/src/capstonenext/arch/BPF/BPFDisassembler.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* Capstone Disassembly Engine */ |
2 | | /* BPF Backend by david942j <david942j@gmail.com>, 2019 */ |
3 | | /* SPDX-FileCopyrightText: 2024 Roee Toledano <roeetoledano10@gmail.com> */ |
4 | | /* SPDX-License-Identifier: BSD-3 */ |
5 | | |
6 | | #ifdef CAPSTONE_HAS_BPF |
7 | | |
8 | | #include <string.h> |
9 | | #include <stddef.h> // offsetof macro |
10 | | |
11 | | #include "BPFConstants.h" |
12 | | #include "BPFDisassembler.h" |
13 | | #include "BPFMapping.h" |
14 | | #include "../../Mapping.h" |
15 | | #include "../../cs_priv.h" |
16 | | #include "../../utils.h" |
17 | | |
18 | | ///< Malloc bpf_internal, also checks if code_len is large enough. |
19 | | static bpf_internal *alloc_bpf_internal(const size_t code_len) |
20 | 15.9k | { |
21 | 15.9k | bpf_internal *bpf; |
22 | | |
23 | 15.9k | if (code_len < 8) |
24 | 308 | return NULL; |
25 | 15.6k | bpf = cs_mem_malloc(sizeof(bpf_internal)); |
26 | 15.6k | if (bpf == NULL) |
27 | 0 | return NULL; |
28 | | /* default value */ |
29 | 15.6k | bpf->insn_size = 8; |
30 | 15.6k | return bpf; |
31 | 15.6k | } |
32 | | |
33 | | ///< Fetch a cBPF structure from code |
34 | | static bpf_internal *fetch_cbpf(MCInst *instr, const uint8_t *code, |
35 | | const size_t code_len) |
36 | 4.54k | { |
37 | 4.54k | bpf_internal *bpf; |
38 | | |
39 | 4.54k | bpf = alloc_bpf_internal(code_len); |
40 | 4.54k | if (bpf == NULL) |
41 | 86 | return NULL; |
42 | | |
43 | 4.45k | bpf->op = readBytes16(instr, code); |
44 | 4.45k | bpf->jt = code[2]; |
45 | 4.45k | bpf->jf = code[3]; |
46 | 4.45k | bpf->k = readBytes32(instr, code + 4); |
47 | 4.45k | return bpf; |
48 | 4.54k | } |
49 | | |
50 | | ///< Fetch an eBPF structure from code |
51 | | static bpf_internal *fetch_ebpf(MCInst *instr, const uint8_t *code, |
52 | | const size_t code_len) |
53 | 11.4k | { |
54 | 11.4k | bpf_internal *bpf; |
55 | | |
56 | 11.4k | bpf = alloc_bpf_internal(code_len); |
57 | 11.4k | if (bpf == NULL) |
58 | 222 | return NULL; |
59 | | |
60 | 11.2k | bpf->op = (uint16_t)code[0]; |
61 | 11.2k | bpf->dst = code[1] & 0xf; |
62 | 11.2k | bpf->src = (code[1] & 0xf0) >> 4; |
63 | | |
64 | | // eBPF has one 16-byte instruction: BPF_LD | BPF_DW | BPF_IMM, |
65 | | // in this case imm is combined with the next block's imm. |
66 | 11.2k | if (bpf->op == (BPF_CLASS_LD | BPF_SIZE_DW | BPF_MODE_IMM)) { |
67 | 268 | if (code_len < 16) { |
68 | 2 | cs_mem_free(bpf); |
69 | 2 | return NULL; |
70 | 2 | } |
71 | 266 | bpf->k = readBytes32(instr, code + 4) | |
72 | 266 | (((uint64_t)readBytes32(instr, code + 12)) << 32); |
73 | 266 | bpf->insn_size = 16; |
74 | 10.9k | } else { |
75 | 10.9k | bpf->offset = readBytes16(instr, code + 2); |
76 | 10.9k | bpf->k = readBytes32(instr, code + 4); |
77 | 10.9k | } |
78 | 11.2k | return bpf; |
79 | 11.2k | } |
80 | | |
81 | | #define CHECK_READABLE_REG(ud, reg) \ |
82 | 7.44k | do { \ |
83 | 7.44k | if (!((reg) >= BPF_REG_R0 && (reg) <= BPF_REG_R10)) \ |
84 | 7.44k | return false; \ |
85 | 7.44k | } while (0) |
86 | | |
87 | | #define CHECK_WRITEABLE_REG(ud, reg) \ |
88 | 4.44k | do { \ |
89 | 4.44k | if (!((reg) >= BPF_REG_R0 && (reg) < BPF_REG_R10)) \ |
90 | 4.44k | return false; \ |
91 | 4.44k | } while (0) |
92 | | |
93 | | #define CHECK_READABLE_AND_PUSH(ud, MI, r) \ |
94 | 7.44k | do { \ |
95 | 7.44k | CHECK_READABLE_REG(ud, r + BPF_REG_R0); \ |
96 | 7.44k | MCOperand_CreateReg0(MI, r + BPF_REG_R0); \ |
97 | 7.41k | } while (0) |
98 | | |
99 | | #define CHECK_WRITABLE_AND_PUSH(ud, MI, r) \ |
100 | 4.44k | do { \ |
101 | 4.44k | CHECK_WRITEABLE_REG(ud, r + BPF_REG_R0); \ |
102 | 4.44k | MCOperand_CreateReg0(MI, r + BPF_REG_R0); \ |
103 | 4.43k | } while (0) |
104 | | |
