Coverage Report

Created: 2025-07-18 06:43

/src/capstonenext/arch/BPF/BPFInstPrinter.c
Line
Count
Source (jump to first uncovered line)
1
/* Capstone Disassembly Engine */
2
/* BPF Backend by david942j <david942j@gmail.com>, 2019 */
3
/* SPDX-FileCopyrightText: 2024 Roee Toledano <roeetoledano10@gmail.com> */
4
/* SPDX-License-Identifier: BSD-3 */
5
6
#include <capstone/platform.h>
7
8
#include "BPFConstants.h"
9
#include "BPFInstPrinter.h"
10
#include "BPFMapping.h"
11
#include "../../Mapping.h"
12
13
static cs_bpf_op *expand_bpf_operands(cs_bpf *bpf)
14
32.7k
{
15
32.7k
  assert(bpf->op_count < 3);
16
32.7k
  return &bpf->operands[bpf->op_count++];
17
32.7k
}
18
19
static void push_op_reg(cs_bpf *bpf, bpf_op_type val, uint8_t ac_mode)
20
10.6k
{
21
10.6k
  cs_bpf_op *op = expand_bpf_operands(bpf);
22
23
10.6k
  op->type = BPF_OP_REG;
24
10.6k
  op->reg = val;
25
10.6k
  op->access = ac_mode;
26
10.6k
}
27
28
static void push_op_imm(cs_bpf *bpf, uint64_t val, const bool is_signed)
29
9.99k
{
30
9.99k
  cs_bpf_op *op = expand_bpf_operands(bpf);
31
32
9.99k
  op->type = BPF_OP_IMM;
33
9.99k
  op->imm = val;
34
9.99k
  op->is_signed = is_signed;
35
9.99k
}
36
37
static void push_op_off(cs_bpf *bpf, uint32_t val, const bool is_signed)
38
6.06k
{
39
6.06k
  cs_bpf_op *op = expand_bpf_operands(bpf);
40
41
6.06k
  op->type = BPF_OP_OFF;
42
6.06k
  op->off = val;
43
6.06k
  op->is_signed = is_signed;
44
6.06k
}
45
46
static void push_op_mem(cs_bpf *bpf, bpf_reg reg, uint32_t val,
47
      const bool is_signed, const bool is_pkt)
48
5.20k
{
49
5.20k
  cs_bpf_op *op = expand_bpf_operands(bpf);
50
51
5.20k
  op->type = BPF_OP_MEM;
52
5.20k
  op->mem.base = reg;
53
5.20k
  op->mem.disp = val;
54
5.20k
  op->is_signed = is_signed;
55
5.20k
  op->is_pkt = is_pkt;
56
5.20k
}
57
58
static void push_op_mmem(cs_bpf *bpf, uint32_t val)
59
397
{
60
397
  cs_bpf_op *op = expand_bpf_operands(bpf);
61
62
397
  op->type = BPF_OP_MMEM;
63
397
  op->mmem = val;
64
397
}
65
66
static void push_op_msh(cs_bpf *bpf, uint32_t val)
67
227
{
68
227
  cs_bpf_op *op = expand_bpf_operands(bpf);
69
70
227
  op->type = BPF_OP_MSH;
71
227
  op->msh = val;
72
227
}
73
74
static void push_op_ext(cs_bpf *bpf, bpf_ext_type val)
75
249
{
76
249
  cs_bpf_op *op = expand_bpf_operands(bpf);
77
78
249
  op->type = BPF_OP_EXT;
79
249
  op->ext = val;
80
249
}
81
82
static void convert_operands(MCInst *MI, cs_bpf *bpf)
83
18.8k
{
84
18.8k
  unsigned opcode = MCInst_getOpcode(MI);
85
18.8k
  unsigned mc_op_count = MCInst_getNumOperands(MI);
86
18.8k
  MCOperand *op;
87
18.8k
  MCOperand *op2;
88
89
18.8k
  bpf->op_count = 0;
90
18.8k
  if (BPF_CLASS(opcode) == BPF_CLASS_LD ||
91
18.8k
      BPF_CLASS(opcode) == BPF_CLASS_LDX) {
92
5.11k
    switch (BPF_MODE(opcode)) {
93
630
    case BPF_MODE_IMM:
94
630
      if (EBPF_MODE(MI->csh->mode)) {
95
67
        push_op_reg(bpf,
96
67
              MCOperand_getReg(
97
67
                MCInst_getOperand(MI, 0)),
98
67
              CS_AC_WRITE);
99
67
        push_op_imm(bpf,
100
67
              MCOperand_getImm(
101
67
                MCInst_getOperand(MI, 1)),
102
67
              false);
103
563
      } else {
104
563
        push_op_imm(bpf,
105
563
              MCOperand_getImm(
106
563
                MCInst_getOperand(MI, 0)),
107
563
              false);
108
563
      }
109
630
      break;
110
1.58k
    case BPF_MODE_ABS:
111
1.58k
      op = MCInst_getOperand(MI, 0);
112
1.58k
      push_op_mem(bpf, BPF_REG_INVALID,
113
1.58k
            (uint32_t)MCOperand_getImm(op), EBPF_MODE(MI->csh->mode), true);
114
1.58k
      break;
115
1.44k
    case BPF_MODE_IND:
116
1.44k
      op = MCInst_getOperand(MI, 0);
117
1.44k
      if (EBPF_MODE(MI->csh->mode))
118
756
        push_op_mem(bpf, MCOperand_getReg(op), 0x0,
119
756
