lib.rs 70 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782
  1. // SPDX-License-Identifier: (Apache-2.0 OR MIT)
  2. // Derived from uBPF <https://github.com/iovisor/ubpf>
  3. // Copyright 2016 6WIND S.A. <quentin.monnet@6wind.com>
  4. // Copyright 2023 Isovalent, Inc. <quentin@isovalent.com>
  5. //! Virtual machine and JIT compiler for eBPF programs.
  6. #![doc(
  7. html_logo_url = "https://raw.githubusercontent.com/qmonnet/rbpf/main/misc/rbpf.png",
  8. html_favicon_url = "https://raw.githubusercontent.com/qmonnet/rbpf/main/misc/rbpf.ico"
  9. )]
  10. #![warn(missing_docs)]
  11. // There are unused mut warnings due to unsafe code.
  12. #![allow(unused_mut)]
  13. // Allows old-style clippy
  14. #![allow(renamed_and_removed_lints)]
  15. #![cfg_attr(
  16. clippy,
  17. allow(
  18. redundant_field_names,
  19. single_match,
  20. cast_lossless,
  21. doc_markdown,
  22. match_same_arms,
  23. unreadable_literal
  24. )
  25. )]
  26. // Configures the crate to be `no_std` when `std` feature is disabled.
  27. #![cfg_attr(not(feature = "std"), no_std)]
  28. extern crate alloc;
  29. use alloc::{collections::BTreeMap, format, vec, vec::Vec};
  30. use byteorder::{ByteOrder, LittleEndian};
  31. type HashMap<K, V> = BTreeMap<K, V>;
  32. #[cfg(feature = "cranelift")]
  33. type HashSet<T> = alloc::collections::BTreeSet<T>;
  34. mod asm_parser;
  35. pub mod assembler;
  36. #[cfg(feature = "cranelift")]
  37. mod cranelift;
  38. pub mod disassembler;
  39. pub mod ebpf;
  40. pub mod helpers;
  41. pub mod insn_builder;
  42. mod interpreter;
  43. #[cfg(all(not(windows), feature = "std"))]
  44. mod jit;
  45. #[cfg(not(feature = "std"))]
  46. mod no_std_error;
  47. mod stack;
  48. mod verifier;
  49. #[cfg(feature = "std")]
  50. pub use std::io::{Error, ErrorKind};
  51. /// In no_std we use a custom implementation of the error which acts as a
  52. /// replacement for the io Error.
  53. #[cfg(not(feature = "std"))]
  54. pub use crate::no_std_error::{Error, ErrorKind};
  55. /// eBPF verification function that returns an error if the program does not meet its requirements.
  56. ///
  57. /// Some examples of things the verifier may reject the program for:
  58. ///
  59. /// - Program does not terminate.
  60. /// - Unknown instructions.
  61. /// - Bad formed instruction.
  62. /// - Unknown eBPF helper index.
  63. pub type Verifier = fn(prog: &[u8]) -> Result<(), Error>;
  64. /// eBPF helper function.
  65. pub type Helper = fn(u64, u64, u64, u64, u64) -> u64;
  66. // A metadata buffer with two offset indications. It can be used in one kind of eBPF VM to simulate
  67. // the use of a metadata buffer each time the program is executed, without the user having to
  68. // actually handle it. The offsets are used to tell the VM where in the buffer the pointers to
  69. // packet data start and end should be stored each time the program is run on a new packet.
  70. struct MetaBuff {
  71. data_offset: usize,
  72. data_end_offset: usize,
  73. buffer: Vec<u8>,
  74. }
  75. /// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
  76. /// on a metadata buffer containing pointers to packet data.
  77. ///
  78. /// # Examples
  79. ///
  80. /// ```
  81. /// let prog = &[
  82. /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff at offset 8 into R1.
  83. /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
  84. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  85. /// ];
  86. /// let mem = &mut [
  87. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  88. /// ];
  89. ///
  90. /// // Just for the example we create our metadata buffer from scratch, and we store the pointers
  91. /// // to packet data start and end in it.
  92. /// let mut mbuff = [0u8; 32];
  93. /// unsafe {
  94. /// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
  95. /// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
  96. /// *data = mem.as_ptr() as u64;
  97. /// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
  98. /// }
  99. ///
  100. /// // Instantiate a VM.
  101. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
  102. ///
  103. /// // Provide both a reference to the packet data, and to the metadata buffer.
  104. /// let res = vm.execute_program(mem, &mut mbuff).unwrap();
  105. /// assert_eq!(res, 0x2211);
  106. /// ```
  107. pub struct EbpfVmMbuff<'a> {
  108. prog: Option<&'a [u8]>,
  109. verifier: Verifier,
  110. #[cfg(all(not(windows), feature = "std"))]
  111. jit: Option<jit::JitMemory<'a>>,
  112. #[cfg(feature = "cranelift")]
  113. cranelift_prog: Option<cranelift::CraneliftProgram>,
  114. helpers: HashMap<u32, ebpf::Helper>,
  115. }
  116. impl<'a> EbpfVmMbuff<'a> {
  117. /// Create a new virtual machine instance, and load an eBPF program into that instance.
  118. /// When attempting to load the program, it passes through a simple verifier.
  119. ///
  120. /// # Examples
  121. ///
  122. /// ```
  123. /// let prog = &[
  124. /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
  125. /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
  126. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  127. /// ];
  128. ///
  129. /// // Instantiate a VM.
  130. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
  131. /// ```
  132. pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmMbuff<'a>, Error> {
  133. if let Some(prog) = prog {
  134. verifier::check(prog)?;
  135. }
  136. Ok(EbpfVmMbuff {
  137. prog,
  138. verifier: verifier::check,
  139. #[cfg(all(not(windows), feature = "std"))]
  140. jit: None,
  141. #[cfg(feature = "cranelift")]
  142. cranelift_prog: None,
  143. helpers: HashMap::new(),
  144. })
  145. }
  146. /// Load a new eBPF program into the virtual machine instance.
  147. ///
  148. /// # Examples
  149. ///
  150. /// ```
  151. /// let prog1 = &[
  152. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  153. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  154. /// ];
  155. /// let prog2 = &[
  156. /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
  157. /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
  158. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  159. /// ];
  160. ///
  161. /// // Instantiate a VM.
  162. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
  163. /// vm.set_program(prog2).unwrap();
  164. /// ```
  165. pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
  166. (self.verifier)(prog)?;
  167. self.prog = Some(prog);
  168. Ok(())
  169. }
  170. /// Set a new verifier function. The function should return an `Error` if the program should be
  171. /// rejected by the virtual machine. If a program has been loaded to the VM already, the
  172. /// verifier is immediately run.
  173. ///
  174. /// # Examples
  175. ///
  176. /// ```
  177. /// use rbpf::{Error, ErrorKind};
  178. /// use rbpf::ebpf;
  179. ///
  180. /// // Define a simple verifier function.
  181. /// fn verifier(prog: &[u8]) -> Result<(), Error> {
  182. /// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
  183. /// if last_insn.opc != ebpf::EXIT {
  184. /// return Err(Error::new(ErrorKind::Other,
  185. /// "[Verifier] Error: program does not end with “EXIT” instruction"));
  186. /// }
  187. /// Ok(())
  188. /// }
  189. ///
  190. /// let prog1 = &[
  191. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  192. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  193. /// ];
  194. ///
  195. /// // Instantiate a VM.
  196. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
  197. /// // Change the verifier.
  198. /// vm.set_verifier(verifier).unwrap();
  199. /// ```
  200. pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
  201. if let Some(prog) = self.prog {
  202. verifier(prog)?;
  203. }
  204. self.verifier = verifier;
  205. Ok(())
  206. }
  207. /// Register a built-in or user-defined helper function in order to use it later from within
  208. /// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
  209. ///
  210. /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
  211. /// program. You should be able to change registered helpers after compiling, but not to add
  212. /// new ones (i.e. with new keys).
  213. ///
  214. /// # Examples
  215. ///
  216. /// ```
  217. /// use rbpf::helpers;
  218. ///
  219. /// // This program was compiled with clang, from a C program containing the following single
  220. /// // instruction: `return bpf_trace_printk("foo %c %c %c\n", 10, 1, 2, 3);`
  221. /// let prog = &[
  222. /// 0x18, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load 0 as u64 into r1 (That would be
  223. /// 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // replaced by tc by the address of
  224. /// // the format string, in the .map
  225. /// // section of the ELF file).