105 | | static bool decodeLoad(MCInst *MI, bpf_internal *bpf) |
106 | 5.21k | { |
107 | 5.21k | if (!EBPF_MODE(MI->csh->mode)) { |
108 | | /* |
109 | | * +-----+-----------+--------------------+ |
110 | | * | ldb | [k] | [x+k] | |
111 | | * | ldh | [k] | [x+k] | |
112 | | * +-----+-----------+--------------------+ |
113 | | */ |
114 | 1.64k | if (BPF_SIZE(bpf->op) == BPF_SIZE_DW) |
115 | 4 | return false; |
116 | 1.64k | if (BPF_SIZE(bpf->op) == BPF_SIZE_B || |
117 | 1.64k | BPF_SIZE(bpf->op) == BPF_SIZE_H) { |
118 | | /* no ldx */ |
119 | 605 | if (BPF_CLASS(bpf->op) != BPF_CLASS_LD) |
120 | 3 | return false; |
121 | | /* can only be BPF_ABS and BPF_IND */ |
122 | 602 | if (BPF_MODE(bpf->op) == BPF_MODE_ABS) { |
123 | 353 | MCOperand_CreateImm0(MI, bpf->k); |
124 | 353 | return true; |
125 | 353 | } else if (BPF_MODE(bpf->op) == BPF_MODE_IND) { |
126 | 246 | MCOperand_CreateReg0(MI, BPF_REG_X); |
127 | 246 | MCOperand_CreateImm0(MI, bpf->k); |
128 | 246 | return true; |
129 | 246 | } |
130 | 3 | return false; |
131 | 602 | } |
132 | | /* |
133 | | * +-----+----+------+------+-----+-------+ |
134 | | * | ld | #k | #len | M[k] | [k] | [x+k] | |
135 | | * +-----+----+------+------+-----+-------+ |
136 | | * | ldx | #k | #len | M[k] | 4*([k]&0xf) | |
137 | | * +-----+----+------+------+-------------+ |
138 | | */ |
139 | 1.03k | switch (BPF_MODE(bpf->op)) { |
140 | 282 | default: |
141 | 282 | break; |
142 | 300 | case BPF_MODE_IMM: |
143 | 300 | MCOperand_CreateImm0(MI, bpf->k); |
144 | 300 | return true; |
145 | 171 | case BPF_MODE_LEN: |
146 | 171 | return true; |
147 | 283 | case BPF_MODE_MEM: |
148 | 283 | MCOperand_CreateImm0(MI, bpf->k); |
149 | 283 | return true; |
150 | 1.03k | } |
151 | 282 | if (BPF_CLASS(bpf->op) == BPF_CLASS_LD) { |
152 | 98 | if (BPF_MODE(bpf->op) == BPF_MODE_ABS) { |
153 | 47 | MCOperand_CreateImm0(MI, bpf->k); |
154 | 47 | return true; |
155 | 51 | } else if (BPF_MODE(bpf->op) == BPF_MODE_IND) { |
156 | 50 | MCOperand_CreateReg0(MI, BPF_REG_X); |
157 | 50 | MCOperand_CreateImm0(MI, bpf->k); |
158 | 50 | return true; |
159 | 50 | } |
160 | 184 | } else { /* LDX */ |
161 | 184 | if (BPF_MODE(bpf->op) == BPF_MODE_MSH) { |
162 | 183 | MCOperand_CreateImm0(MI, bpf->k); |
163 | 183 | return true; |
164 | 183 | } |
165 | 184 | } |
166 | 2 | return false; |
167 | 282 | } |
168 | | |
169 | | /* eBPF mode */ |
170 | | /* |
171 | | * - IMM: lddw dst, imm64 |
172 | | * - ABS: ld{w,h,b} [k] |
173 | | * - IND: ld{w,h,b} [src] |
174 | | * - MEM: ldx{w,h,b,dw} dst, [src+off] |
175 | | */ |
176 | 3.57k | if (BPF_CLASS(bpf->op) == BPF_CLASS_LD) { |
177 | 2.16k | switch (BPF_MODE(bpf->op)) { |
178 | 283 | case BPF_MODE_IMM: |
179 | 283 | if (bpf->op != |
180 | 283 | (BPF_CLASS_LD | BPF_SIZE_DW | BPF_MODE_IMM)) |
181 | 17 | return false; |
182 | 266 | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
183 | 265 | MCOperand_CreateImm0(MI, bpf->k); |
184 | 265 | return true; |
185 | 1.28k | case BPF_MODE_ABS: |
186 | 1.28k | MCOperand_CreateImm0(MI, bpf->k); |
187 | 1.28k | return true; |
188 | 594 | case BPF_MODE_IND: |
189 | 594 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
190 | 593 | return true; |
191 | 2.16k | } |
192 | 2 | return false; |
193 | 2.16k | } |
194 | | /* LDX */ |
195 | 1.40k | if (BPF_MODE(bpf->op) == BPF_MODE_MEM) { |
196 | 1.39k | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
197 | 1.39k | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
198 | 1.39k | MCOperand_CreateImm0(MI, bpf->offset); |
199 | 1.39k | return true; |
200 | 1.39k | } |
201 | 11 | return false; |
202 | 1.40k | } |
203 | | |
204 | | static bool decodeStore(MCInst *MI, bpf_internal *bpf) |
205 | 1.24k | { |
206 | | /* in cBPF, only BPF_ST* | BPF_MEM | BPF_W is valid |
207 | | * while in eBPF: |
208 | | * - BPF_STX | BPF_XADD | BPF_{W,DW} |
