/src/capstonenext/arch/BPF/BPFDisassembler.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* Capstone Disassembly Engine */ |
2 | | /* BPF Backend by david942j <david942j@gmail.com>, 2019 */ |
3 | | /* SPDX-FileCopyrightText: 2024 Roee Toledano <roeetoledano10@gmail.com> */ |
4 | | /* SPDX-License-Identifier: BSD-3 */ |
5 | | |
6 | | #ifdef CAPSTONE_HAS_BPF |
7 | | |
8 | | #include <string.h> |
9 | | #include <stddef.h> // offsetof macro |
10 | | |
11 | | #include "BPFConstants.h" |
12 | | #include "BPFDisassembler.h" |
13 | | #include "BPFMapping.h" |
14 | | #include "../../Mapping.h" |
15 | | #include "../../cs_priv.h" |
16 | | #include "../../utils.h" |
17 | | |
18 | | ///< Malloc bpf_internal, also checks if code_len is large enough. |
19 | | static bpf_internal *alloc_bpf_internal(const size_t code_len) |
20 | 19.3k | { |
21 | 19.3k | bpf_internal *bpf; |
22 | | |
23 | 19.3k | if (code_len < 8) |
24 | 328 | return NULL; |
25 | 18.9k | bpf = cs_mem_malloc(sizeof(bpf_internal)); |
26 | 18.9k | if (bpf == NULL) |
27 | 0 | return NULL; |
28 | | /* default value */ |
29 | 18.9k | bpf->insn_size = 8; |
30 | 18.9k | return bpf; |
31 | 18.9k | } |
32 | | |
33 | | ///< Fetch a cBPF structure from code |
34 | | static bpf_internal *fetch_cbpf(MCInst *instr, const uint8_t *code, |
35 | | const size_t code_len) |
36 | 6.37k | { |
37 | 6.37k | bpf_internal *bpf; |
38 | | |
39 | 6.37k | bpf = alloc_bpf_internal(code_len); |
40 | 6.37k | if (bpf == NULL) |
41 | 87 | return NULL; |
42 | | |
43 | 6.28k | bpf->op = readBytes16(instr, code); |
44 | 6.28k | bpf->jt = code[2]; |
45 | 6.28k | bpf->jf = code[3]; |
46 | 6.28k | bpf->k = readBytes32(instr, code + 4); |
47 | 6.28k | return bpf; |
48 | 6.37k | } |
49 | | |
50 | | ///< Fetch an eBPF structure from code |
51 | | static bpf_internal *fetch_ebpf(MCInst *instr, const uint8_t *code, |
52 | | const size_t code_len) |
53 | 12.9k | { |
54 | 12.9k | bpf_internal *bpf; |
55 | | |
56 | 12.9k | bpf = alloc_bpf_internal(code_len); |
57 | 12.9k | if (bpf == NULL) |
58 | 241 | return NULL; |
59 | | |
60 | 12.6k | bpf->op = (uint16_t)code[0]; |
61 | 12.6k | bpf->dst = code[1] & 0xf; |
62 | 12.6k | bpf->src = (code[1] & 0xf0) >> 4; |
63 | | |
64 | | // eBPF has one 16-byte instruction: BPF_LD | BPF_DW | BPF_IMM, |
65 | | // in this case imm is combined with the next block's imm. |
66 | 12.6k | if (bpf->op == (BPF_CLASS_LD | BPF_SIZE_DW | BPF_MODE_IMM)) { |
67 | 211 | if (code_len < 16) { |
68 | 2 | cs_mem_free(bpf); |
69 | 2 | return NULL; |
70 | 2 | } |
71 | 209 | bpf->k = readBytes32(instr, code + 4) | |
72 | 209 | (((uint64_t)readBytes32(instr, code + 12)) << 32); |
73 | 209 | bpf->insn_size = 16; |
74 | 12.4k | } else { |
75 | 12.4k | bpf->offset = readBytes16(instr, code + 2); |
76 | 12.4k | bpf->k = readBytes32(instr, code + 4); |
77 | 12.4k | } |
78 | 12.6k | return bpf; |
79 | 12.6k | } |
80 | | |
81 | | #define CHECK_READABLE_REG(ud, reg) \ |
82 | 7.86k | do { \ |
83 | 7.86k | if (!((reg) >= BPF_REG_R0 && (reg) <= BPF_REG_R10)) \ |
84 | 7.86k | return false; \ |
85 | 7.86k | } while (0) |
86 | | |
87 | | #define CHECK_WRITEABLE_REG(ud, reg) \ |
88 | 4.66k | do { \ |
89 | 4.66k | if (!((reg) >= BPF_REG_R0 && (reg) < BPF_REG_R10)) \ |
90 | 4.66k | return false; \ |
91 | 4.66k | } while (0) |
92 | | |
93 | | #define CHECK_READABLE_AND_PUSH(ud, MI, r) \ |
94 | 7.86k | do { \ |
95 | 7.86k | CHECK_READABLE_REG(ud, r + BPF_REG_R0); \ |
96 | 7.86k | MCOperand_CreateReg0(MI, r + BPF_REG_R0); \ |
97 | 7.83k | } while (0) |
98 | | |
99 | | #define CHECK_WRITABLE_AND_PUSH(ud, MI, r) \ |
100 | 4.66k | do { \ |
101 | 4.66k | CHECK_WRITEABLE_REG(ud, r + BPF_REG_R0); \ |
102 | 4.66k | MCOperand_CreateReg0(MI, r + BPF_REG_R0); \ |
103 | 4.65k | } while (0) |
104 | | |