  226. /// 0xb7, 0x02, 0x00, 0x00, 0x0a, 0x00, 0x00, 0x00, // mov r2, 10
  227. /// 0xb7, 0x03, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // mov r3, 1
  228. /// 0xb7, 0x04, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, // mov r4, 2
  229. /// 0xb7, 0x05, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // mov r5, 3
  230. /// 0x85, 0x00, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, // call helper with key 6
  231. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  232. /// ];
  233. ///
  234. /// // Instantiate a VM.
  235. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
  236. ///
  237. /// // Register a helper.
  238. /// // On running the program this helper will print the content of registers r3, r4 and r5 to
  239. /// // standard output.
  240. /// # #[cfg(feature = "std")]
  241. /// vm.register_helper(6, helpers::bpf_trace_printf).unwrap();
  242. /// ```
  243. pub fn register_helper(&mut self, key: u32, function: Helper) -> Result<(), Error> {
  244. self.helpers.insert(key, function);
  245. Ok(())
  246. }
  247. /// Execute the program loaded, with the given packet data and metadata buffer.
  248. ///
  249. /// If the program is made to be compatible with Linux kernel, it is expected to load the
  250. /// address of the beginning and of the end of the memory area used for packet data from the
  251. /// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
  252. /// pointers are correctly stored in the buffer.
  253. ///
  254. /// # Examples
  255. ///
  256. /// ```
  257. /// let prog = &[
  258. /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
  259. /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
  260. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  261. /// ];
  262. /// let mem = &mut [
  263. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  264. /// ];
  265. ///
  266. /// // Just for the example we create our metadata buffer from scratch, and we store the
  267. /// // pointers to packet data start and end in it.
  268. /// let mut mbuff = [0u8; 32];
  269. /// unsafe {
  270. /// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
  271. /// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
  272. /// *data = mem.as_ptr() as u64;
  273. /// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
  274. /// }
  275. ///
  276. /// // Instantiate a VM.
  277. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
  278. ///
  279. /// // Provide both a reference to the packet data, and to the metadata buffer.
  280. /// let res = vm.execute_program(mem, &mut mbuff).unwrap();
  281. /// assert_eq!(res, 0x2211);
  282. /// ```
  283. pub fn execute_program(&self, mem: &[u8], mbuff: &[u8]) -> Result<u64, Error> {
  284. interpreter::execute_program(self.prog, mem, mbuff, &self.helpers)
  285. }
  286. /// JIT-compile the loaded program. No argument required for this.
  287. ///
  288. /// If using helper functions, be sure to register them into the VM before calling this
  289. /// function.
  290. ///
  291. /// # Examples
  292. ///
  293. /// ```
  294. /// let prog = &[
  295. /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
  296. /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
  297. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  298. /// ];
  299. ///
  300. /// // Instantiate a VM.
  301. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
  302. ///
  303. /// vm.jit_compile();
  304. /// ```
  305. #[cfg(all(not(windows), feature = "std"))]
  306. pub fn jit_compile(&mut self) -> Result<(), Error> {
  307. let prog = match self.prog {
  308. Some(prog) => prog,
  309. None => Err(Error::new(
  310. ErrorKind::Other,
  311. "Error: No program set, call prog_set() to load one",
  312. ))?,
  313. };
  314. self.jit = Some(jit::JitMemory::new(prog, &self.helpers, true, false)?);
  315. Ok(())
  316. }
  317. /// Execute the previously JIT-compiled program, with the given packet data and metadata
  318. /// buffer, in a manner very similar to `execute_program()`.
  319. ///
  320. /// If the program is made to be compatible with Linux kernel, it is expected to load the
  321. /// address of the beginning and of the end of the memory area used for packet data from the
  322. /// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
  323. /// pointers are correctly stored in the buffer.
  324. ///
  325. /// # Safety
  326. ///
  327. /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
  328. /// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
  329. /// very bad (program may segfault). It may be wise to check that the program works with the
  330. /// interpreter before running the JIT-compiled version of it.
  331. ///
  332. /// For this reason the function should be called from within an `unsafe` bloc.
  333. ///
  334. /// # Examples
  335. ///
  336. /// ```
  337. /// let prog = &[
  338. /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into r1.
  339. /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
  340. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  341. /// ];
  342. /// let mem = &mut [
  343. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  344. /// ];
  345. ///
  346. /// // Just for the example we create our metadata buffer from scratch, and we store the
  347. /// // pointers to packet data start and end in it.
  348. /// let mut mbuff = [0u8; 32];
  349. /// unsafe {
  350. /// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
  351. /// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
  352. /// *data = mem.as_ptr() as u64;
  353. /// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
  354. /// }
  355. ///
  356. /// // Instantiate a VM.
  357. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
  358. ///
  359. /// # #[cfg(all(not(windows), feature = "std"))]
  360. /// vm.jit_compile();
  361. ///
  362. /// // Provide both a reference to the packet data, and to the metadata buffer.
  363. /// # #[cfg(all(not(windows), feature = "std"))]
  364. /// unsafe {
  365. /// let res = vm.execute_program_jit(mem, &mut mbuff).unwrap();
  366. /// assert_eq!(res, 0x2211);
  367. /// }
  368. /// ```
  369. #[cfg(all(not(windows), feature = "std"))]
  370. pub unsafe fn execute_program_jit(
  371. &self,
  372. mem: &mut [u8],
  373. mbuff: &'a mut [u8],
  374. ) -> Result<u64, Error> {
  375. // If packet data is empty, do not send the address of an empty slice; send a null pointer
  376. // as first argument instead, as this is uBPF's behavior (empty packet should not happen
  377. // in the kernel; anyway the verifier would prevent the use of uninitialized registers).
  378. // See `mul_loop` test.
  379. let mem_ptr = match mem.len() {
  380. 0 => std::ptr::null_mut(),
  381. _ => mem.as_ptr() as *mut u8,
  382. };
  383. // The last two arguments are not used in this function. They would be used if there was a
  384. // need to indicate to the JIT at which offset in the mbuff mem_ptr and mem_ptr + mem.len()
  385. // should be stored; this is what happens with struct EbpfVmFixedMbuff.
  386. match &self.jit {
  387. Some(jit) => Ok(jit.get_prog()(
  388. mbuff.as_ptr() as *mut u8,
  389. mbuff.len(),
  390. mem_ptr,
  391. mem.len(),
  392. 0,
  393. 0,
  394. )),
  395. None => Err(Error::new(
  396. ErrorKind::Other,
  397. "Error: program has not been JIT-compiled",
  398. )),
  399. }
  400. }
  401. /// Compile the loaded program using the Cranelift JIT.
  402. ///
  403. /// If using helper functions, be sure to register them into the VM before calling this
  404. /// function.
  405. ///
  406. /// # Examples
  407. ///
  408. /// ```
  409. /// let prog = &[
  410. /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into R1.
  411. /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
  412. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  413. /// ];
  414. ///
  415. /// // Instantiate a VM.
  416. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
  417. ///
  418. /// vm.cranelift_compile();
  419. /// ```
  420. #[cfg(feature = "cranelift")]
  421. pub fn cranelift_compile(&mut self) -> Result<(), Error> {
  422. use crate::cranelift::CraneliftCompiler;
  423. let prog = match self.prog {
  424. Some(prog) => prog,
  425. None => Err(Error::new(
  426. ErrorKind::Other,
  427. "Error: No program set, call prog_set() to load one",
  428. ))?,
  429. };
  430. let mut compiler = CraneliftCompiler::new(self.helpers.clone());
  431. let program = compiler.compile_function(prog)?;
  432. self.cranelift_prog = Some(program);
  433. Ok(())
  434. }
  435. /// Execute the previously compiled program, with the given packet data and metadata
  436. /// buffer, in a manner very similar to `execute_program()`.
  437. ///
  438. /// If the program is made to be compatible with Linux kernel, it is expected to load the
  439. /// address of the beginning and of the end of the memory area used for packet data from the
  440. /// metadata buffer, at some appointed offsets. It is up to the user to ensure that these
  441. /// pointers are correctly stored in the buffer.
