate a VM.
|
|
|
-/// let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
|
-///
|
|
|
-/// // Provide only a reference to the packet data.
|
|
|
-/// let res = vm.execute_program().unwrap();
|
|
|
-/// assert_eq!(res, 0x11);
|
|
|
-/// ```
|
|
|
-pub struct EbpfVmNoData<'a> {
|
|
|
- parent: EbpfVmRaw<'a>,
|
|
|
-}
|
|
|
-
|
|
|
-impl<'a> EbpfVmNoData<'a> {
|
|
|
- /// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
|
- /// When attempting to load the program, it passes through a simple verifier.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
|
- /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let vm = rbpf::EbpfVmNoData::new(Some(prog));
|
|
|
- /// ```
|
|
|
- pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmNoData<'a>, Error> {
|
|
|
- let parent = EbpfVmRaw::new(prog)?;
|
|
|
- Ok(EbpfVmNoData { parent })
|
|
|
- }
|
|
|
-
|
|
|
- /// Load a new eBPF program into the virtual machine instance.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog1 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- /// let prog2 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
|
- /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog1)).unwrap();
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program().unwrap();
|
|
|
- /// assert_eq!(res, 0x2211);
|
|
|
- ///
|
|
|
- /// vm.set_program(prog2);
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program().unwrap();
|
|
|
- /// assert_eq!(res, 0x1122);
|
|
|
- /// ```
|
|
|
- pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
|
|
|
- self.parent.set_program(prog)?;
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Set a new verifier function. The function should return an `Error` if the program should be
|
|
|
- /// rejected by the virtual machine. If a program has been loaded to the VM already, the
|
|
|
- /// verifier is immediately run.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// use rbpf::{Error, ErrorKind};
|
|
|
- /// use rbpf::ebpf;
|
|
|
- ///
|
|
|
- /// // Define a simple verifier function.
|
|
|
- /// fn verifier(prog: &[u8]) -> Result<(), Error> {
|
|
|
- /// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
|
|
|
- /// if last_insn.opc != ebpf::EXIT {
|
|
|
- /// return Err(Error::new(ErrorKind::Other,
|
|
|
- /// "[Verifier] Error: program does not end with “EXIT” instruction"));
|
|
|
- /// }
|
|
|
- /// Ok(())
|
|
|
- /// }
|
|
|
- ///
|
|
|
- /// let prog1 = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// // Instantiate a VM.
|
|
|
- /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
|
|
|
- /// // Change the verifier.
|
|
|
- /// vm.set_verifier(verifier).unwrap();
|
|
|
- /// ```
|
|
|
- pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
|
- self.parent.set_verifier(verifier)
|
|
|
- }
|
|
|
-
|
|
|
- /// Register a built-in or user-defined helper function in order to use it later from within
|
|
|
- /// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
|
|
|
- ///
|
|
|
- /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
|
|
|
- /// program. You should be able to change registered helpers after compiling, but not to add
|
|
|
- /// new ones (i.e. with new keys).
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// #[cfg(feature = "std")] {
|
|
|
- /// use rbpf::helpers;
|
|
|
- ///
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, // mov r1, 0x010000000
|
|
|
- /// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
|
|
|
- /// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
|
|
|
- /// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
|
|
|
- /// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
|
|
|
- /// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// // Register a helper. This helper will store the result of the square root of r1 into r0.
|
|
|
- /// vm.register_helper(1, helpers::sqrti).unwrap();
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program().unwrap();
|
|
|
- /// assert_eq!(res, 0x1000);
|
|
|
- /// }
|
|
|
- /// ```
|
|
|
- pub fn register_helper(
|
|
|
- &mut self,
|
|
|
- key: u32,
|
|
|
- function: fn(u64, u64, u64, u64, u64) -> u64,
|
|
|
- ) -> Result<(), Error> {
|
|
|
- self.parent.register_helper(key, function)
|
|
|
- }
|
|
|
-
|
|
|
- /// JIT-compile the loaded program. No argument required for this.