105 | | static bool decodeLoad(MCInst *MI, bpf_internal *bpf) |
106 | 4.57k | { |
107 | 4.57k | if (!EBPF_MODE(MI->csh->mode)) { |
108 | | /* |
109 | | * +-----+-----------+--------------------+ |
110 | | * | ldb | [k] | [x+k] | |
111 | | * | ldh | [k] | [x+k] | |
112 | | * +-----+-----------+--------------------+ |
113 | | */ |
114 | 1.93k | if (BPF_SIZE(bpf->op) == BPF_SIZE_DW) |
115 | 4 | return false; |
116 | 1.92k | if (BPF_SIZE(bpf->op) == BPF_SIZE_B || |
117 | 1.92k | BPF_SIZE(bpf->op) == BPF_SIZE_H) { |
118 | | /* no ldx */ |
119 | 685 | if (BPF_CLASS(bpf->op) != BPF_CLASS_LD) |
120 | 1 | return false; |
121 | | /* can only be BPF_ABS and BPF_IND */ |
122 | 684 | if (BPF_MODE(bpf->op) == BPF_MODE_ABS) { |
123 | 357 | MCOperand_CreateImm0(MI, bpf->k); |
124 | 357 | return true; |
125 | 357 | } else if (BPF_MODE(bpf->op) == BPF_MODE_IND) { |
126 | 324 | MCOperand_CreateReg0(MI, BPF_REG_X); |
127 | 324 | MCOperand_CreateImm0(MI, bpf->k); |
128 | 324 | return true; |
129 | 324 | } |
130 | 3 | return false; |
131 | 684 | } |
132 | | /* |
133 | | * +-----+----+------+------+-----+-------+ |
134 | | * | ld | #k | #len | M[k] | [k] | [x+k] | |
135 | | * +-----+----+------+------+-----+-------+ |
136 | | * | ldx | #k | #len | M[k] | 4*([k]&0xf) | |
137 | | * +-----+----+------+------+-------------+ |
138 | | */ |
139 | 1.24k | switch (BPF_MODE(bpf->op)) { |
140 | 386 | default: |
141 | 386 | break; |
142 | 412 | case BPF_MODE_IMM: |
143 | 412 | MCOperand_CreateImm0(MI, bpf->k); |
144 | 412 | return true; |
145 | 247 | case BPF_MODE_LEN: |
146 | 247 | return true; |
147 | 199 | case BPF_MODE_MEM: |
148 | 199 | MCOperand_CreateImm0(MI, bpf->k); |
149 | 199 | return true; |
150 | 1.24k | } |
151 | 386 | if (BPF_CLASS(bpf->op) == BPF_CLASS_LD) { |
152 | 190 | if (BPF_MODE(bpf->op) == BPF_MODE_ABS) { |
153 | 130 | MCOperand_CreateImm0(MI, bpf->k); |
154 | 130 | return true; |
155 | 130 | } else if (BPF_MODE(bpf->op) == BPF_MODE_IND) { |
156 | 59 | MCOperand_CreateReg0(MI, BPF_REG_X); |
157 | 59 | MCOperand_CreateImm0(MI, bpf->k); |
158 | 59 | return true; |
159 | 59 | } |
160 | 196 | } else { /* LDX */ |
161 | 196 | if (BPF_MODE(bpf->op) == BPF_MODE_MSH) { |
162 | 195 | MCOperand_CreateImm0(MI, bpf->k); |
163 | 195 | return true; |
164 | 195 | } |
165 | 196 | } |
166 | 2 | return false; |
167 | 386 | } |
168 | | |
169 | | /* eBPF mode */ |
170 | | /* |
171 | | * - IMM: lddw dst, imm64 |
172 | | * - ABS: ld{w,h,b} [k] |
173 | | * - IND: ld{w,h,b} [src] |
174 | | * - MEM: ldx{w,h,b,dw} dst, [src+off] |
175 | | */ |
176 | 2.64k | if (BPF_CLASS(bpf->op) == BPF_CLASS_LD) { |
177 | 1.81k | switch (BPF_MODE(bpf->op)) { |
178 | 229 | case BPF_MODE_IMM: |
179 | 229 | if (bpf->op != |
180 | 229 | (BPF_CLASS_LD | BPF_SIZE_DW | BPF_MODE_IMM)) |
181 | 20 | return false; |
182 | 209 | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
183 | 208 | MCOperand_CreateImm0(MI, bpf->k); |
184 | 208 | return true; |
185 | 1.16k | case BPF_MODE_ABS: |
186 | 1.16k | MCOperand_CreateImm0(MI, bpf->k); |
187 | 1.16k | return true; |
188 | 410 | case BPF_MODE_IND: |
189 | 410 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
190 | 408 | return true; |
191 | 1.81k | } |
192 | 5 | return false; |
193 | 1.81k | } |
194 | | /* LDX */ |
195 | 830 | if (BPF_MODE(bpf->op) == BPF_MODE_MEM) { |
196 | 820 | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
197 | 819 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
198 | 818 | MCOperand_CreateImm0(MI, bpf->offset); |
199 | 818 | return true; |
200 | 819 | } |
201 | 10 | return false; |
202 | 830 | } |
203 | | |
204 | | static bool decodeStore(MCInst *MI, bpf_internal *bpf) |
205 | 1.42k | { |
206 | | /* in cBPF, only BPF_ST* | BPF_MEM | BPF_W is valid |
207 | | * while in eBPF: |
208 | | * - BPF_STX | BPF_XADD | BPF_{W,DW} |