  442. ///
  443. ///
  444. /// # Examples
  445. ///
  446. /// ```
  447. /// let prog = &[
  448. /// 0x79, 0x11, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, // Load mem from mbuff into r1.
  449. /// 0x69, 0x10, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, // ldhx r1[2], r0
  450. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  451. /// ];
  452. /// let mem = &mut [
  453. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  454. /// ];
  455. ///
  456. /// // Just for the example we create our metadata buffer from scratch, and we store the
  457. /// // pointers to packet data start and end in it.
  458. /// let mut mbuff = [0u8; 32];
  459. /// unsafe {
  460. /// let mut data = mbuff.as_ptr().offset(8) as *mut u64;
  461. /// let mut data_end = mbuff.as_ptr().offset(24) as *mut u64;
  462. /// *data = mem.as_ptr() as u64;
  463. /// *data_end = mem.as_ptr() as u64 + mem.len() as u64;
  464. /// }
  465. ///
  466. /// // Instantiate a VM.
  467. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog)).unwrap();
  468. ///
  469. /// vm.cranelift_compile();
  470. ///
  471. /// // Provide both a reference to the packet data, and to the metadata buffer.
  472. /// let res = vm.execute_program_cranelift(mem, &mut mbuff).unwrap();
  473. /// assert_eq!(res, 0x2211);
  474. /// ```
  475. #[cfg(feature = "cranelift")]
  476. pub fn execute_program_cranelift(
  477. &self,
  478. mem: &mut [u8],
  479. mbuff: &'a mut [u8],
  480. ) -> Result<u64, Error> {
  481. // If packet data is empty, do not send the address of an empty slice; send a null pointer
  482. // as first argument instead, as this is uBPF's behavior (empty packet should not happen
  483. // in the kernel; anyway the verifier would prevent the use of uninitialized registers).
  484. // See `mul_loop` test.
  485. let mem_ptr = match mem.len() {
  486. 0 => core::ptr::null_mut(),
  487. _ => mem.as_ptr() as *mut u8,
  488. };
  489. // The last two arguments are not used in this function. They would be used if there was a
  490. // need to indicate to the JIT at which offset in the mbuff mem_ptr and mem_ptr + mem.len()
  491. // should be stored; this is what happens with struct EbpfVmFixedMbuff.
  492. match &self.cranelift_prog {
  493. Some(prog) => {
  494. Ok(prog.execute(mem_ptr, mem.len(), mbuff.as_ptr() as *mut u8, mbuff.len()))
  495. }
  496. None => Err(Error::new(
  497. ErrorKind::Other,
  498. "Error: program has not been compiled with cranelift",
  499. )),
  500. }
  501. }
  502. }
  503. /// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
  504. /// on a metadata buffer containing pointers to packet data, but it internally handles the buffer
  505. /// so as to save the effort to manually handle the metadata buffer for the user.
  506. ///
  507. /// This struct implements a static internal buffer that is passed to the program. The user has to
  508. /// indicate the offset values at which the eBPF program expects to find the start and the end of
  509. /// packet data in the buffer. On calling the `execute_program()` or `execute_program_jit()` functions, the
  510. /// struct automatically updates the addresses in this static buffer, at the appointed offsets, for
  511. /// the start and the end of the packet data the program is called upon.
  512. ///
  513. /// # Examples
  514. ///
  515. /// This was compiled with clang from the following program, in C:
  516. ///
  517. /// ```c
  518. /// #include <linux/bpf.h>
  519. /// #include "path/to/linux/samples/bpf/bpf_helpers.h"
  520. ///
  521. /// SEC(".classifier")
  522. /// int classifier(struct __sk_buff *skb)
  523. /// {
  524. /// void *data = (void *)(long)skb->data;
  525. /// void *data_end = (void *)(long)skb->data_end;
  526. ///
  527. /// // Check program is long enough.
  528. /// if (data + 5 > data_end)
  529. /// return 0;
  530. ///
  531. /// return *((char *)data + 5);
  532. /// }
  533. /// ```
  534. ///
  535. /// Some small modifications have been brought to have it work, see comments.
  536. ///
  537. /// ```
  538. /// let prog = &[
  539. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  540. /// // Here opcode 0x61 had to be replace by 0x79 so as to load a 8-bytes long address.
  541. /// // Also, offset 0x4c had to be replace with e.g. 0x40 so as to prevent the two pointers
  542. /// // from overlapping in the buffer.
  543. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load pointer to mem from r1[0x40] to r2
  544. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  545. /// // Here opcode 0x61 had to be replace by 0x79 so as to load a 8-bytes long address.
  546. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load ptr to mem_end from r1[0x50] to r1
  547. /// 0x2d, 0x12, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
  548. /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
  549. /// 0x67, 0x00, 0x00, 0x00, 0x38, 0x00, 0x00, 0x00, // r0 >>= 56
  550. /// 0xc7, 0x00, 0x00, 0x00, 0x38, 0x00, 0x00, 0x00, // r0 <<= 56 (arsh) extend byte sign to u64
  551. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  552. /// ];
  553. /// let mem1 = &mut [
  554. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  555. /// ];
  556. /// let mem2 = &mut [
  557. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
  558. /// ];
  559. ///
  560. /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
  561. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
  562. ///
  563. /// // Provide only a reference to the packet data. We do not manage the metadata buffer.
  564. /// let res = vm.execute_program(mem1).unwrap();
  565. /// assert_eq!(res, 0xffffffffffffffdd);
  566. ///
  567. /// let res = vm.execute_program(mem2).unwrap();
  568. /// assert_eq!(res, 0x27);
  569. /// ```
  570. pub struct EbpfVmFixedMbuff<'a> {
  571. parent: EbpfVmMbuff<'a>,
  572. mbuff: MetaBuff,
  573. }
  574. impl<'a> EbpfVmFixedMbuff<'a> {
  575. /// Create a new virtual machine instance, and load an eBPF program into that instance.
  576. /// When attempting to load the program, it passes through a simple verifier.
  577. ///
  578. /// # Examples
  579. ///
  580. /// ```
  581. /// let prog = &[
  582. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  583. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
  584. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  585. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
  586. /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
  587. /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
  588. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  589. /// ];
  590. ///
  591. /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
  592. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
  593. /// ```
  594. pub fn new(
  595. prog: Option<&'a [u8]>,
  596. data_offset: usize,
  597. data_end_offset: usize,
  598. ) -> Result<EbpfVmFixedMbuff<'a>, Error> {
  599. let parent = EbpfVmMbuff::new(prog)?;
  600. let get_buff_len = |x: usize, y: usize| if x >= y { x + 8 } else { y + 8 };
  601. let buffer = vec![0u8; get_buff_len(data_offset, data_end_offset)];
  602. let mbuff = MetaBuff {
  603. data_offset,
  604. data_end_offset,
  605. buffer,
  606. };
  607. Ok(EbpfVmFixedMbuff { parent, mbuff })
  608. }
  609. /// Load a new eBPF program into the virtual machine instance.
  610. ///
  611. /// At the same time, load new offsets for storing pointers to start and end of packet data in
  612. /// the internal metadata buffer.
  613. ///
  614. /// # Examples
  615. ///
  616. /// ```
  617. /// let prog1 = &[
  618. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  619. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  620. /// ];
  621. /// let prog2 = &[
  622. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  623. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
  624. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  625. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
  626. /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
  627. /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
  628. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  629. /// ];
  630. ///
  631. /// let mem = &mut [
  632. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27,
  633. /// ];
  634. ///
  635. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog1), 0, 0).unwrap();
  636. /// vm.set_program(prog2, 0x40, 0x50);
  637. ///
  638. /// let res = vm.execute_program(mem).unwrap();
  639. /// assert_eq!(res, 0x27);
  640. /// ```
  641. pub fn set_program(
  642. &mut self,
  643. prog: &'a [u8],
  644. data_offset: usize,
  645. data_end_offset: usize,
  646. ) -> Result<(), Error> {
  647. let get_buff_len = |x: usize, y: usize| if x >= y { x + 8 } else { y + 8 };
  648. let buffer = vec![0u8; get_buff_len(data_offset, data_end_offset)];
  649. self.mbuff.buffer = buffer;
  650. self.mbuff.data_offset = data_offset;
  651. self.mbuff.data_end_offset = data_end_offset;
  652. self.parent.set_program(prog)?;
  653. Ok(())
  654. }
  655. /// Set a new verifier function. The function should return an `Error` if the program should be
  656. /// rejected by the virtual machine. If a program has been loaded to the VM already, the
  657. /// verifier is immediately run.