209 | | * - BPF_ST* | BPF_MEM | BPF_{W,H,B,DW} |
210 | | * are valid |
211 | | */ |
212 | 1.24k | if (!EBPF_MODE(MI->csh->mode)) { |
213 | | /* can only store to M[] */ |
214 | 27 | if (bpf->op != (BPF_CLASS(bpf->op) | BPF_MODE_MEM | BPF_SIZE_W)) |
215 | 4 | return false; |
216 | 23 | MCOperand_CreateImm0(MI, bpf->k); |
217 | 23 | return true; |
218 | 27 | } |
219 | | |
220 | | /* eBPF */ |
221 | 1.21k | if (BPF_MODE(bpf->op) == BPF_MODE_ATOMIC) { |
222 | 171 | if (BPF_CLASS(bpf->op) != BPF_CLASS_STX) |
223 | 1 | return false; |
224 | 170 | if (BPF_SIZE(bpf->op) != BPF_SIZE_W && |
225 | 170 | BPF_SIZE(bpf->op) != BPF_SIZE_DW) |
226 | 2 | return false; |
227 | | /* xadd [dst + off], src */ |
228 | 168 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
229 | 167 | MCOperand_CreateImm0(MI, bpf->offset); |
230 | 167 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
231 | 166 | return true; |
232 | 167 | } |
233 | | |
234 | 1.04k | if (BPF_MODE(bpf->op) != BPF_MODE_MEM) |
235 | 14 | return false; |
236 | | |
237 | | /* st [dst + off], src */ |
238 | 1.02k | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
239 | 1.02k | MCOperand_CreateImm0(MI, bpf->offset); |
240 | 1.02k | if (BPF_CLASS(bpf->op) == BPF_CLASS_ST) |
241 | 597 | MCOperand_CreateImm0(MI, bpf->k); |
242 | 429 | else |
243 | 429 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
244 | 1.02k | return true; |
245 | 1.02k | } |
246 | | |
247 | | static bool decodeALU(MCInst *MI, bpf_internal *bpf) |
248 | 4.08k | { |
249 | | /* Set MI->Operands */ |
250 | | |
251 | | /* cBPF */ |
252 | 4.08k | if (!EBPF_MODE(MI->csh->mode)) { |
253 | 1.27k | if (BPF_OP(bpf->op) > BPF_ALU_XOR) |
254 | 2 | return false; |
255 | | /* cBPF's NEG has no operands */ |
256 | 1.26k | if (BPF_OP(bpf->op) == BPF_ALU_NEG) |
257 | 74 | return true; |
258 | 1.19k | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
259 | 400 | MCOperand_CreateImm0(MI, bpf->k); |
260 | 795 | else /* BPF_SRC_X */ |
261 | 795 | MCOperand_CreateReg0(MI, BPF_REG_X); |
262 | 1.19k | return true; |
263 | 1.26k | } |
264 | | |
265 | | /* eBPF */ |
266 | | |
267 | 2.81k | if (BPF_OP(bpf->op) > BPF_ALU_END) |
268 | 9 | return false; |
269 | | /* ENDian's imm must be one of 16, 32, 64 */ |
270 | 2.80k | if (BPF_OP(bpf->op) == BPF_ALU_END) { |
271 | 520 | if (bpf->k != 16 && bpf->k != 32 && bpf->k != 64) |
272 | 28 | return false; |
273 | 492 | if (BPF_CLASS(bpf->op) == BPF_CLASS_ALU64 && |
274 | 492 | BPF_SRC(bpf->op) != BPF_SRC_LITTLE) |
275 | 1 | return false; |
276 | 492 | } |
277 | | |
278 | | /* - op dst, imm |
279 | | * - op dst, src |
280 | | * - neg dst |
281 | | * - le<imm> dst |
282 | | */ |
283 | | /* every ALU instructions have dst op */ |
284 | 2.77k | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
285 | | |
286 | | /* special cases */ |
287 | 2.77k | if (BPF_OP(bpf->op) == BPF_ALU_NEG) |
288 | 141 | return true; |
289 | 2.63k | if (BPF_OP(bpf->op) == BPF_ALU_END) { |
290 | | /* bpf->k must be one of 16, 32, 64 */ |
291 | 491 | bpf->op |= ((uint32_t)bpf->k << 4); |
292 | 491 | return true; |
293 | 491 | } |
294 | | |
295 | | /* normal cases */ |
296 | 2.14k | if (BPF_SRC(bpf->op) == BPF_SRC_K) { |
297 | 1.92k | MCOperand_CreateImm0(MI, bpf->k); |
298 | 1.92k | } else { /* BPF_SRC_X */ |
299 | 218 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
300 | 218 | } |
301 | 2.14k | return true; |
302 | 2.14k | } |
303 | | |
304 | | static bool decodeJump(MCInst *MI, bpf_internal *bpf) |
305 | 4.34k | { |
306 | | /* cBPF and eBPF are very different in class jump */ |
307 | 4.34k | if (!EBPF_MODE(MI->csh->mode)) { |
308 | 723 | if (BPF_OP(bpf->op) > BPF_JUMP_JSET) |
309 | 5 | return false; |
310 | | |
311 | | /* ja is a special case of jumps */ |