209 | | * - BPF_ST* | BPF_MEM | BPF_{W,H,B,DW} |
210 | | * are valid |
211 | | */ |
212 | 1.42k | if (!EBPF_MODE(MI->csh->mode)) { |
213 | | /* can only store to M[] */ |
214 | 62 | if (bpf->op != (BPF_CLASS(bpf->op) | BPF_MODE_MEM | BPF_SIZE_W)) |
215 | 8 | return false; |
216 | 54 | MCOperand_CreateImm0(MI, bpf->k); |
217 | 54 | return true; |
218 | 62 | } |
219 | | |
220 | | /* eBPF */ |
221 | 1.36k | if (BPF_MODE(bpf->op) == BPF_MODE_ATOMIC) { |
222 | 270 | if (BPF_CLASS(bpf->op) != BPF_CLASS_STX) |
223 | 2 | return false; |
224 | 268 | if (BPF_SIZE(bpf->op) != BPF_SIZE_W && |
225 | 268 | BPF_SIZE(bpf->op) != BPF_SIZE_DW) |
226 | 1 | return false; |
227 | | /* xadd [dst + off], src */ |
228 | 267 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
229 | 265 | MCOperand_CreateImm0(MI, bpf->offset); |
230 | 265 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
231 | 264 | return true; |
232 | 265 | } |
233 | | |
234 | 1.09k | if (BPF_MODE(bpf->op) != BPF_MODE_MEM) |
235 | 14 | return false; |
236 | | |
237 | | /* st [dst + off], src */ |
238 | 1.07k | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
239 | 1.07k | MCOperand_CreateImm0(MI, bpf->offset); |
240 | 1.07k | if (BPF_CLASS(bpf->op) == BPF_CLASS_ST) |
241 | 592 | MCOperand_CreateImm0(MI, bpf->k); |
242 | 485 | else |
243 | 485 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
244 | 1.07k | return true; |
245 | 1.07k | } |
246 | | |
247 | | static bool decodeALU(MCInst *MI, bpf_internal *bpf) |
248 | 5.83k | { |
249 | | /* Set MI->Operands */ |
250 | | |
251 | | /* cBPF */ |
252 | 5.83k | if (!EBPF_MODE(MI->csh->mode)) { |
253 | 2.15k | if (BPF_OP(bpf->op) > BPF_ALU_XOR) |
254 | 1 | return false; |
255 | | /* cBPF's NEG has no operands */ |
256 | 2.15k | if (BPF_OP(bpf->op) == BPF_ALU_NEG) |
257 | 194 | return true; |
258 | 1.96k | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
259 | 855 | MCOperand_CreateImm0(MI, bpf->k); |
260 | 1.10k | else /* BPF_SRC_X */ |
261 | 1.10k | MCOperand_CreateReg0(MI, BPF_REG_X); |
262 | 1.96k | return true; |
263 | 2.15k | } |
264 | | |
265 | | /* eBPF */ |
266 | | |
267 | 3.67k | if (BPF_OP(bpf->op) > BPF_ALU_END) |
268 | 4 | return false; |
269 | | /* ENDian's imm must be one of 16, 32, 64 */ |
270 | 3.67k | if (BPF_OP(bpf->op) == BPF_ALU_END) { |
271 | 659 | if (bpf->k != 16 && bpf->k != 32 && bpf->k != 64) |
272 | 35 | return false; |
273 | 624 | if (BPF_CLASS(bpf->op) == BPF_CLASS_ALU64 && |
274 | 624 | BPF_SRC(bpf->op) != BPF_SRC_LITTLE) |
275 | 2 | return false; |
276 | 624 | } |
277 | | |
278 | | /* - op dst, imm |
279 | | * - op dst, src |
280 | | * - neg dst |
281 | | * - le<imm> dst |
282 | | */ |
283 | | /* every ALU instructions have dst op */ |
284 | 3.63k | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
285 | | |
286 | | /* special cases */ |
287 | 3.63k | if (BPF_OP(bpf->op) == BPF_ALU_NEG) |
288 | 352 | return true; |
289 | 3.28k | if (BPF_OP(bpf->op) == BPF_ALU_END) { |
290 | | /* bpf->k must be one of 16, 32, 64 */ |
291 | 622 | bpf->op |= ((uint32_t)bpf->k << 4); |
292 | 622 | return true; |
293 | 622 | } |
294 | | |
295 | | /* normal cases */ |
296 | 2.65k | if (BPF_SRC(bpf->op) == BPF_SRC_K) { |
297 | 2.37k | MCOperand_CreateImm0(MI, bpf->k); |
298 | 2.37k | } else { /* BPF_SRC_X */ |
299 | 282 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
300 | 282 | } |
301 | 2.65k | return true; |
302 | 2.65k | } |
303 | | |
304 | | static bool decodeJump(MCInst *MI, bpf_internal *bpf) |
305 | 6.26k | { |
306 | | /* cBPF and eBPF are very different in class jump */ |
307 | 6.26k | if (!EBPF_MODE(MI->csh->mode)) { |
308 | 1.25k | if (BPF_OP(bpf->op) > BPF_JUMP_JSET) |
309 | 3 | return false; |
310 | | |
311 | | /* ja is a special case of jumps */ |
312 | 1.24k | if (BPF_OP(bpf->op) == BPF_JUMP_JA) { |