  658. ///
  659. /// # Examples
  660. ///
  661. /// ```
  662. /// use rbpf::{Error, ErrorKind};
  663. /// use rbpf::ebpf;
  664. ///
  665. /// // Define a simple verifier function.
  666. /// fn verifier(prog: &[u8]) -> Result<(), Error> {
  667. /// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
  668. /// if last_insn.opc != ebpf::EXIT {
  669. /// return Err(Error::new(ErrorKind::Other,
  670. /// "[Verifier] Error: program does not end with “EXIT” instruction"));
  671. /// }
  672. /// Ok(())
  673. /// }
  674. ///
  675. /// let prog1 = &[
  676. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  677. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  678. /// ];
  679. ///
  680. /// // Instantiate a VM.
  681. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
  682. /// // Change the verifier.
  683. /// vm.set_verifier(verifier).unwrap();
  684. /// ```
  685. pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
  686. self.parent.set_verifier(verifier)
  687. }
  688. /// Register a built-in or user-defined helper function in order to use it later from within
  689. /// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
  690. ///
  691. /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
  692. /// program. You should be able to change registered helpers after compiling, but not to add
  693. /// new ones (i.e. with new keys).
  694. ///
  695. /// # Examples
  696. ///
  697. /// ```
  698. /// #[cfg(feature = "std")] {
  699. /// use rbpf::helpers;
  700. ///
  701. /// // This program was compiled with clang, from a C program containing the following single
  702. /// // instruction: `return bpf_trace_printk("foo %c %c %c\n", 10, 1, 2, 3);`
  703. /// let prog = &[
  704. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  705. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
  706. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  707. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
  708. /// 0x2d, 0x12, 0x06, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 6 instructions
  709. /// 0x71, 0x21, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r1
  710. /// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
  711. /// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
  712. /// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
  713. /// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
  714. /// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
  715. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  716. /// ];
  717. ///
  718. /// let mem = &mut [
  719. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x09,
  720. /// ];
  721. ///
  722. /// // Instantiate a VM.
  723. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
  724. ///
  725. /// // Register a helper. This helper will store the result of the square root of r1 into r0.
  726. /// vm.register_helper(1, helpers::sqrti);
  727. ///
  728. /// let res = vm.execute_program(mem).unwrap();
  729. /// assert_eq!(res, 3);
  730. /// }
  731. /// ```
  732. pub fn register_helper(
  733. &mut self,
  734. key: u32,
  735. function: fn(u64, u64, u64, u64, u64) -> u64,
  736. ) -> Result<(), Error> {
  737. self.parent.register_helper(key, function)
  738. }
  739. /// Execute the program loaded, with the given packet data.
  740. ///
  741. /// If the program is made to be compatible with Linux kernel, it is expected to load the
  742. /// address of the beginning and of the end of the memory area used for packet data from some
  743. /// metadata buffer, which in the case of this VM is handled internally. The offsets at which
  744. /// the addresses should be placed should have be set at the creation of the VM.
  745. ///
  746. /// # Examples
  747. ///
  748. /// ```
  749. /// let prog = &[
  750. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  751. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
  752. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  753. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
  754. /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
  755. /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
  756. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  757. /// ];
  758. /// let mem = &mut [
  759. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  760. /// ];
  761. ///
  762. /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
  763. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
  764. ///
  765. /// // Provide only a reference to the packet data. We do not manage the metadata buffer.
  766. /// let res = vm.execute_program(mem).unwrap();
  767. /// assert_eq!(res, 0xdd);
  768. /// ```
  769. pub fn execute_program(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
  770. let l = self.mbuff.buffer.len();
  771. // Can this ever happen? Probably not, should be ensured at mbuff creation.
  772. if self.mbuff.data_offset + 8 > l || self.mbuff.data_end_offset + 8 > l {
  773. Err(Error::new(ErrorKind::Other, format!("Error: buffer too small ({:?}), cannot use data_offset {:?} and data_end_offset {:?}",
  774. l, self.mbuff.data_offset, self.mbuff.data_end_offset)))?;
  775. }
  776. LittleEndian::write_u64(
  777. &mut self.mbuff.buffer[(self.mbuff.data_offset)..],
  778. mem.as_ptr() as u64,
  779. );
  780. LittleEndian::write_u64(
  781. &mut self.mbuff.buffer[(self.mbuff.data_end_offset)..],
  782. mem.as_ptr() as u64 + mem.len() as u64,
  783. );
  784. self.parent.execute_program(mem, &self.mbuff.buffer)
  785. }
  786. /// JIT-compile the loaded program. No argument required for this.
  787. ///
  788. /// If using helper functions, be sure to register them into the VM before calling this
  789. /// function.
  790. ///
  791. /// # Examples
  792. ///
  793. /// ```
  794. /// let prog = &[
  795. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  796. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
  797. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  798. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
  799. /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
  800. /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
  801. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  802. /// ];
  803. ///
  804. /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
  805. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
  806. ///
  807. /// vm.jit_compile();
  808. /// ```
  809. #[cfg(all(not(windows), feature = "std"))]
  810. pub fn jit_compile(&mut self) -> Result<(), Error> {
  811. let prog = match self.parent.prog {
  812. Some(prog) => prog,
  813. None => Err(Error::new(
  814. ErrorKind::Other,
  815. "Error: No program set, call prog_set() to load one",
  816. ))?,
  817. };
  818. self.parent.jit = Some(jit::JitMemory::new(prog, &self.parent.helpers, true, true)?);
  819. Ok(())
  820. }
  821. /// Execute the previously JIT-compiled program, with the given packet data, in a manner very
  822. /// similar to `execute_program()`.
  823. ///
  824. /// If the program is made to be compatible with Linux kernel, it is expected to load the
  825. /// address of the beginning and of the end of the memory area used for packet data from some
  826. /// metadata buffer, which in the case of this VM is handled internally. The offsets at which
  827. /// the addresses should be placed should have be set at the creation of the VM.
  828. ///
  829. /// # Safety
  830. ///
  831. /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
  832. /// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
  833. /// very bad (program may segfault). It may be wise to check that the program works with the
  834. /// interpreter before running the JIT-compiled version of it.
  835. ///
  836. /// For this reason the function should be called from within an `unsafe` bloc.
  837. ///
  838. /// # Examples
  839. ///
  840. /// ```
  841. /// let prog = &[
  842. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  843. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
  844. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  845. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
  846. /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
  847. /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
  848. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  849. /// ];
  850. /// let mem = &mut [
  851. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  852. /// ];
  853. ///
  854. /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
  855. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
  856. ///
  857. /// # #[cfg(all(not(windows), feature = "std"))]
  858. /// vm.jit_compile();
  859. ///
  860. /// // Provide only a reference to the packet data. We do not manage the metadata buffer.
  861. /// # #[cfg(all(not(windows), feature = "std"))]
  862. /// unsafe {
  863. /// let res = vm.execute_program_jit(mem).unwrap();
  864. /// assert_eq!(res, 0xdd);
  865. /// }
  866. /// ```
  867. // This struct redefines the `execute_program_jit()` function, in order to pass the offsets
  868. // associated with the fixed mbuff.
  869. #[cfg(all(not(windows), feature = "std"))]
  870. pub unsafe fn execute_program_jit(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
  871. // If packet data is empty, do not send the address of an empty slice; send a null pointer
  872. // as first argument instead, as this is uBPF's behavior (empty packet should not happen
  873. // in the kernel; anyway the verifier would prevent the use of uninitialized registers).
  874. // See `mul_loop` test.
  875. let mem_ptr = match mem.len() {
  876. 0 => core::ptr::null_mut(),
  877. _ => mem.as_ptr() as *mut u8,
  878. };
  879. match &self.parent.jit {
  880. Some(jit) => Ok(jit.get_prog()(
  881. self.mbuff.buffer.as_ptr() as *mut u8,
  882. self.mbuff.buffer.len(),
  883. mem_ptr,
  884. mem.len(),
  885. self.mbuff.data_offset,
  886. self.mbuff.data_end_offset,
  887. )),
  888. None => Err(Error::new(
  889. ErrorKind::Other,
  890. "Error: program has not been JIT-compiled",
  891. )),
  892. }
  893. }
  894. /// Compile the loaded program using the Cranelift JIT.