312 | 718 | if (BPF_OP(bpf->op) == BPF_JUMP_JA) { |
313 | 73 | MCOperand_CreateImm0(MI, bpf->k); |
314 | 73 | return true; |
315 | 73 | } |
316 | | |
317 | 645 | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
318 | 347 | MCOperand_CreateImm0(MI, bpf->k); |
319 | 298 | else /* BPF_SRC_X */ |
320 | 298 | MCOperand_CreateReg0(MI, BPF_REG_X); |
321 | 645 | MCOperand_CreateImm0(MI, bpf->jt); |
322 | 645 | MCOperand_CreateImm0(MI, bpf->jf); |
323 | 3.62k | } else { |
324 | 3.62k | if (BPF_OP(bpf->op) > BPF_JUMP_JSLE) |
325 | 1 | return false; |
326 | | |
327 | | /* JMP32 has no CALL/EXIT instruction */ |
328 | | /* No operands for exit */ |
329 | 3.61k | if (BPF_OP(bpf->op) == BPF_JUMP_EXIT) |
330 | 50 | return bpf->op == (BPF_CLASS_JMP | BPF_JUMP_EXIT); |
331 | 3.56k | if (BPF_OP(bpf->op) == BPF_JUMP_CALL) { |
332 | 98 | if (bpf->op == (BPF_CLASS_JMP | BPF_JUMP_CALL)) { |
333 | 62 | MCOperand_CreateImm0(MI, bpf->k); |
334 | 62 | return true; |
335 | 62 | } |
336 | 36 | if (bpf->op == |
337 | 36 | (BPF_CLASS_JMP | BPF_JUMP_CALL | BPF_SRC_X)) { |
338 | 35 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->k); |
339 | 10 | return true; |
340 | 35 | } |
341 | 1 | return false; |
342 | 36 | } |
343 | | |
344 | | /* ja is a special case of jumps */ |
345 | 3.47k | if (BPF_OP(bpf->op) == BPF_JUMP_JA) { |
346 | 147 | if (BPF_SRC(bpf->op) != BPF_SRC_K) |
347 | 3 | return false; |
348 | 144 | if (BPF_CLASS(bpf->op) == BPF_CLASS_JMP) |
349 | 46 | MCOperand_CreateImm0(MI, bpf->offset); |
350 | 98 | else |
351 | 98 | MCOperand_CreateImm0(MI, bpf->k); |
352 | | |
353 | 144 | return true; |
354 | 147 | } |
355 | | |
356 | | /* <j> dst, src, +off */ |
357 | 3.32k | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
358 | 3.32k | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
359 | 3.23k | MCOperand_CreateImm0(MI, bpf->k); |
360 | 90 | else |
361 | 90 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
362 | 3.32k | MCOperand_CreateImm0(MI, bpf->offset); |
363 | 3.32k | } |
364 | 3.96k | return true; |
365 | 4.34k | } |
366 | | |
367 | | static bool decodeReturn(MCInst *MI, bpf_internal *bpf) |
368 | 736 | { |
369 | | /* Here only handles the BPF_RET class in cBPF */ |
370 | 736 | switch (BPF_RVAL(bpf->op)) { |
371 | 256 | case BPF_SRC_K: |
372 | 256 | MCOperand_CreateImm0(MI, bpf->k); |
373 | 256 | return true; |
374 | 249 | case BPF_SRC_X: |
375 | 249 | MCOperand_CreateReg0(MI, BPF_REG_X); |
376 | 249 | return true; |
377 | 230 | case BPF_SRC_A: |
378 | 230 | MCOperand_CreateReg0(MI, BPF_REG_A); |
379 | 230 | return true; |
380 | 736 | } |
381 | 1 | return false; |
382 | 736 | } |
383 | | |
384 | | static bool decodeMISC(MCInst *MI, bpf_internal *bpf) |
385 | 56 | { |
386 | 56 | uint16_t op = bpf->op ^ BPF_CLASS_MISC; |
387 | 56 | return op == BPF_MISCOP_TAX || op == BPF_MISCOP_TXA; |
388 | 56 | } |
389 | | |
390 | | ///< 1. Check if the instruction is valid |
391 | | ///< 2. Set MI->opcode |
392 | | ///< 3. Set MI->Operands |
393 | | static bool getInstruction(MCInst *MI, bpf_internal *bpf) |
394 | 15.6k | { |
395 | 15.6k | cs_detail *detail; |
396 | | |
397 | 15.6k | detail = MI->flat_insn->detail; |
398 | | // initialize detail |
399 | 15.6k | if (detail) { |
400 | 15.6k | memset(detail, 0, offsetof(cs_detail, bpf) + sizeof(cs_bpf)); |
401 | 15.6k | } |
402 | | |
403 | 15.6k | MCInst_clear(MI); |
404 | | |
405 | 15.6k | switch (BPF_CLASS(bpf->op)) { |
406 | 0 | default: /* should never happen */ |
407 | 0 | return false; |
408 | 3.33k | case BPF_CLASS_LD: |
409 | 5.21k | case BPF_CLASS_LDX: |
410 | 5.21k | return decodeLoad(MI, bpf); |
411 | 616 | case BPF_CLASS_ST: |
412 | 1.24k | case BPF_CLASS_STX: |
413 | 1.24k | return decodeStore(MI, bpf); |
414 | 2.29k | case BPF_CLASS_ALU: |
415 | 2.29k | return decodeALU(MI, bpf); |