313 | 92 | MCOperand_CreateImm0(MI, bpf->k); |
314 | 92 | return true; |
315 | 92 | } |
316 | | |
317 | 1.15k | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
318 | 794 | MCOperand_CreateImm0(MI, bpf->k); |
319 | 361 | else /* BPF_SRC_X */ |
320 | 361 | MCOperand_CreateReg0(MI, BPF_REG_X); |
321 | 1.15k | MCOperand_CreateImm0(MI, bpf->jt); |
322 | 1.15k | MCOperand_CreateImm0(MI, bpf->jf); |
323 | 5.01k | } else { |
324 | 5.01k | if (BPF_OP(bpf->op) > BPF_JUMP_JSLE) |
325 | 1 | return false; |
326 | | |
327 | | /* JMP32 has no CALL/EXIT instruction */ |
328 | | /* No operands for exit */ |
329 | 5.01k | if (BPF_OP(bpf->op) == BPF_JUMP_EXIT) |
330 | 221 | return bpf->op == (BPF_CLASS_JMP | BPF_JUMP_EXIT); |
331 | 4.79k | if (BPF_OP(bpf->op) == BPF_JUMP_CALL) { |
332 | 243 | if (bpf->op == (BPF_CLASS_JMP | BPF_JUMP_CALL)) { |
333 | 211 | MCOperand_CreateImm0(MI, bpf->k); |
334 | 211 | return true; |
335 | 211 | } |
336 | 32 | if (bpf->op == |
337 | 32 | (BPF_CLASS_JMP | BPF_JUMP_CALL | BPF_SRC_X)) { |
338 | 31 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->k); |
339 | 10 | return true; |
340 | 31 | } |
341 | 1 | return false; |
342 | 32 | } |
343 | | |
344 | | /* ja is a special case of jumps */ |
345 | 4.54k | if (BPF_OP(bpf->op) == BPF_JUMP_JA) { |
346 | 425 | if (BPF_SRC(bpf->op) != BPF_SRC_K) |
347 | 1 | return false; |
348 | 424 | if (BPF_CLASS(bpf->op) == BPF_CLASS_JMP) |
349 | 213 | MCOperand_CreateImm0(MI, bpf->offset); |
350 | 211 | else |
351 | 211 | MCOperand_CreateImm0(MI, bpf->k); |
352 | | |
353 | 424 | return true; |
354 | 425 | } |
355 | | |
356 | | /* <j> dst, src, +off */ |
357 | 4.12k | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
358 | 4.12k | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
359 | 4.01k | MCOperand_CreateImm0(MI, bpf->k); |
360 | 108 | else |
361 | 108 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
362 | 4.11k | MCOperand_CreateImm0(MI, bpf->offset); |
363 | 4.11k | } |
364 | 5.27k | return true; |
365 | 6.26k | } |
366 | | |
367 | | static bool decodeReturn(MCInst *MI, bpf_internal *bpf) |
368 | 799 | { |
369 | | /* Here only handles the BPF_RET class in cBPF */ |
370 | 799 | switch (BPF_RVAL(bpf->op)) { |
371 | 225 | case BPF_SRC_K: |
372 | 225 | MCOperand_CreateImm0(MI, bpf->k); |
373 | 225 | return true; |
374 | 247 | case BPF_SRC_X: |
375 | 247 | MCOperand_CreateReg0(MI, BPF_REG_X); |
376 | 247 | return true; |
377 | 326 | case BPF_SRC_A: |
378 | 326 | MCOperand_CreateReg0(MI, BPF_REG_A); |
379 | 326 | return true; |
380 | 799 | } |
381 | 1 | return false; |
382 | 799 | } |
383 | | |
384 | | static bool decodeMISC(MCInst *MI, bpf_internal *bpf) |
385 | 89 | { |
386 | 89 | uint16_t op = bpf->op ^ BPF_CLASS_MISC; |
387 | 89 | return op == BPF_MISCOP_TAX || op == BPF_MISCOP_TXA; |
388 | 89 | } |
389 | | |
390 | | ///< 1. Check if the instruction is valid |
391 | | ///< 2. Set MI->opcode |
392 | | ///< 3. Set MI->Operands |
393 | | static bool getInstruction(MCInst *MI, bpf_internal *bpf) |
394 | 18.9k | { |
395 | 18.9k | cs_detail *detail; |
396 | | |
397 | 18.9k | detail = MI->flat_insn->detail; |
398 | | // initialize detail |
399 | 18.9k | if (detail) { |
400 | 18.9k | memset(detail, 0, offsetof(cs_detail, bpf) + sizeof(cs_bpf)); |
401 | 18.9k | } |
402 | | |
403 | 18.9k | MCInst_clear(MI); |
404 | | |
405 | 18.9k | switch (BPF_CLASS(bpf->op)) { |
406 | 0 | default: /* should never happen */ |
407 | 0 | return false; |
408 | 3.29k | case BPF_CLASS_LD: |
409 | 4.57k | case BPF_CLASS_LDX: |
410 | 4.57k | return decodeLoad(MI, bpf); |
411 | 645 | case BPF_CLASS_ST: |
412 | 1.42k | case BPF_CLASS_STX: |
413 | 1.42k | return decodeStore(MI, bpf); |
414 | 3.55k | case BPF_CLASS_ALU: |
415 | 3.55k | return decodeALU(MI, bpf); |
416 | 3.84k | case BPF_CLASS_JMP: |