|
|
|
- ///
|
|
|
- /// If using helper functions, be sure to register them into the VM before calling this
|
|
|
- /// function.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
|
- /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- ///
|
|
|
- /// vm.jit_compile();
|
|
|
- /// ```
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- pub fn jit_compile(&mut self) -> Result<(), Error> {
|
|
|
- self.parent.jit_compile()
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the program loaded, without providing pointers to any memory area whatsoever.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
|
- /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// // For this kind of VM, the `execute_program()` function needs no argument.
|
|
|
- /// let res = vm.execute_program().unwrap();
|
|
|
- /// assert_eq!(res, 0x1122);
|
|
|
- /// ```
|
|
|
- pub fn execute_program(&self) -> Result<u64, Error> {
|
|
|
- self.parent.execute_program(&mut [])
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously JIT-compiled program, without providing pointers to any memory area
|
|
|
- /// whatsoever, in a manner very similar to `execute_program()`.
|
|
|
- ///
|
|
|
- /// # Safety
|
|
|
- ///
|
|
|
- /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
|
|
|
- /// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
|
|
|
- /// very bad (program may segfault). It may be wise to check that the program works with the
|
|
|
- /// interpreter before running the JIT-compiled version of it.
|
|
|
- ///
|
|
|
- /// For this reason the function should be called from within an `unsafe` bloc.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
|
- /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// # #[cfg(all(not(windows), feature = "std"))]
|
|
|
- /// vm.jit_compile();
|
|
|
- ///
|
|
|
- /// # #[cfg(all(not(windows), feature = "std"))]
|
|
|
- /// unsafe {
|
|
|
- /// let res = vm.execute_program_jit().unwrap();
|
|
|
- /// assert_eq!(res, 0x1122);
|
|
|
- /// }
|
|
|
- /// ```
|
|
|
- #[cfg(all(not(windows), feature = "std"))]
|
|
|
- pub unsafe fn execute_program_jit(&self) -> Result<u64, Error> {
|
|
|
- self.parent.execute_program_jit(&mut [])
|
|
|
- }
|
|
|
-
|
|
|
- /// Compile the loaded program using the Cranelift JIT.
|
|
|
- ///
|
|
|
- /// If using helper functions, be sure to register them into the VM before calling this
|
|
|
- /// function.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
|
- /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- ///
|
|
|
- /// vm.cranelift_compile();
|
|
|
- /// ```
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- pub fn cranelift_compile(&mut self) -> Result<(), Error> {
|
|
|
- self.parent.cranelift_compile()
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously JIT-compiled program, without providing pointers to any memory area
|
|
|
- /// whatsoever, in a manner very similar to `execute_program()`.
|
|
|
- ///
|
|
|
- /// # Examples
|
|
|
- ///
|
|
|
- /// ```
|
|
|
- /// let prog = &[
|
|
|
- /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
|
|
|
- /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
|
|
|
- /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
|
|
|
- /// ];
|
|
|
- ///
|
|
|
- /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
|
|
|
- ///
|
|
|
- /// vm.cranelift_compile();
|
|
|
- ///
|
|
|
- /// let res = vm.execute_program_cranelift().unwrap();
|
|
|
- /// assert_eq!(res, 0x1122);
|
|
|
- /// ```
|
|
|
- #[cfg(feature = "cranelift")]
|
|
|
- pub fn execute_program_cranelift(&self) -> Result<u64, Error> {
|
|
|
- self.parent.execute_program_cranelift(&mut [])
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-/// EbpfVm with Owned data
|
|
|
-pub struct EbpfVmRawOwned {
|
|
|
- parent: EbpfVmRaw<'static>,
|
|
|
- data_len: usize,
|
|
|
- data_cap: usize,
|
|
|
-}
|
|
|
-
|
|
|
-impl EbpfVmRawOwned {
|
|
|
- /// Create a new virtual machine instance, and load an eBPF program into that instance.
|
|
|
- /// When attempting to load the program, it passes through a simple verifier.