416 | 2.54k | case BPF_CLASS_JMP: |
417 | 2.54k | return decodeJump(MI, bpf); |
418 | 2.53k | case BPF_CLASS_RET: |
419 | | /* case BPF_CLASS_JMP32: */ |
420 | 2.53k | if (EBPF_MODE(MI->csh->mode)) |
421 | 1.79k | return decodeJump(MI, bpf); |
422 | 736 | else |
423 | 736 | return decodeReturn(MI, bpf); |
424 | 1.84k | case BPF_CLASS_MISC: |
425 | | /* case BPF_CLASS_ALU64: */ |
426 | 1.84k | if (EBPF_MODE(MI->csh->mode)) |
427 | 1.78k | return decodeALU(MI, bpf); |
428 | 56 | else |
429 | 56 | return decodeMISC(MI, bpf); |
430 | 15.6k | } |
431 | 15.6k | } |
432 | | |
433 | | // Check for regular load instructions |
434 | | #define REG_LOAD_CASE(c) \ |
435 | 3.34k | case BPF_SIZE_##c: \ |
436 | 3.34k | if (BPF_CLASS(opcode) == BPF_CLASS_LD) \ |
437 | 3.34k | return BPF_INS_LD##c; \ |
438 | 3.34k | else \ |
439 | 3.34k | return BPF_INS_LDX##c; |
440 | | |
441 | | static bpf_insn op2insn_ld_cbpf(unsigned opcode) |
442 | 3.34k | { |
443 | 3.34k | switch (BPF_SIZE(opcode)) { |
444 | 1.67k | REG_LOAD_CASE(W); |
445 | 483 | REG_LOAD_CASE(H); |
446 | 640 | REG_LOAD_CASE(B); |
447 | 550 | REG_LOAD_CASE(DW); |
448 | 3.34k | } |
449 | | |
450 | 0 | return BPF_INS_INVALID; |
451 | 3.34k | } |
452 | | #undef REG_LOAD_CASE |
453 | | |
454 | | // Check for packet load instructions |
455 | | #define PACKET_LOAD_CASE(c) \ |
456 | 1.82k | case BPF_SIZE_##c: \ |
457 | 1.82k | if (BPF_MODE(opcode) == BPF_MODE_ABS) \ |
458 | 1.82k | return BPF_INS_LDABS##c; \ |
459 | 1.82k | else if (BPF_MODE(opcode) == BPF_MODE_IND) \ |
460 | 563 | return BPF_INS_LDIND##c; \ |
461 | 563 | else \ |
462 | 563 | return BPF_INS_INVALID; |
463 | | |
464 | | static bpf_insn op2insn_ld_ebpf(unsigned opcode) |
465 | 3.53k | { |
466 | 3.53k | if (BPF_CLASS(opcode) == BPF_CLASS_LD) { |
467 | 2.14k | switch (BPF_SIZE(opcode)) { |
468 | 896 | PACKET_LOAD_CASE(W); |
469 | 596 | PACKET_LOAD_CASE(H); |
470 | 336 | PACKET_LOAD_CASE(B); |
471 | 2.14k | } |
472 | 2.14k | } |
473 | | |
474 | | // If it's not a packet load instruction, it must be a regular load instruction |
475 | 1.71k | return op2insn_ld_cbpf(opcode); |
476 | 3.53k | } |
477 | | #undef PACKET_LOAD_CASE |
478 | | |
479 | | /* During parsing we already checked to make sure the size is D/DW and |
480 | | * mode is STX and not ST, so we don't need to check again*/ |
481 | | #define ALU_CASE_REG(c) \ |
482 | 87 | case BPF_ALU_##c: \ |
483 | 87 | if (BPF_SIZE(opcode) == BPF_SIZE_W) \ |
484 | 87 | return BPF_INS_A##c; \ |
485 | 87 | else \ |
486 | 87 | return BPF_INS_A##c##64; |
487 | | |
488 | | #define ALU_CASE_FETCH(c) \ |
489 | 61 | case BPF_ALU_##c | BPF_MODE_FETCH: \ |
490 | 61 | if (BPF_SIZE(opcode) == BPF_SIZE_W) \ |
491 | 61 | return BPF_INS_AF##c; \ |
492 | 61 | else \ |
493 | 61 | return BPF_INS_AF##c##64; |
494 | | |
495 | | #define COMPLEX_CASE(c) \ |
496 | 16 | case BPF_ATOMIC_##c | BPF_MODE_FETCH: \ |
497 | 16 | if (BPF_SIZE(opcode) == BPF_SIZE_DW) \ |
498 | 16 | return BPF_INS_A##c##64; \ |
499 | 16 | else \ |
500 | 16 | return BPF_INS_INVALID; |
501 | | |
502 | | #define CASE(c) \ |
503 | 1.04k | case BPF_SIZE_##c: \ |
504 | 1.04k | if (BPF_CLASS(opcode) == BPF_CLASS_ST) \ |
505 | 1.04k | return BPF_INS_ST##c; \ |
506 | 1.04k | else \ |
507 | 1.04k | return BPF_INS_STX##c; |
508 | | |
509 | | static bpf_insn op2insn_st(unsigned opcode, const uint32_t imm) |
510 | 1.21k | { |
511 | | /* |
512 | | * - BPF_STX | ALU atomic operations | BPF_{W,DW} |
513 | | * - BPF_STX | Complex atomic operations | BPF_{DW} |
514 | | * - BPF_ST* | BPF_MEM | BPF_{W,H,B,DW} |
515 | | */ |
516 | | |
517 | 1.21k | if (BPF_MODE(opcode) == BPF_MODE_ATOMIC) { |
518 | 166 | switch (imm) { |
519 | 21 | ALU_CASE_REG(ADD); |
520 | 7 | ALU_CASE_REG(OR); |
521 | 25 | ALU_CASE_REG(AND); |
522 | 34 | ALU_CASE_REG(XOR); |