  895. ///
  896. /// If using helper functions, be sure to register them into the VM before calling this
  897. /// function.
  898. ///
  899. /// # Examples
  900. ///
  901. /// ```
  902. /// let prog = &[
  903. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  904. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
  905. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  906. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
  907. /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
  908. /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
  909. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  910. /// ];
  911. ///
  912. /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
  913. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
  914. ///
  915. /// vm.cranelift_compile();
  916. /// ```
  917. #[cfg(feature = "cranelift")]
  918. pub fn cranelift_compile(&mut self) -> Result<(), Error> {
  919. use crate::cranelift::CraneliftCompiler;
  920. let prog = match self.parent.prog {
  921. Some(prog) => prog,
  922. None => Err(Error::new(
  923. ErrorKind::Other,
  924. "Error: No program set, call prog_set() to load one",
  925. ))?,
  926. };
  927. let mut compiler = CraneliftCompiler::new(self.parent.helpers.clone());
  928. let program = compiler.compile_function(prog)?;
  929. self.parent.cranelift_prog = Some(program);
  930. Ok(())
  931. }
  932. /// Execute the previously compiled program, with the given packet data and metadata
  933. /// buffer, in a manner very similar to `execute_program()`.
  934. ///
  935. /// If the program is made to be compatible with Linux kernel, it is expected to load the
  936. /// address of the beginning and of the end of the memory area used for packet data from some
  937. /// metadata buffer, which in the case of this VM is handled internally. The offsets at which
  938. /// the addresses should be placed should have be set at the creation of the VM.
  939. ///
  940. /// # Examples
  941. ///
  942. /// ```
  943. /// let prog = &[
  944. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  945. /// 0x79, 0x12, 0x40, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem from r1[0x40] to r2
  946. /// 0x07, 0x02, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // add r2, 5
  947. /// 0x79, 0x11, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, // load mem_end from r1[0x50] to r1
  948. /// 0x2d, 0x12, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, // if r2 > r1 skip 3 instructions
  949. /// 0x71, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // load r2 (= *(mem + 5)) into r0
  950. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  951. /// ];
  952. /// let mem = &mut [
  953. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  954. /// ];
  955. ///
  956. /// // Instantiate a VM. Note that we provide the start and end offsets for mem pointers.
  957. /// let mut vm = rbpf::EbpfVmFixedMbuff::new(Some(prog), 0x40, 0x50).unwrap();
  958. ///
  959. /// vm.cranelift_compile();
  960. ///
  961. /// // Provide only a reference to the packet data. We do not manage the metadata buffer.
  962. /// let res = vm.execute_program_cranelift(mem).unwrap();
  963. /// assert_eq!(res, 0xdd);
  964. /// ```
  965. #[cfg(feature = "cranelift")]
  966. pub fn execute_program_cranelift(&mut self, mem: &'a mut [u8]) -> Result<u64, Error> {
  967. // If packet data is empty, do not send the address of an empty slice; send a null pointer
  968. // as first argument instead, as this is uBPF's behavior (empty packet should not happen
  969. // in the kernel; anyway the verifier would prevent the use of uninitialized registers).
  970. // See `mul_loop` test.
  971. let mem_ptr = match mem.len() {
  972. 0 => core::ptr::null_mut(),
  973. _ => mem.as_ptr() as *mut u8,
  974. };
  975. let l = self.mbuff.buffer.len();
  976. // Can this ever happen? Probably not, should be ensured at mbuff creation.
  977. if self.mbuff.data_offset + 8 > l || self.mbuff.data_end_offset + 8 > l {
  978. Err(Error::new(ErrorKind::Other, format!("Error: buffer too small ({:?}), cannot use data_offset {:?} and data_end_offset {:?}",
  979. l, self.mbuff.data_offset, self.mbuff.data_end_offset)))?;
  980. }
  981. LittleEndian::write_u64(
  982. &mut self.mbuff.buffer[(self.mbuff.data_offset)..],
  983. mem.as_ptr() as u64,
  984. );
  985. LittleEndian::write_u64(
  986. &mut self.mbuff.buffer[(self.mbuff.data_end_offset)..],
  987. mem.as_ptr() as u64 + mem.len() as u64,
  988. );
  989. match &self.parent.cranelift_prog {
  990. Some(prog) => Ok(prog.execute(
  991. mem_ptr,
  992. mem.len(),
  993. self.mbuff.buffer.as_ptr() as *mut u8,
  994. self.mbuff.buffer.len(),
  995. )),
  996. None => Err(Error::new(
  997. ErrorKind::Other,
  998. "Error: program has not been compiled with cranelift",
  999. )),
  1000. }
  1001. }
  1002. }
  1003. /// A virtual machine to run eBPF program. This kind of VM is used for programs expecting to work
  1004. /// directly on the memory area representing packet data.
  1005. ///
  1006. /// # Examples
  1007. ///
  1008. /// ```
  1009. /// let prog = &[
  1010. /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
  1011. /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
  1012. /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
  1013. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1014. /// ];
  1015. /// let mem = &mut [
  1016. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0xdd
  1017. /// ];
  1018. ///
  1019. /// // Instantiate a VM.
  1020. /// let vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
  1021. ///
  1022. /// // Provide only a reference to the packet data.
  1023. /// let res = vm.execute_program(mem).unwrap();
  1024. /// assert_eq!(res, 0x22cc);
  1025. /// ```
  1026. pub struct EbpfVmRaw<'a> {
  1027. parent: EbpfVmMbuff<'a>,
  1028. }
  1029. impl<'a> EbpfVmRaw<'a> {
  1030. /// Create a new virtual machine instance, and load an eBPF program into that instance.
  1031. /// When attempting to load the program, it passes through a simple verifier.
  1032. ///
  1033. /// # Examples
  1034. ///
  1035. /// ```
  1036. /// let prog = &[
  1037. /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
  1038. /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
  1039. /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
  1040. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1041. /// ];
  1042. ///
  1043. /// // Instantiate a VM.
  1044. /// let vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
  1045. /// ```
  1046. pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmRaw<'a>, Error> {
  1047. let parent = EbpfVmMbuff::new(prog)?;
  1048. Ok(EbpfVmRaw { parent })
  1049. }
  1050. /// Load a new eBPF program into the virtual machine instance.
  1051. ///
  1052. /// # Examples
  1053. ///
  1054. /// ```
  1055. /// let prog1 = &[
  1056. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  1057. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1058. /// ];
  1059. /// let prog2 = &[
  1060. /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
  1061. /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
  1062. /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
  1063. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1064. /// ];
  1065. ///
  1066. /// let mem = &mut [
  1067. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27,
  1068. /// ];
  1069. ///
  1070. /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog1)).unwrap();
  1071. /// vm.set_program(prog2);
  1072. ///
  1073. /// let res = vm.execute_program(mem).unwrap();
  1074. /// assert_eq!(res, 0x22cc);
  1075. /// ```
  1076. pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
  1077. self.parent.set_program(prog)?;
  1078. Ok(())
  1079. }
  1080. /// Set a new verifier function. The function should return an `Error` if the program should be
  1081. /// rejected by the virtual machine. If a program has been loaded to the VM already, the
  1082. /// verifier is immediately run.
  1083. ///
  1084. /// # Examples
  1085. ///
  1086. /// ```
  1087. /// use rbpf::{Error, ErrorKind};
  1088. /// use rbpf::ebpf;
  1089. ///
  1090. /// // Define a simple verifier function.
  1091. /// fn verifier(prog: &[u8]) -> Result<(), Error> {
  1092. /// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
  1093. /// if last_insn.opc != ebpf::EXIT {
  1094. /// return Err(Error::new(ErrorKind::Other,
  1095. /// "[Verifier] Error: program does not end with “EXIT” instruction"));
  1096. /// }
  1097. /// Ok(())
  1098. /// }
  1099. ///
  1100. /// let prog1 = &[
  1101. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  1102. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1103. /// ];
  1104. ///
  1105. /// // Instantiate a VM.