417 | 3.84k | return decodeJump(MI, bpf); |
418 | 3.21k | case BPF_CLASS_RET: |
419 | | /* case BPF_CLASS_JMP32: */ |
420 | 3.21k | if (EBPF_MODE(MI->csh->mode)) |
421 | 2.41k | return decodeJump(MI, bpf); |
422 | 799 | else |
423 | 799 | return decodeReturn(MI, bpf); |
424 | 2.37k | case BPF_CLASS_MISC: |
425 | | /* case BPF_CLASS_ALU64: */ |
426 | 2.37k | if (EBPF_MODE(MI->csh->mode)) |
427 | 2.28k | return decodeALU(MI, bpf); |
428 | 89 | else |
429 | 89 | return decodeMISC(MI, bpf); |
430 | 18.9k | } |
431 | 18.9k | } |
432 | | |
433 | | // Check for regular load instructions |
434 | | #define REG_LOAD_CASE(c) \ |
435 | 3.18k | case BPF_SIZE_##c: \ |
436 | 3.18k | if (BPF_CLASS(opcode) == BPF_CLASS_LD) \ |
437 | 3.18k | return BPF_INS_LD##c; \ |
438 | 3.18k | else \ |
439 | 3.18k | return BPF_INS_LDX##c; |
440 | | |
441 | | static bpf_insn op2insn_ld_cbpf(unsigned opcode) |
442 | 3.18k | { |
443 | 3.18k | switch (BPF_SIZE(opcode)) { |
444 | 1.46k | REG_LOAD_CASE(W); |
445 | 461 | REG_LOAD_CASE(H); |
446 | 624 | REG_LOAD_CASE(B); |
447 | 635 | REG_LOAD_CASE(DW); |
448 | 3.18k | } |
449 | | |
450 | 0 | return BPF_INS_INVALID; |
451 | 3.18k | } |
452 | | #undef REG_LOAD_CASE |
453 | | |
454 | | // Check for packet load instructions |
455 | | #define PACKET_LOAD_CASE(c) \ |
456 | 1.34k | case BPF_SIZE_##c: \ |
457 | 1.34k | if (BPF_MODE(opcode) == BPF_MODE_ABS) \ |
458 | 1.34k | return BPF_INS_LDABS##c; \ |
459 | 1.34k | else if (BPF_MODE(opcode) == BPF_MODE_IND) \ |
460 | 370 | return BPF_INS_LDIND##c; \ |
461 | 370 | else \ |
462 | 370 | return BPF_INS_INVALID; |
463 | | |
464 | | static bpf_insn op2insn_ld_ebpf(unsigned opcode) |
465 | 2.60k | { |
466 | 2.60k | if (BPF_CLASS(opcode) == BPF_CLASS_LD) { |
467 | 1.78k | switch (BPF_SIZE(opcode)) { |
468 | 541 | PACKET_LOAD_CASE(W); |
469 | 617 | PACKET_LOAD_CASE(H); |
470 | 182 | PACKET_LOAD_CASE(B); |
471 | 1.78k | } |
472 | 1.78k | } |
473 | | |
474 | | // If it's not a packet load instruction, it must be a regular load instruction |
475 | 1.26k | return op2insn_ld_cbpf(opcode); |
476 | 2.60k | } |
477 | | #undef PACKET_LOAD_CASE |
478 | | |
479 | | /* During parsing we already checked to make sure the size is D/DW and |
480 | | * mode is STX and not ST, so we don't need to check again*/ |
481 | | #define ALU_CASE_REG(c) \ |
482 | 119 | case BPF_ALU_##c: \ |
483 | 119 | if (BPF_SIZE(opcode) == BPF_SIZE_W) \ |
484 | 119 | return BPF_INS_A##c; \ |
485 | 119 | else \ |
486 | 119 | return BPF_INS_A##c##64; |
487 | | |
488 | | #define ALU_CASE_FETCH(c) \ |
489 | 113 | case BPF_ALU_##c | BPF_MODE_FETCH: \ |
490 | 113 | if (BPF_SIZE(opcode) == BPF_SIZE_W) \ |
491 | 113 | return BPF_INS_AF##c; \ |
492 | 113 | else \ |
493 | 113 | return BPF_INS_AF##c##64; |
494 | | |
495 | | #define COMPLEX_CASE(c) \ |
496 | 22 | case BPF_ATOMIC_##c | BPF_MODE_FETCH: \ |
497 | 22 | if (BPF_SIZE(opcode) == BPF_SIZE_DW) \ |
498 | 22 | return BPF_INS_A##c##64; \ |
499 | 22 | else \ |
500 | 22 | return BPF_INS_INVALID; |
501 | | |
502 | | #define CASE(c) \ |
503 | 1.13k | case BPF_SIZE_##c: \ |
504 | 1.13k | if (BPF_CLASS(opcode) == BPF_CLASS_ST) \ |
505 | 1.13k | return BPF_INS_ST##c; \ |
506 | 1.13k | else \ |
507 | 1.13k | return BPF_INS_STX##c; |
508 | | |
509 | | static bpf_insn op2insn_st(unsigned opcode, const uint32_t imm) |
510 | 1.39k | { |
511 | | /* |
512 | | * - BPF_STX | ALU atomic operations | BPF_{W,DW} |
513 | | * - BPF_STX | Complex atomic operations | BPF_{DW} |
514 | | * - BPF_ST* | BPF_MEM | BPF_{W,H,B,DW} |
515 | | */ |
516 | | |
517 | 1.39k | if (BPF_MODE(opcode) == BPF_MODE_ATOMIC) { |
518 | 264 | switch (imm) { |
519 | 21 | ALU_CASE_REG(ADD); |
520 | 20 | ALU_CASE_REG(OR); |
521 | 34 | ALU_CASE_REG(AND); |
522 | 44 | ALU_CASE_REG(XOR); |
523 | 20 | ALU_CASE_FETCH(ADD); |