523 | 16 | ALU_CASE_FETCH(ADD); |
524 | 14 | ALU_CASE_FETCH(OR); |
525 | 14 | ALU_CASE_FETCH(AND); |
526 | 17 | ALU_CASE_FETCH(XOR); |
527 | 6 | COMPLEX_CASE(XCHG); |
528 | 10 | COMPLEX_CASE(CMPXCHG); |
529 | 2 | default: // Reached if complex atomic operation is used without fetch modifier |
530 | 2 | return BPF_INS_INVALID; |
531 | 166 | } |
532 | 166 | } |
533 | | |
534 | | /* should be BPF_MEM */ |
535 | 1.04k | switch (BPF_SIZE(opcode)) { |
536 | 277 | CASE(W); |
537 | 78 | CASE(H); |
538 | 322 | CASE(B); |
539 | 371 | CASE(DW); |
540 | 1.04k | } |
541 | | |
542 | 0 | return BPF_INS_INVALID; |
543 | 1.04k | } |
544 | | #undef CASE |
545 | | |
546 | | #define CASE(c) \ |
547 | 2.97k | case BPF_ALU_##c: \ |
548 | 2.97k | CASE_IF(c) |
549 | | |
550 | | #define CASE_IF(c) \ |
551 | 3.51k | do { \ |
552 | 3.51k | if (BPF_CLASS(opcode) == BPF_CLASS_ALU) \ |
553 | 3.51k | return BPF_INS_##c; \ |
554 | 3.51k | else \ |
555 | 3.51k | return BPF_INS_##c##64; \ |
556 | 3.51k | } while (0) |
557 | | |
558 | | static bpf_insn op2insn_alu(unsigned opcode, const uint16_t off, |
559 | | const bool is_ebpf) |
560 | 4.04k | { |
561 | | /* Endian is a special case */ |
562 | 4.04k | if (BPF_OP(opcode) == BPF_ALU_END) { |
563 | 491 | if (BPF_CLASS(opcode) == BPF_CLASS_ALU64) { |
564 | 61 | switch (opcode ^ BPF_CLASS_ALU64 ^ BPF_ALU_END ^ |
565 | 61 | BPF_SRC_LITTLE) { |
566 | 14 | case (16 << 4): |
567 | 14 | return BPF_INS_BSWAP16; |
568 | 35 | case (32 << 4): |
569 | 35 | return BPF_INS_BSWAP32; |
570 | 12 | case (64 << 4): |
571 | 12 | return BPF_INS_BSWAP64; |
572 | 0 | default: |
573 | 0 | return BPF_INS_INVALID; |
574 | 61 | } |
575 | 61 | } |
576 | | |
577 | 430 | switch (opcode ^ BPF_CLASS_ALU ^ BPF_ALU_END) { |
578 | 11 | case BPF_SRC_LITTLE | (16 << 4): |
579 | 11 | return BPF_INS_LE16; |
580 | 3 | case BPF_SRC_LITTLE | (32 << 4): |
581 | 3 | return BPF_INS_LE32; |
582 | 1 | case BPF_SRC_LITTLE | (64 << 4): |
583 | 1 | return BPF_INS_LE64; |
584 | 107 | case BPF_SRC_BIG | (16 << 4): |
585 | 107 | return BPF_INS_BE16; |
586 | 301 | case BPF_SRC_BIG | (32 << 4): |
587 | 301 | return BPF_INS_BE32; |
588 | 7 | case BPF_SRC_BIG | (64 << 4): |
589 | 7 | return BPF_INS_BE64; |
590 | 430 | } |
591 | 0 | return BPF_INS_INVALID; |
592 | 430 | } |
593 | | |
594 | 3.55k | switch (BPF_OP(opcode)) { |
595 | 368 | CASE(ADD); |
596 | 342 | CASE(SUB); |
597 | 233 | CASE(MUL); |
598 | 197 | CASE(OR); |
599 | 349 | CASE(AND); |
600 | 428 | CASE(LSH); |
601 | 402 | CASE(RSH); |
602 | 215 | CASE(NEG); |
603 | 145 | CASE(XOR); |
604 | 292 | CASE(ARSH); |
605 | 197 | case BPF_ALU_DIV: |
606 | 197 | if (!is_ebpf || off == 0) |
607 | 178 | CASE_IF(DIV); |
608 | 19 | else if (off == 1) |
609 | 14 | CASE_IF(SDIV); |
610 | 5 | else |
611 | 5 | return BPF_INS_INVALID; |
612 | 258 | case BPF_ALU_MOD: |
613 | 258 | if (!is_ebpf || off == 0) |
614 | 232 | CASE_IF(MOD); |
615 | 26 | else if (off == 1) |
616 | 19 | CASE_IF(SMOD); |
617 | 7 | else |
618 | 7 | return BPF_INS_INVALID; |
619 | 127 | case BPF_ALU_MOV: |
620 | | /* BPF_CLASS_ALU can have: mov, mov8s, mov16s |
621 | | * BPF_CLASS_ALU64 can have: mov, mov8s, mov16s, mov32s |
622 | | * */ |
623 | 127 | if (off == 0) |
624 | 62 | CASE_IF(MOV); |
625 | 65 | else if (off == 8) |
626 | 5 | CASE_IF(MOVSB); |
627 | 60 | else if (off == 16) |
628 | 37 | CASE_IF(MOVSH); |
629 | 23 | else if (off == 32 && BPF_CLASS(opcode) == BPF_CLASS_ALU64) |
630 | 10 | return BPF_INS_MOVSW64; |
631 | 13 | else |
632 | 13 | return BPF_INS_INVALID; |
633 | 3.55k | } |
634 | | |
635 | 0 | return BPF_INS_INVALID; |
636 | 3.55k | } |
637 | | #undef CASE_IF |
638 | | #undef CASE |
639 | | |
640 | 4.30k | #define BPF_CALLX (BPF_CLASS_JMP | BPF_JUMP_CALL | BPF_SRC_X) |
641 | | |
642 | | #define CASE(c) \ |
643 | 3.96k | case BPF_JUMP_##c: \ |