  1106. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
  1107. /// // Change the verifier.
  1108. /// vm.set_verifier(verifier).unwrap();
  1109. /// ```
  1110. pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
  1111. self.parent.set_verifier(verifier)
  1112. }
  1113. /// Register a built-in or user-defined helper function in order to use it later from within
  1114. /// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
  1115. ///
  1116. /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
  1117. /// program. You should be able to change registered helpers after compiling, but not to add
  1118. /// new ones (i.e. with new keys).
  1119. ///
  1120. /// # Examples
  1121. ///
  1122. /// ```
  1123. /// #[cfg(feature = "std")] {
  1124. /// use rbpf::helpers;
  1125. ///
  1126. /// let prog = &[
  1127. /// 0x79, 0x11, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxdw r1, r1[0x00]
  1128. /// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
  1129. /// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
  1130. /// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
  1131. /// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
  1132. /// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
  1133. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1134. /// ];
  1135. ///
  1136. /// let mem = &mut [
  1137. /// 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01
  1138. /// ];
  1139. ///
  1140. /// // Instantiate a VM.
  1141. /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
  1142. ///
  1143. /// // Register a helper. This helper will store the result of the square root of r1 into r0.
  1144. /// vm.register_helper(1, helpers::sqrti);
  1145. ///
  1146. /// let res = vm.execute_program(mem).unwrap();
  1147. /// assert_eq!(res, 0x10000000);
  1148. /// }
  1149. /// ```
  1150. pub fn register_helper(
  1151. &mut self,
  1152. key: u32,
  1153. function: fn(u64, u64, u64, u64, u64) -> u64,
  1154. ) -> Result<(), Error> {
  1155. self.parent.register_helper(key, function)
  1156. }
  1157. /// Register a set of built-in or user-defined helper functions in order to use them later from
  1158. /// within the eBPF program. The helpers are registered into a hashmap, so the `key` can be any
  1159. /// `u32`.
  1160. #[allow(clippy::type_complexity)]
  1161. pub fn register_helper_set(
  1162. &mut self,
  1163. helpers: &HashMap<u32, fn(u64, u64, u64, u64, u64) -> u64>,
  1164. ) -> Result<(), Error> {
  1165. for (key, function) in helpers {
  1166. self.parent.register_helper(*key, *function)?;
  1167. }
  1168. Ok(())
  1169. }
  1170. /// Execute the program loaded, with the given packet data.
  1171. ///
  1172. /// # Examples
  1173. ///
  1174. /// ```
  1175. /// let prog = &[
  1176. /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
  1177. /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
  1178. /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
  1179. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1180. /// ];
  1181. ///
  1182. /// let mem = &mut [
  1183. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
  1184. /// ];
  1185. ///
  1186. /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
  1187. ///
  1188. /// let res = vm.execute_program(mem).unwrap();
  1189. /// assert_eq!(res, 0x22cc);
  1190. /// ```
  1191. pub fn execute_program(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
  1192. self.parent.execute_program(mem, &[])
  1193. }
  1194. /// JIT-compile the loaded program. No argument required for this.
  1195. ///
  1196. /// If using helper functions, be sure to register them into the VM before calling this
  1197. /// function.
  1198. ///
  1199. /// # Examples
  1200. ///
  1201. /// ```
  1202. /// let prog = &[
  1203. /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
  1204. /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
  1205. /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
  1206. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1207. /// ];
  1208. ///
  1209. /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
  1210. ///
  1211. /// vm.jit_compile();
  1212. /// ```
  1213. #[cfg(all(not(windows), feature = "std"))]
  1214. pub fn jit_compile(&mut self) -> Result<(), Error> {
  1215. let prog = match self.parent.prog {
  1216. Some(prog) => prog,
  1217. None => Err(Error::new(
  1218. ErrorKind::Other,
  1219. "Error: No program set, call prog_set() to load one",
  1220. ))?,
  1221. };
  1222. self.parent.jit = Some(jit::JitMemory::new(
  1223. prog,
  1224. &self.parent.helpers,
  1225. false,
  1226. false,
  1227. )?);
  1228. Ok(())
  1229. }
  1230. /// Execute the previously JIT-compiled program, with the given packet data, in a manner very
  1231. /// similar to `execute_program()`.
  1232. ///
  1233. /// # Safety
  1234. ///
  1235. /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
  1236. /// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
  1237. /// very bad (program may segfault). It may be wise to check that the program works with the
  1238. /// interpreter before running the JIT-compiled version of it.
  1239. ///
  1240. /// For this reason the function should be called from within an `unsafe` bloc.
  1241. ///
  1242. /// # Examples
  1243. ///
  1244. /// ```
  1245. /// let prog = &[
  1246. /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
  1247. /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
  1248. /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
  1249. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1250. /// ];
  1251. ///
  1252. /// let mem = &mut [
  1253. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
  1254. /// ];
  1255. ///
  1256. /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
  1257. ///
  1258. /// # #[cfg(all(not(windows), feature = "std"))]
  1259. /// vm.jit_compile();
  1260. ///
  1261. /// # #[cfg(all(not(windows), feature = "std"))]
  1262. /// unsafe {
  1263. /// let res = vm.execute_program_jit(mem).unwrap();
  1264. /// assert_eq!(res, 0x22cc);
  1265. /// }
  1266. /// ```
  1267. #[cfg(all(not(windows), feature = "std"))]
  1268. pub unsafe fn execute_program_jit(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
  1269. let mut mbuff = vec![];
  1270. self.parent.execute_program_jit(mem, &mut mbuff)
  1271. }
  1272. /// Compile the loaded program using the Cranelift JIT.
  1273. ///
  1274. /// If using helper functions, be sure to register them into the VM before calling this
  1275. /// function.
  1276. ///
  1277. /// # Examples
  1278. ///
  1279. /// ```
  1280. /// let prog = &[
  1281. /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
  1282. /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
  1283. /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
  1284. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1285. /// ];
  1286. ///
  1287. /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
  1288. ///
  1289. /// vm.cranelift_compile();
  1290. /// ```
  1291. #[cfg(feature = "cranelift")]
  1292. pub fn cranelift_compile(&mut self) -> Result<(), Error> {
  1293. use crate::cranelift::CraneliftCompiler;
  1294. let prog = match self.parent.prog {
  1295. Some(prog) => prog,
  1296. None => Err(Error::new(
  1297. ErrorKind::Other,
  1298. "Error: No program set, call prog_set() to load one",
  1299. ))?,
  1300. };
  1301. let mut compiler = CraneliftCompiler::new(self.parent.helpers.clone());
  1302. let program = compiler.compile_function(prog)?;
  1303. self.parent.cranelift_prog = Some(program);
  1304. Ok(())
  1305. }
  1306. /// Execute the previously compiled program, with the given packet data, in a manner very
  1307. /// similar to `execute_program()`.
  1308. ///
  1309. /// # Examples
  1310. ///
  1311. /// ```
  1312. /// let prog = &[
  1313. /// 0x71, 0x11, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, // ldxb r1[0x04], r1
  1314. /// 0x07, 0x01, 0x00, 0x00, 0x00, 0x22, 0x00, 0x00, // add r1, 0x22
  1315. /// 0xbf, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, r1
  1316. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1317. /// ];
  1318. ///
  1319. /// let mem = &mut [
  1320. /// 0xaa, 0xbb, 0x11, 0x22, 0xcc, 0x27
  1321. /// ];
  1322. ///
  1323. /// let mut vm = rbpf::EbpfVmRaw::new(Some(prog)).unwrap();
  1324. ///
  1325. /// vm.cranelift_compile();
  1326. ///
  1327. /// let res = vm.execute_program_cranelift(mem).unwrap();
  1328. /// assert_eq!(res, 0x22cc);
  1329. /// ```
  1330. #[cfg(feature = "cranelift")]
  1331. pub fn execute_program_cranelift(&self, mem: &'a mut [u8]) -> Result<u64, Error> {
  1332. let mut mbuff = vec![];
  1333. self.parent.execute_program_cranelift(mem, &mut mbuff)
  1334. }
  1335. }
  1336. /// A virtual machine to run eBPF program. This kind of VM is used for programs that do not work
  1337. /// with any memory area—no metadata buffer, no packet data either.