524 | 28 | ALU_CASE_FETCH(OR); |
525 | 45 | ALU_CASE_FETCH(AND); |
526 | 20 | ALU_CASE_FETCH(XOR); |
527 | 11 | COMPLEX_CASE(XCHG); |
528 | 11 | COMPLEX_CASE(CMPXCHG); |
529 | 10 | default: // Reached if complex atomic operation is used without fetch modifier |
530 | 10 | return BPF_INS_INVALID; |
531 | 264 | } |
532 | 264 | } |
533 | | |
534 | | /* should be BPF_MEM */ |
535 | 1.13k | switch (BPF_SIZE(opcode)) { |
536 | 331 | CASE(W); |
537 | 113 | CASE(H); |
538 | 284 | CASE(B); |
539 | 402 | CASE(DW); |
540 | 1.13k | } |
541 | | |
542 | 0 | return BPF_INS_INVALID; |
543 | 1.13k | } |
544 | | #undef CASE |
545 | | |
546 | | #define CASE(c) \ |
547 | 4.44k | case BPF_ALU_##c: \ |
548 | 4.44k | CASE_IF(c) |
549 | | |
550 | | #define CASE_IF(c) \ |
551 | 5.10k | do { \ |
552 | 5.10k | if (BPF_CLASS(opcode) == BPF_CLASS_ALU) \ |
553 | 5.10k | return BPF_INS_##c; \ |
554 | 5.10k | else \ |
555 | 5.10k | return BPF_INS_##c##64; \ |
556 | 5.10k | } while (0) |
557 | | |
558 | | static bpf_insn op2insn_alu(unsigned opcode, const uint16_t off, |
559 | | const bool is_ebpf) |
560 | 5.78k | { |
561 | | /* Endian is a special case */ |
562 | 5.78k | if (BPF_OP(opcode) == BPF_ALU_END) { |
563 | 622 | if (BPF_CLASS(opcode) == BPF_CLASS_ALU64) { |
564 | 128 | switch (opcode ^ BPF_CLASS_ALU64 ^ BPF_ALU_END ^ |
565 | 128 | BPF_SRC_LITTLE) { |
566 | 30 | case (16 << 4): |
567 | 30 | return BPF_INS_BSWAP16; |
568 | 77 | case (32 << 4): |
569 | 77 | return BPF_INS_BSWAP32; |
570 | 21 | case (64 << 4): |
571 | 21 | return BPF_INS_BSWAP64; |
572 | 0 | default: |
573 | 0 | return BPF_INS_INVALID; |
574 | 128 | } |
575 | 128 | } |
576 | | |
577 | 494 | switch (opcode ^ BPF_CLASS_ALU ^ BPF_ALU_END) { |
578 | 18 | case BPF_SRC_LITTLE | (16 << 4): |
579 | 18 | return BPF_INS_LE16; |
580 | 10 | case BPF_SRC_LITTLE | (32 << 4): |
581 | 10 | return BPF_INS_LE32; |
582 | 3 | case BPF_SRC_LITTLE | (64 << 4): |
583 | 3 | return BPF_INS_LE64; |
584 | 124 | case BPF_SRC_BIG | (16 << 4): |
585 | 124 | return BPF_INS_BE16; |
586 | 329 | case BPF_SRC_BIG | (32 << 4): |
587 | 329 | return BPF_INS_BE32; |
588 | 10 | case BPF_SRC_BIG | (64 << 4): |
589 | 10 | return BPF_INS_BE64; |
590 | 494 | } |
591 | 0 | return BPF_INS_INVALID; |
592 | 494 | } |
593 | | |
594 | 5.16k | switch (BPF_OP(opcode)) { |
595 | 413 | CASE(ADD); |
596 | 454 | CASE(SUB); |
597 | 425 | CASE(MUL); |
598 | 480 | CASE(OR); |
599 | 424 | CASE(AND); |
600 | 453 | CASE(LSH); |
601 | 535 | CASE(RSH); |
602 | 546 | CASE(NEG); |
603 | 294 | CASE(XOR); |
604 | 420 | CASE(ARSH); |
605 | 265 | case BPF_ALU_DIV: |
606 | 265 | if (!is_ebpf || off == 0) |
607 | 224 | CASE_IF(DIV); |
608 | 41 | else if (off == 1) |
609 | 28 | CASE_IF(SDIV); |
610 | 13 | else |
611 | 13 | return BPF_INS_INVALID; |
612 | 278 | case BPF_ALU_MOD: |
613 | 278 | if (!is_ebpf || off == 0) |
614 | 224 | CASE_IF(MOD); |
615 | 54 | else if (off == 1) |
616 | 46 | CASE_IF(SMOD); |
617 | 8 | else |
618 | 8 | return BPF_INS_INVALID; |
619 | 177 | case BPF_ALU_MOV: |
620 | | /* BPF_CLASS_ALU can have: mov, mov8s, mov16s |
621 | | * BPF_CLASS_ALU64 can have: mov, mov8s, mov16s, mov32s |
622 | | * */ |
623 | 177 | if (off == 0) |
624 | 87 | CASE_IF(MOV); |
625 | 90 | else if (off == 8) |
626 | 20 | CASE_IF(MOVSB); |
627 | 70 | else if (off == 16) |
628 | 36 | CASE_IF(MOVSH); |
629 | 34 | else if (off == 32 && BPF_CLASS(opcode) == BPF_CLASS_ALU64) |
630 | 18 | return BPF_INS_MOVSW64; |
631 | 16 | else |
632 | 16 | return BPF_INS_INVALID; |
633 | 5.16k | } |
634 | | |
635 | 0 | return BPF_INS_INVALID; |
636 | 5.16k | } |
637 | | #undef CASE_IF |
638 | | #undef CASE |
639 | | |
640 | 6.23k | #define BPF_CALLX (BPF_CLASS_JMP | BPF_JUMP_CALL | BPF_SRC_X) |
641 | | |
642 | | #define CASE(c) \ |
643 | 5.27k | case BPF_JUMP_##c: \ |