644 | 3.96k | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) \ |
645 | 3.96k | return BPF_INS_##c; \ |
646 | 3.96k | else \ |
647 | 3.96k | return BPF_INS_##c##32; |
648 | | |
649 | | #define SPEC_CASE(c) \ |
650 | 110 | case BPF_JUMP_##c: \ |
651 | 110 | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) \ |
652 | 110 | return BPF_INS_##c; \ |
653 | 110 | else \ |
654 | 110 | return BPF_INS_INVALID; |
655 | | |
656 | | static bpf_insn op2insn_jmp(unsigned opcode) |
657 | 4.30k | { |
658 | 4.30k | if (opcode == BPF_CALLX) { |
659 | 10 | return BPF_INS_CALLX; |
660 | 10 | } |
661 | | |
662 | 4.29k | switch (BPF_OP(opcode)) { |
663 | 217 | case BPF_JUMP_JA: |
664 | 217 | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) |
665 | 119 | return BPF_INS_JA; |
666 | 98 | else |
667 | 98 | return BPF_INS_JAL; |
668 | 315 | CASE(JEQ); |
669 | 351 | CASE(JGT); |
670 | 130 | CASE(JGE); |
671 | 578 | CASE(JSET); |
672 | 489 | CASE(JNE); |
673 | 380 | CASE(JSGT); |
674 | 545 | CASE(JSGE); |
675 | 62 | SPEC_CASE(CALL); |
676 | 48 | SPEC_CASE(EXIT); |
677 | 233 | CASE(JLT); |
678 | 317 | CASE(JLE); |
679 | 368 | CASE(JSLT); |
680 | 261 | CASE(JSLE); |
681 | 4.29k | } |
682 | | |
683 | 0 | return BPF_INS_INVALID; |
684 | 4.29k | } |
685 | | #undef SPEC_CASE |
686 | | #undef CASE |
687 | | #undef BPF_CALLX |
688 | | |
689 | | #ifndef CAPSTONE_DIET |
690 | | |
691 | | static void update_regs_access(MCInst *MI, cs_detail *detail, |
692 | | bpf_insn insn_id, unsigned int opcode) |
693 | 15.4k | { |
694 | 15.4k | if (insn_id == BPF_INS_INVALID) |
695 | 0 | return; |
696 | | /* |
697 | | * In eBPF mode, only these instructions have implicit registers access: |
698 | | * - legacy ld{w,h,b,dw} * // w: r0 |
699 | | * - exit // r: r0 |
700 | | */ |
701 | 15.4k | if (EBPF_MODE(MI->csh->mode)) { |
702 | 11.0k | switch (insn_id) { |
703 | 8.87k | default: |
704 | 8.87k | break; |
705 | 8.87k | case BPF_INS_LDABSW: |
706 | 1.14k | case BPF_INS_LDABSH: |
707 | 1.26k | case BPF_INS_LDABSB: |
708 | 1.38k | case BPF_INS_LDINDW: |
709 | 1.60k | case BPF_INS_LDINDH: |
710 | 1.82k | case BPF_INS_LDINDB: |
711 | 2.14k | case BPF_INS_LDDW: |
712 | 2.14k | if (BPF_MODE(opcode) == BPF_MODE_ABS || |
713 | 2.14k | BPF_MODE(opcode) == BPF_MODE_IND) |
714 | 1.87k | map_add_implicit_write(MI, BPF_REG_R0); |
715 | 2.14k | break; |
716 | 48 | case BPF_INS_EXIT: |
717 | 48 | map_add_implicit_read(MI, BPF_REG_R0); |
718 | 48 | break; |
719 | 11.0k | } |
720 | 11.0k | return; |
721 | 11.0k | } |
722 | | |
723 | | /* cBPF mode */ |
724 | 4.42k | switch (BPF_CLASS(opcode)) { |
725 | 735 | default: |
726 | 735 | break; |
727 | 1.16k | case BPF_CLASS_LD: |
728 | 1.16k | map_add_implicit_write(MI, BPF_REG_A); |
729 | 1.16k | break; |
730 | 467 | case BPF_CLASS_LDX: |
731 | 467 | map_add_implicit_write(MI, BPF_REG_X); |
732 | 467 | break; |
733 | 8 | case BPF_CLASS_ST: |
734 | 8 | map_add_implicit_read(MI, BPF_REG_A); |
735 | 8 | break; |
736 | 15 | case BPF_CLASS_STX: |
737 | 15 | map_add_implicit_read(MI, BPF_REG_X); |
738 | 15 | break; |
739 | 1.26k | case BPF_CLASS_ALU: |
740 | 1.26k | map_add_implicit_read(MI, BPF_REG_A); |
741 | 1.26k | map_add_implicit_write(MI, BPF_REG_A); |
742 | 1.26k | break; |
743 | 718 | case BPF_CLASS_JMP: |
744 | 718 | if (insn_id != BPF_INS_JA) // except the unconditional jump |
745 | 645 | map_add_implicit_read(MI, BPF_REG_A); |
746 | 718 | break; |
747 | | /* case BPF_CLASS_RET: */ |
748 | 47 | case BPF_CLASS_MISC: |
749 | 47 | if (insn_id == BPF_INS_TAX) { |
750 | 10 | map_add_implicit_read(MI, BPF_REG_A); |
751 | 10 | map_add_implicit_write(MI, BPF_REG_X); |
752 | 37 | } else { |
753 | 37 | map_add_implicit_read(MI, BPF_REG_X); |
754 | 37 | map_add_implicit_write(MI, BPF_REG_A); |
755 | 37 | } |
756 | 47 | break; |