|
|
|
- pub fn new(prog: Option<Vec<u8>>) -> Result<EbpfVmRawOwned, Error> {
|
|
|
- let (prog, data_len, data_cap) = match prog {
|
|
|
- Some(prog) => {
|
|
|
- let data_len = prog.len();
|
|
|
- let data_cap = prog.capacity();
|
|
|
- let slice = prog.leak();
|
|
|
- let slice = unsafe { core::slice::from_raw_parts(slice.as_ptr(), data_len) };
|
|
|
- (Some(slice), data_len, data_cap)
|
|
|
- }
|
|
|
- None => (None, 0, 0),
|
|
|
- };
|
|
|
- let parent = EbpfVmRaw::new(prog)?;
|
|
|
- Ok(Self {
|
|
|
- parent,
|
|
|
- data_len,
|
|
|
- data_cap,
|
|
|
- })
|
|
|
- }
|
|
|
- /// Load a new eBPF program into the virtual machine instance
|
|
|
- pub fn set_program(&mut self, prog: Vec<u8>) -> Result<(), Error> {
|
|
|
- self.data_len = prog.len();
|
|
|
- self.data_cap = prog.capacity();
|
|
|
- let slice = prog.leak();
|
|
|
- self.parent.set_program(slice)?;
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Set a new verifier function. The function should return an Error if the program should be rejected by the virtual machine.
|
|
|
- /// If a program has been loaded to the VM already, the verifier is immediately run.
|
|
|
- pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
|
|
|
- self.parent.set_verifier(verifier)
|
|
|
- }
|
|
|
-
|
|
|
- /// Register a built-in or user-defined helper function in order to use it later from within the eBPF program.
|
|
|
- /// The helper is registered into a hashmap, so the key can be any u32.
|
|
|
- /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the program.
|
|
|
- /// You should be able to change registered helpers after compiling, but not to add new ones (i. e. with new keys).
|
|
|
- pub fn register_helper(
|
|
|
- &mut self,
|
|
|
- key: u32,
|
|
|
- function: fn(u64, u64, u64, u64, u64) -> u64,
|
|
|
- ) -> Result<(), Error> {
|
|
|
- self.parent.register_helper(key, function)
|
|
|
- }
|
|
|
-
|
|
|
- /// Register a set of built-in or user-defined helper functions in order to use them later from
|
|
|
- /// within the eBPF program. The helpers are registered into a hashmap, so the `key` can be any
|
|
|
- /// `u32`.
|
|
|
- #[allow(clippy::type_complexity)]
|
|
|
- pub fn register_helper_set(
|
|
|
- &mut self,
|
|
|
- helpers: &HashMap<u32, fn(u64, u64, u64, u64, u64) -> u64>,
|
|
|
- ) -> Result<(), Error> {
|
|
|
- for (key, function) in helpers {
|
|
|
- self.parent.register_helper(*key, *function)?;
|
|
|
- }
|
|
|
- Ok(())
|
|
|
- }
|
|
|
-
|
|
|
- /// Execute the previously JIT-compiled program, with the given packet data, in a manner very similar to execute_program().
|
|
|
- ///
|
|
|
- /// Safety
|
|
|
- ///
|
|
|
- /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime check for memory access;
|
|
|
- /// so if the eBPF program attempts erroneous accesses, this may end very bad (program may segfault).
|
|
|
- /// It may be wise to check that the program works with the interpreter before running the JIT-compiled version of it.
|
|
|
- ///
|
|
|
- /// For this reason the function should be called from within an unsafe bloc.
|
|
|
- pub fn execute_program(&self, mem: &mut [u8]) -> Result<u64, Error> {
|
|
|
- self.parent.execute_program(mem)
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-impl Drop for EbpfVmRawOwned {
|
|
|
- fn drop(&mut self) {
|
|
|
- match self.parent.parent.prog {
|
|
|
- Some(prog) => unsafe {
|
|
|
- let ptr = prog.as_ptr();
|
|
|
- let _prog = Vec::from_raw_parts(ptr as *mut u8, self.data_len, self.data_cap);
|
|
|
- },
|
|
|
- None => {}
|
|
|
- };
|
|
|
- }
|
|
|
-}
|