644 | 5.27k | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) \ |
645 | 5.27k | return BPF_INS_##c; \ |
646 | 5.27k | else \ |
647 | 5.27k | return BPF_INS_##c##32; |
648 | | |
649 | | #define SPEC_CASE(c) \ |
650 | 430 | case BPF_JUMP_##c: \ |
651 | 430 | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) \ |
652 | 430 | return BPF_INS_##c; \ |
653 | 430 | else \ |
654 | 430 | return BPF_INS_INVALID; |
655 | | |
656 | | static bpf_insn op2insn_jmp(unsigned opcode) |
657 | 6.23k | { |
658 | 6.23k | if (opcode == BPF_CALLX) { |
659 | 10 | return BPF_INS_CALLX; |
660 | 10 | } |
661 | | |
662 | 6.22k | switch (BPF_OP(opcode)) { |
663 | 516 | case BPF_JUMP_JA: |
664 | 516 | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) |
665 | 305 | return BPF_INS_JA; |
666 | 211 | else |
667 | 211 | return BPF_INS_JAL; |
668 | 706 | CASE(JEQ); |
669 | 323 | CASE(JGT); |
670 | 350 | CASE(JGE); |
671 | 578 | CASE(JSET); |
672 | 396 | CASE(JNE); |
673 | 487 | CASE(JSGT); |
674 | 539 | CASE(JSGE); |
675 | 211 | SPEC_CASE(CALL); |
676 | 219 | SPEC_CASE(EXIT); |
677 | 426 | CASE(JLT); |
678 | 588 | CASE(JLE); |
679 | 453 | CASE(JSLT); |
680 | 428 | CASE(JSLE); |
681 | 6.22k | } |
682 | | |
683 | 0 | return BPF_INS_INVALID; |
684 | 6.22k | } |
685 | | #undef SPEC_CASE |
686 | | #undef CASE |
687 | | #undef BPF_CALLX |
688 | | |
689 | | #ifndef CAPSTONE_DIET |
690 | | |
691 | | static void update_regs_access(MCInst *MI, cs_detail *detail, |
692 | | bpf_insn insn_id, unsigned int opcode) |
693 | 18.7k | { |
694 | 18.7k | if (insn_id == BPF_INS_INVALID) |
695 | 0 | return; |
696 | | /* |
697 | | * In eBPF mode, only these instructions have implicit registers access: |
698 | | * - legacy ld{w,h,b,dw} * // w: r0 |
699 | | * - exit // r: r0 |
700 | | */ |
701 | 18.7k | if (EBPF_MODE(MI->csh->mode)) { |
702 | 12.5k | switch (insn_id) { |
703 | 10.5k | default: |
704 | 10.5k | break; |
705 | 10.5k | case BPF_INS_LDABSW: |
706 | 860 | case BPF_INS_LDABSH: |
707 | 970 | case BPF_INS_LDABSB: |
708 | 1.06k | case BPF_INS_LDINDW: |
709 | 1.26k | case BPF_INS_LDINDH: |
710 | 1.34k | case BPF_INS_LDINDB: |
711 | 1.78k | case BPF_INS_LDDW: |
712 | 1.78k | if (BPF_MODE(opcode) == BPF_MODE_ABS || |
713 | 1.78k | BPF_MODE(opcode) == BPF_MODE_IND) |
714 | 1.57k | map_add_implicit_write(MI, BPF_REG_R0); |
715 | 1.78k | break; |
716 | 219 | case BPF_INS_EXIT: |
717 | 219 | map_add_implicit_read(MI, BPF_REG_R0); |
718 | 219 | break; |
719 | 12.5k | } |
720 | 12.5k | return; |
721 | 12.5k | } |
722 | | |
723 | | /* cBPF mode */ |
724 | 6.25k | switch (BPF_CLASS(opcode)) { |
725 | 798 | default: |
726 | 798 | break; |
727 | 1.48k | case BPF_CLASS_LD: |
728 | 1.48k | map_add_implicit_write(MI, BPF_REG_A); |
729 | 1.48k | break; |
730 | 441 | case BPF_CLASS_LDX: |
731 | 441 | map_add_implicit_write(MI, BPF_REG_X); |
732 | 441 | break; |
733 | 36 | case BPF_CLASS_ST: |
734 | 36 | map_add_implicit_read(MI, BPF_REG_A); |
735 | 36 | break; |
736 | 18 | case BPF_CLASS_STX: |
737 | 18 | map_add_implicit_read(MI, BPF_REG_X); |
738 | 18 | break; |
739 | 2.15k | case BPF_CLASS_ALU: |
740 | 2.15k | map_add_implicit_read(MI, BPF_REG_A); |
741 | 2.15k | map_add_implicit_write(MI, BPF_REG_A); |
742 | 2.15k | break; |
743 | 1.24k | case BPF_CLASS_JMP: |
744 | 1.24k | if (insn_id != BPF_INS_JA) // except the unconditional jump |
745 | 1.15k | map_add_implicit_read(MI, BPF_REG_A); |
746 | 1.24k | break; |
747 | | /* case BPF_CLASS_RET: */ |
748 | 79 | case BPF_CLASS_MISC: |
749 | 79 | if (insn_id == BPF_INS_TAX) { |
750 | 41 | map_add_implicit_read(MI, BPF_REG_A); |
751 | 41 | map_add_implicit_write(MI, BPF_REG_X); |
752 | 41 | } else { |
753 | 38 | map_add_implicit_read(MI, BPF_REG_X); |
754 | 38 | map_add_implicit_write(MI, BPF_REG_A); |
755 | 38 | } |
756 | 79 | break; |