757 | 4.42k | } |
758 | 4.42k | } |
759 | | #endif |
760 | | |
761 | | static bool setFinalOpcode(MCInst *MI, const bpf_internal *bpf) |
762 | 15.5k | { |
763 | 15.5k | bpf_insn id = BPF_INS_INVALID; |
764 | 15.5k | #ifndef CAPSTONE_DIET |
765 | 15.5k | cs_detail *detail; |
766 | | |
767 | 15.5k | detail = get_detail(MI); |
768 | 15.5k | #endif |
769 | | |
770 | 15.5k | const uint16_t opcode = bpf->op; |
771 | 15.5k | switch (BPF_CLASS(opcode)) { |
772 | 0 | default: // will never happen |
773 | 0 | break; |
774 | 3.31k | case BPF_CLASS_LD: |
775 | 5.17k | case BPF_CLASS_LDX: |
776 | 5.17k | if (EBPF_MODE(MI->csh->mode)) |
777 | 3.53k | id = op2insn_ld_ebpf(opcode); |
778 | 1.63k | else |
779 | 1.63k | id = op2insn_ld_cbpf(opcode); |
780 | 5.17k | add_group(MI, BPF_GRP_LOAD); |
781 | 5.17k | break; |
782 | 605 | case BPF_CLASS_ST: |
783 | 1.21k | case BPF_CLASS_STX: |
784 | 1.21k | id = op2insn_st(opcode, bpf->k); |
785 | 1.21k | add_group(MI, BPF_GRP_STORE); |
786 | 1.21k | break; |
787 | 2.27k | case BPF_CLASS_ALU: |
788 | 2.27k | id = op2insn_alu(opcode, bpf->offset, EBPF_MODE(MI->csh->mode)); |
789 | 2.27k | add_group(MI, BPF_GRP_ALU); |
790 | 2.27k | break; |
791 | 2.51k | case BPF_CLASS_JMP: |
792 | 2.51k | id = op2insn_jmp(opcode); |
793 | 2.51k | #ifndef CAPSTONE_DIET |
794 | 2.51k | if (id == BPF_INS_CALL || id == BPF_INS_CALLX) |
795 | 72 | add_group(MI, BPF_GRP_CALL); |
796 | 2.44k | else if (id == BPF_INS_EXIT) |
797 | 48 | add_group(MI, BPF_GRP_RETURN); |
798 | 2.39k | else |
799 | 2.39k | add_group(MI, BPF_GRP_JUMP); |
800 | 2.51k | #endif |
801 | 2.51k | break; |
802 | 2.52k | case BPF_CLASS_RET: |
803 | | /* case BPF_CLASS_JMP32: */ |
804 | 2.52k | if (EBPF_MODE(MI->csh->mode)) { |
805 | 1.79k | id = op2insn_jmp(opcode); |
806 | 1.79k | add_group(MI, BPF_GRP_JUMP); |
807 | 1.79k | } else { |
808 | 735 | id = BPF_INS_RET; |
809 | 735 | add_group(MI, BPF_GRP_RETURN); |
810 | 735 | } |
811 | 2.52k | break; |
812 | | // BPF_CLASS_MISC and BPF_CLASS_ALU64 have exactly same value |
813 | 1.81k | case BPF_CLASS_MISC: |
814 | | /* case BPF_CLASS_ALU64: */ |
815 | 1.81k | if (EBPF_MODE(MI->csh->mode)) { |
816 | | // ALU64 in eBPF |
817 | 1.76k | id = op2insn_alu(opcode, bpf->offset, true); |
818 | 1.76k | add_group(MI, BPF_GRP_ALU); |
819 | 1.76k | } else { |
820 | 47 | if (BPF_MISCOP(opcode) == BPF_MISCOP_TXA) |
821 | 37 | id = BPF_INS_TXA; |
822 | 10 | else |
823 | 10 | id = BPF_INS_TAX; |
824 | 47 | add_group(MI, BPF_GRP_MISC); |
825 | 47 | } |
826 | 1.81k | break; |
827 | 15.5k | } |
828 | | |
829 | 15.5k | if (id == BPF_INS_INVALID) |
830 | 28 | return false; |
831 | | |
832 | 15.4k | MCInst_setOpcodePub(MI, id); |
833 | 15.4k | #undef PUSH_GROUP |
834 | | |
835 | 15.4k | #ifndef CAPSTONE_DIET |
836 | 15.4k | if (detail) { |
837 | 15.4k | update_regs_access(MI, detail, id, opcode); |
838 | 15.4k | } |
839 | 15.4k | #endif |
840 | 15.4k | return true; |
841 | 15.5k | } |
842 | | |
843 | | bool BPF_getInstruction(csh ud, const uint8_t *code, size_t code_len, |
844 | | MCInst *instr, uint16_t *size, uint64_t address, |
845 | | void *info) |
846 | 15.9k | { |
847 | 15.9k | bpf_internal *bpf; |
848 | | |
849 | 15.9k | if (EBPF_MODE(instr->csh->mode)) |
850 | 11.4k | bpf = fetch_ebpf(instr, code, code_len); |
851 | 4.54k | else |
852 | 4.54k | bpf = fetch_cbpf(instr, code, code_len); |
853 | 15.9k | if (bpf == NULL) |
854 | 310 | return false; |
855 | 15.6k | if (!getInstruction(instr, bpf) || !setFinalOpcode(instr, bpf)) { |
856 | 192 | cs_mem_free(bpf); |
857 | 192 | return false; |
858 | 192 | } |
859 | 15.4k | MCInst_setOpcode(instr, bpf->op); |
860 | | |
861 | 15.4k | *size = bpf->insn_size; |
862 | 15.4k | cs_mem_free(bpf); |
863 | | |
864 | 15.4k | return true; |
865 | 15.6k | } |
866 | | |
867 | | #endif |