  1338. ///
  1339. /// # Examples
  1340. ///
  1341. /// ```
  1342. /// let prog = &[
  1343. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  1344. /// 0xb7, 0x01, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // mov r1, 1
  1345. /// 0xb7, 0x02, 0x00, 0x00, 0x02, 0x00, 0x00, 0x00, // mov r2, 2
  1346. /// 0xb7, 0x03, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // mov r3, 3
  1347. /// 0xb7, 0x04, 0x00, 0x00, 0x04, 0x00, 0x00, 0x00, // mov r4, 4
  1348. /// 0xb7, 0x05, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00, // mov r5, 5
  1349. /// 0xb7, 0x06, 0x00, 0x00, 0x06, 0x00, 0x00, 0x00, // mov r6, 6
  1350. /// 0xb7, 0x07, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00, // mov r7, 7
  1351. /// 0xb7, 0x08, 0x00, 0x00, 0x08, 0x00, 0x00, 0x00, // mov r8, 8
  1352. /// 0x4f, 0x50, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // or r0, r5
  1353. /// 0x47, 0x00, 0x00, 0x00, 0xa0, 0x00, 0x00, 0x00, // or r0, 0xa0
  1354. /// 0x57, 0x00, 0x00, 0x00, 0xa3, 0x00, 0x00, 0x00, // and r0, 0xa3
  1355. /// 0xb7, 0x09, 0x00, 0x00, 0x91, 0x00, 0x00, 0x00, // mov r9, 0x91
  1356. /// 0x5f, 0x90, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // and r0, r9
  1357. /// 0x67, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, // lsh r0, 32
  1358. /// 0x67, 0x00, 0x00, 0x00, 0x16, 0x00, 0x00, 0x00, // lsh r0, 22
  1359. /// 0x6f, 0x80, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // lsh r0, r8
  1360. /// 0x77, 0x00, 0x00, 0x00, 0x20, 0x00, 0x00, 0x00, // rsh r0, 32
  1361. /// 0x77, 0x00, 0x00, 0x00, 0x13, 0x00, 0x00, 0x00, // rsh r0, 19
  1362. /// 0x7f, 0x70, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // rsh r0, r7
  1363. /// 0xa7, 0x00, 0x00, 0x00, 0x03, 0x00, 0x00, 0x00, // xor r0, 0x03
  1364. /// 0xaf, 0x20, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // xor r0, r2
  1365. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1366. /// ];
  1367. ///
  1368. /// // Instantiate a VM.
  1369. /// let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
  1370. ///
  1371. /// // Provide only a reference to the packet data.
  1372. /// let res = vm.execute_program().unwrap();
  1373. /// assert_eq!(res, 0x11);
  1374. /// ```
  1375. pub struct EbpfVmNoData<'a> {
  1376. parent: EbpfVmRaw<'a>,
  1377. }
  1378. impl<'a> EbpfVmNoData<'a> {
  1379. /// Create a new virtual machine instance, and load an eBPF program into that instance.
  1380. /// When attempting to load the program, it passes through a simple verifier.
  1381. ///
  1382. /// # Examples
  1383. ///
  1384. /// ```
  1385. /// let prog = &[
  1386. /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
  1387. /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
  1388. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1389. /// ];
  1390. ///
  1391. /// // Instantiate a VM.
  1392. /// let vm = rbpf::EbpfVmNoData::new(Some(prog));
  1393. /// ```
  1394. pub fn new(prog: Option<&'a [u8]>) -> Result<EbpfVmNoData<'a>, Error> {
  1395. let parent = EbpfVmRaw::new(prog)?;
  1396. Ok(EbpfVmNoData { parent })
  1397. }
  1398. /// Load a new eBPF program into the virtual machine instance.
  1399. ///
  1400. /// # Examples
  1401. ///
  1402. /// ```
  1403. /// let prog1 = &[
  1404. /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
  1405. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1406. /// ];
  1407. /// let prog2 = &[
  1408. /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
  1409. /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
  1410. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1411. /// ];
  1412. ///
  1413. /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog1)).unwrap();
  1414. ///
  1415. /// let res = vm.execute_program().unwrap();
  1416. /// assert_eq!(res, 0x2211);
  1417. ///
  1418. /// vm.set_program(prog2);
  1419. ///
  1420. /// let res = vm.execute_program().unwrap();
  1421. /// assert_eq!(res, 0x1122);
  1422. /// ```
  1423. pub fn set_program(&mut self, prog: &'a [u8]) -> Result<(), Error> {
  1424. self.parent.set_program(prog)?;
  1425. Ok(())
  1426. }
  1427. /// Set a new verifier function. The function should return an `Error` if the program should be
  1428. /// rejected by the virtual machine. If a program has been loaded to the VM already, the
  1429. /// verifier is immediately run.
  1430. ///
  1431. /// # Examples
  1432. ///
  1433. /// ```
  1434. /// use rbpf::{Error, ErrorKind};
  1435. /// use rbpf::ebpf;
  1436. ///
  1437. /// // Define a simple verifier function.
  1438. /// fn verifier(prog: &[u8]) -> Result<(), Error> {
  1439. /// let last_insn = ebpf::get_insn(prog, (prog.len() / ebpf::INSN_SIZE) - 1);
  1440. /// if last_insn.opc != ebpf::EXIT {
  1441. /// return Err(Error::new(ErrorKind::Other,
  1442. /// "[Verifier] Error: program does not end with “EXIT” instruction"));
  1443. /// }
  1444. /// Ok(())
  1445. /// }
  1446. ///
  1447. /// let prog1 = &[
  1448. /// 0xb7, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r0, 0
  1449. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1450. /// ];
  1451. ///
  1452. /// // Instantiate a VM.
  1453. /// let mut vm = rbpf::EbpfVmMbuff::new(Some(prog1)).unwrap();
  1454. /// // Change the verifier.
  1455. /// vm.set_verifier(verifier).unwrap();
  1456. /// ```
  1457. pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
  1458. self.parent.set_verifier(verifier)
  1459. }
  1460. /// Register a built-in or user-defined helper function in order to use it later from within
  1461. /// the eBPF program. The helper is registered into a hashmap, so the `key` can be any `u32`.
  1462. ///
  1463. /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the
  1464. /// program. You should be able to change registered helpers after compiling, but not to add
  1465. /// new ones (i.e. with new keys).
  1466. ///
  1467. /// # Examples
  1468. ///
  1469. /// ```
  1470. /// #[cfg(feature = "std")] {
  1471. /// use rbpf::helpers;
  1472. ///
  1473. /// let prog = &[
  1474. /// 0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, // mov r1, 0x010000000
  1475. /// 0xb7, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r2, 0
  1476. /// 0xb7, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r3, 0
  1477. /// 0xb7, 0x04, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r4, 0
  1478. /// 0xb7, 0x05, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, // mov r5, 0
  1479. /// 0x85, 0x00, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, // call helper with key 1
  1480. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1481. /// ];
  1482. ///
  1483. /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
  1484. ///
  1485. /// // Register a helper. This helper will store the result of the square root of r1 into r0.
  1486. /// vm.register_helper(1, helpers::sqrti).unwrap();
  1487. ///
  1488. /// let res = vm.execute_program().unwrap();
  1489. /// assert_eq!(res, 0x1000);
  1490. /// }
  1491. /// ```
  1492. pub fn register_helper(
  1493. &mut self,
  1494. key: u32,
  1495. function: fn(u64, u64, u64, u64, u64) -> u64,
  1496. ) -> Result<(), Error> {
  1497. self.parent.register_helper(key, function)
  1498. }
  1499. /// JIT-compile the loaded program. No argument required for this.
  1500. ///
  1501. /// If using helper functions, be sure to register them into the VM before calling this
  1502. /// function.
  1503. ///
  1504. /// # Examples
  1505. ///
  1506. /// ```
  1507. /// let prog = &[
  1508. /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
  1509. /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
  1510. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1511. /// ];
  1512. ///
  1513. /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
  1514. ///
  1515. ///
  1516. /// vm.jit_compile();
  1517. /// ```
  1518. #[cfg(all(not(windows), feature = "std"))]
  1519. pub fn jit_compile(&mut self) -> Result<(), Error> {
  1520. self.parent.jit_compile()
  1521. }
  1522. /// Execute the program loaded, without providing pointers to any memory area whatsoever.