757 | 6.25k | } |
758 | 6.25k | } |
759 | | #endif |
760 | | |
761 | | static bool setFinalOpcode(MCInst *MI, const bpf_internal *bpf) |
762 | 18.8k | { |
763 | 18.8k | bpf_insn id = BPF_INS_INVALID; |
764 | 18.8k | #ifndef CAPSTONE_DIET |
765 | 18.8k | cs_detail *detail; |
766 | | |
767 | 18.8k | detail = get_detail(MI); |
768 | 18.8k | #endif |
769 | | |
770 | 18.8k | const uint16_t opcode = bpf->op; |
771 | 18.8k | switch (BPF_CLASS(opcode)) { |
772 | 0 | default: // will never happen |
773 | 0 | break; |
774 | 3.26k | case BPF_CLASS_LD: |
775 | 4.52k | case BPF_CLASS_LDX: |
776 | 4.52k | if (EBPF_MODE(MI->csh->mode)) |
777 | 2.60k | id = op2insn_ld_ebpf(opcode); |
778 | 1.92k | else |
779 | 1.92k | id = op2insn_ld_cbpf(opcode); |
780 | 4.52k | add_group(MI, BPF_GRP_LOAD); |
781 | 4.52k | break; |
782 | 628 | case BPF_CLASS_ST: |
783 | 1.39k | case BPF_CLASS_STX: |
784 | 1.39k | id = op2insn_st(opcode, bpf->k); |
785 | 1.39k | add_group(MI, BPF_GRP_STORE); |
786 | 1.39k | break; |
787 | 3.53k | case BPF_CLASS_ALU: |
788 | 3.53k | id = op2insn_alu(opcode, bpf->offset, EBPF_MODE(MI->csh->mode)); |
789 | 3.53k | add_group(MI, BPF_GRP_ALU); |
790 | 3.53k | break; |
791 | 3.82k | case BPF_CLASS_JMP: |
792 | 3.82k | id = op2insn_jmp(opcode); |
793 | 3.82k | #ifndef CAPSTONE_DIET |
794 | 3.82k | if (id == BPF_INS_CALL || id == BPF_INS_CALLX) |
795 | 221 | add_group(MI, BPF_GRP_CALL); |
796 | 3.60k | else if (id == BPF_INS_EXIT) |
797 | 219 | add_group(MI, BPF_GRP_RETURN); |
798 | 3.38k | else |
799 | 3.38k | add_group(MI, BPF_GRP_JUMP); |
800 | 3.82k | #endif |
801 | 3.82k | break; |
802 | 3.20k | case BPF_CLASS_RET: |
803 | | /* case BPF_CLASS_JMP32: */ |
804 | 3.20k | if (EBPF_MODE(MI->csh->mode)) { |
805 | 2.40k | id = op2insn_jmp(opcode); |
806 | 2.40k | add_group(MI, BPF_GRP_JUMP); |
807 | 2.40k | } else { |
808 | 798 | id = BPF_INS_RET; |
809 | 798 | add_group(MI, BPF_GRP_RETURN); |
810 | 798 | } |
811 | 3.20k | break; |
812 | | // BPF_CLASS_MISC and BPF_CLASS_ALU64 have exactly same value |
813 | 2.32k | case BPF_CLASS_MISC: |
814 | | /* case BPF_CLASS_ALU64: */ |
815 | 2.32k | if (EBPF_MODE(MI->csh->mode)) { |
816 | | // ALU64 in eBPF |
817 | 2.24k | id = op2insn_alu(opcode, bpf->offset, true); |
818 | 2.24k | add_group(MI, BPF_GRP_ALU); |
819 | 2.24k | } else { |
820 | 79 | if (BPF_MISCOP(opcode) == BPF_MISCOP_TXA) |
821 | 38 | id = BPF_INS_TXA; |
822 | 41 | else |
823 | 41 | id = BPF_INS_TAX; |
824 | 79 | add_group(MI, BPF_GRP_MISC); |
825 | 79 | } |
826 | 2.32k | break; |
827 | 18.8k | } |
828 | | |
829 | 18.8k | if (id == BPF_INS_INVALID) |
830 | 49 | return false; |
831 | | |
832 | 18.7k | MCInst_setOpcodePub(MI, id); |
833 | 18.7k | #undef PUSH_GROUP |
834 | | |
835 | 18.7k | #ifndef CAPSTONE_DIET |
836 | 18.7k | if (detail) { |
837 | 18.7k | update_regs_access(MI, detail, id, opcode); |
838 | 18.7k | } |
839 | 18.7k | #endif |
840 | 18.7k | return true; |
841 | 18.8k | } |
842 | | |
843 | | bool BPF_getInstruction(csh ud, const uint8_t *code, size_t code_len, |
844 | | MCInst *instr, uint16_t *size, uint64_t address, |
845 | | void *info) |
846 | 19.3k | { |
847 | 19.3k | bpf_internal *bpf; |
848 | | |
849 | 19.3k | if (EBPF_MODE(instr->csh->mode)) |
850 | 12.9k | bpf = fetch_ebpf(instr, code, code_len); |
851 | 6.37k | else |
852 | 6.37k | bpf = fetch_cbpf(instr, code, code_len); |
853 | 19.3k | if (bpf == NULL) |
854 | 330 | return false; |
855 | 18.9k | if (!getInstruction(instr, bpf) || !setFinalOpcode(instr, bpf)) { |
856 | 222 | cs_mem_free(bpf); |
857 | 222 | return false; |
858 | 222 | } |
859 | 18.7k | MCInst_setOpcode(instr, bpf->op); |
860 | | |
861 | 18.7k | *size = bpf->insn_size; |
862 | 18.7k | cs_mem_free(bpf); |
863 | | |
864 | 18.7k | return true; |
865 | 18.9k | } |
866 | | |
867 | | #endif |