  1523. ///
  1524. /// # Examples
  1525. ///
  1526. /// ```
  1527. /// let prog = &[
  1528. /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
  1529. /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
  1530. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1531. /// ];
  1532. ///
  1533. /// let vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
  1534. ///
  1535. /// // For this kind of VM, the `execute_program()` function needs no argument.
  1536. /// let res = vm.execute_program().unwrap();
  1537. /// assert_eq!(res, 0x1122);
  1538. /// ```
  1539. pub fn execute_program(&self) -> Result<u64, Error> {
  1540. self.parent.execute_program(&mut [])
  1541. }
  1542. /// Execute the previously JIT-compiled program, without providing pointers to any memory area
  1543. /// whatsoever, in a manner very similar to `execute_program()`.
  1544. ///
  1545. /// # Safety
  1546. ///
  1547. /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime
  1548. /// check for memory access; so if the eBPF program attempts erroneous accesses, this may end
  1549. /// very bad (program may segfault). It may be wise to check that the program works with the
  1550. /// interpreter before running the JIT-compiled version of it.
  1551. ///
  1552. /// For this reason the function should be called from within an `unsafe` bloc.
  1553. ///
  1554. /// # Examples
  1555. ///
  1556. /// ```
  1557. /// let prog = &[
  1558. /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
  1559. /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
  1560. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1561. /// ];
  1562. ///
  1563. /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
  1564. ///
  1565. /// # #[cfg(all(not(windows), feature = "std"))]
  1566. /// vm.jit_compile();
  1567. ///
  1568. /// # #[cfg(all(not(windows), feature = "std"))]
  1569. /// unsafe {
  1570. /// let res = vm.execute_program_jit().unwrap();
  1571. /// assert_eq!(res, 0x1122);
  1572. /// }
  1573. /// ```
  1574. #[cfg(all(not(windows), feature = "std"))]
  1575. pub unsafe fn execute_program_jit(&self) -> Result<u64, Error> {
  1576. self.parent.execute_program_jit(&mut [])
  1577. }
  1578. /// Compile the loaded program using the Cranelift JIT.
  1579. ///
  1580. /// If using helper functions, be sure to register them into the VM before calling this
  1581. /// function.
  1582. ///
  1583. /// # Examples
  1584. ///
  1585. /// ```
  1586. /// let prog = &[
  1587. /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
  1588. /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
  1589. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1590. /// ];
  1591. ///
  1592. /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
  1593. ///
  1594. ///
  1595. /// vm.cranelift_compile();
  1596. /// ```
  1597. #[cfg(feature = "cranelift")]
  1598. pub fn cranelift_compile(&mut self) -> Result<(), Error> {
  1599. self.parent.cranelift_compile()
  1600. }
  1601. /// Execute the previously JIT-compiled program, without providing pointers to any memory area
  1602. /// whatsoever, in a manner very similar to `execute_program()`.
  1603. ///
  1604. /// # Examples
  1605. ///
  1606. /// ```
  1607. /// let prog = &[
  1608. /// 0xb7, 0x00, 0x00, 0x00, 0x11, 0x22, 0x00, 0x00, // mov r0, 0x2211
  1609. /// 0xdc, 0x00, 0x00, 0x00, 0x10, 0x00, 0x00, 0x00, // be16 r0
  1610. /// 0x95, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 // exit
  1611. /// ];
  1612. ///
  1613. /// let mut vm = rbpf::EbpfVmNoData::new(Some(prog)).unwrap();
  1614. ///
  1615. /// vm.cranelift_compile();
  1616. ///
  1617. /// let res = vm.execute_program_cranelift().unwrap();
  1618. /// assert_eq!(res, 0x1122);
  1619. /// ```
  1620. #[cfg(feature = "cranelift")]
  1621. pub fn execute_program_cranelift(&self) -> Result<u64, Error> {
  1622. self.parent.execute_program_cranelift(&mut [])
  1623. }
  1624. }
  1625. /// EbpfVm with Owned data
  1626. pub struct EbpfVmRawOwned {
  1627. parent: EbpfVmRaw<'static>,
  1628. data_len: usize,
  1629. data_cap: usize,
  1630. }
  1631. impl EbpfVmRawOwned {
  1632. /// Create a new virtual machine instance, and load an eBPF program into that instance.
  1633. /// When attempting to load the program, it passes through a simple verifier.
  1634. pub fn new(prog: Option<Vec<u8>>) -> Result<EbpfVmRawOwned, Error> {
  1635. let (prog, data_len, data_cap) = match prog {
  1636. Some(prog) => {
  1637. let data_len = prog.len();
  1638. let data_cap = prog.capacity();
  1639. let slice = prog.leak();
  1640. let slice = unsafe { core::slice::from_raw_parts(slice.as_ptr(), data_len) };
  1641. (Some(slice), data_len, data_cap)
  1642. }
  1643. None => (None, 0, 0),
  1644. };
  1645. let parent = EbpfVmRaw::new(prog)?;
  1646. Ok(Self {
  1647. parent,
  1648. data_len,
  1649. data_cap,
  1650. })
  1651. }
  1652. /// Load a new eBPF program into the virtual machine instance
  1653. pub fn set_program(&mut self, prog: Vec<u8>) -> Result<(), Error> {
  1654. self.data_len = prog.len();
  1655. self.data_cap = prog.capacity();
  1656. let slice = prog.leak();
  1657. self.parent.set_program(slice)?;
  1658. Ok(())
  1659. }
  1660. /// Set a new verifier function. The function should return an Error if the program should be rejected by the virtual machine.
  1661. /// If a program has been loaded to the VM already, the verifier is immediately run.
  1662. pub fn set_verifier(&mut self, verifier: Verifier) -> Result<(), Error> {
  1663. self.parent.set_verifier(verifier)
  1664. }
  1665. /// Register a built-in or user-defined helper function in order to use it later from within the eBPF program.
  1666. /// The helper is registered into a hashmap, so the key can be any u32.
  1667. /// If using JIT-compiled eBPF programs, be sure to register all helpers before compiling the program.
  1668. /// You should be able to change registered helpers after compiling, but not to add new ones (i. e. with new keys).
  1669. pub fn register_helper(
  1670. &mut self,
  1671. key: u32,
  1672. function: fn(u64, u64, u64, u64, u64) -> u64,
  1673. ) -> Result<(), Error> {
  1674. self.parent.register_helper(key, function)
  1675. }
  1676. /// Register a set of built-in or user-defined helper functions in order to use them later from
  1677. /// within the eBPF program. The helpers are registered into a hashmap, so the `key` can be any
  1678. /// `u32`.
  1679. #[allow(clippy::type_complexity)]
  1680. pub fn register_helper_set(
  1681. &mut self,
  1682. helpers: &HashMap<u32, fn(u64, u64, u64, u64, u64) -> u64>,
  1683. ) -> Result<(), Error> {
  1684. for (key, function) in helpers {
  1685. self.parent.register_helper(*key, *function)?;
  1686. }
  1687. Ok(())
  1688. }
  1689. /// Execute the previously JIT-compiled program, with the given packet data, in a manner very similar to execute_program().
  1690. ///
  1691. /// Safety
  1692. ///
  1693. /// **WARNING:** JIT-compiled assembly code is not safe, in particular there is no runtime check for memory access;
  1694. /// so if the eBPF program attempts erroneous accesses, this may end very bad (program may segfault).
  1695. /// It may be wise to check that the program works with the interpreter before running the JIT-compiled version of it.
  1696. ///
  1697. /// For this reason the function should be called from within an unsafe bloc.
  1698. pub fn execute_program(&self, mem: &mut [u8]) -> Result<u64, Error> {
  1699. self.parent.execute_program(mem)
  1700. }
  1701. }
  1702. impl Drop for EbpfVmRawOwned {
  1703. fn drop(&mut self) {
  1704. match self.parent.parent.prog {
  1705. Some(prog) => unsafe {
  1706. let ptr = prog.as_ptr();
  1707. let _prog = Vec::from_raw_parts(ptr as *mut u8, self.data_len, self.data_cap);
  1708. },
  1709. None => {}
  1710. };
  1711. }
  1712. }