              true, true);
120
685
      else {
121
685
        op2 = MCInst_getOperand(MI, 1);
122
685
        push_op_mem(bpf, MCOperand_getReg(op),
123
685
              (uint32_t)MCOperand_getImm(op2),
124
685
              false, true);
125
685
      }
126
1.44k
      break;
127
984
    case BPF_MODE_MEM:
128
984
      if (EBPF_MODE(MI->csh->mode)) {
129
        /* ldx{w,h,b,dw} dst, [src+off] */
130
676
        push_op_reg(bpf,
131
676
              MCOperand_getReg(
132
676
                MCInst_getOperand(MI, 0)),
133
676
              CS_AC_WRITE);
134
676
        op = MCInst_getOperand(MI, 1);
135
676
        op2 = MCInst_getOperand(MI, 2);
136
676
        push_op_mem(bpf, MCOperand_getReg(op),
137
676
              (uint32_t)MCOperand_getImm(op2),
138
676
              true, false);
139
676
      } else {
140
308
        push_op_mmem(bpf,
141
308
               (uint32_t)MCOperand_getImm(
142
308
                 MCInst_getOperand(MI, 0)));
143
308
      }
144
984
      break;
145
249
    case BPF_MODE_LEN:
146
249
      push_op_ext(bpf, BPF_EXT_LEN);
147
249
      break;
148
227
    case BPF_MODE_MSH:
149
227
      op = MCInst_getOperand(MI, 0);
150
227
      push_op_msh(bpf, (uint32_t)MCOperand_getImm(op));
151
227
      break;
152
      /* case BPF_MODE_XADD: // not exists */
153
5.11k
    }
154
5.11k
    return;
155
5.11k
  }
156
13.6k
  if (BPF_CLASS(opcode) == BPF_CLASS_ST ||
157
13.6k
      BPF_CLASS(opcode) == BPF_CLASS_STX) {
158
1.59k
    if (!EBPF_MODE(MI->csh->mode)) {
159
      // cBPF has only one case - st* M[k]
160
89
      push_op_mmem(bpf, (uint32_t)MCOperand_getImm(
161
89
              MCInst_getOperand(MI, 0)));
162
89
      return;
163
89
    }
164
    /* eBPF has two cases:
165
     * - st [dst + off], src
166
     * - xadd [dst + off], src
167
     * they have same form of operands.
168
     */
169
1.50k
    op = MCInst_getOperand(MI, 0);
170
1.50k
    op2 = MCInst_getOperand(MI, 1);
171
1.50k
    push_op_mem(bpf, MCOperand_getReg(op),
172
1.50k
          (uint32_t)MCOperand_getImm(op2), true, false);
173
174
1.50k
    op = MCInst_getOperand(MI, 2);
175
1.50k
    if (MCOperand_isImm(op))
176
911
      push_op_imm(bpf, MCOperand_getImm(op), false);
177
593
    else if (MCOperand_isReg(op))
178
593
      push_op_reg(bpf, MCOperand_getReg(op), CS_AC_READ);
179
1.50k
    return;
180
1.59k
  }
181
182
12.1k
  {
183
12.1k
    const bool is_jmp32 = EBPF_MODE(MI->csh->mode) &&
184
12.1k
              (BPF_CLASS(opcode) == BPF_CLASS_JMP32);
185
12.1k
    if (BPF_CLASS(opcode) == BPF_CLASS_JMP || is_jmp32) {
186
20.3k
      for (size_t i = 0; i < mc_op_count; i++) {
187
14.7k
        op = MCInst_getOperand(MI, i);
188
14.7k
        if (MCOperand_isImm(op)) {
189
          /* Decide if we're using IMM or OFF here (and if OFF, then signed or unsigned):
190
           *
191
           * 1. any jump/jump32 + signed off (not including exit/call and ja on jump32) // eBPF 
192
           * 2. exit/call/ja + k // eBPF
193
           * 3. ja + unsigned off // cBPF (cBPF programs can only jump forwards) 
194
           * 4. any jump {x,k}, +jt, +jf // cBPF 
195
           * */
196
197
10.4k
          if ((BPF_OP(opcode) == BPF_JUMP_JA &&
198
10.4k
               !is_jmp32) ||
199
10.4k
              (!EBPF_MODE(MI->csh->mode) &&
200
10.2k
               i >= 1) ||
201
10.4k
              (EBPF_MODE(MI->csh->mode) &&
202
8.01k
               i == 2))
203
6.06k
            push_op_off(
204
6.06k
              bpf,
205
6.06k
              MCOperand_getImm(op),
206
6.06k
              EBPF_MODE(
207
6.06k
                MI->csh->mode));
208
4.42k
          else
209
4.42k
            push_op_imm(
210
4.42k
              bpf,
211
4.42k
              MCOperand_getImm(op),
212
4.42k
              true);
213
10.4k
        } else if (MCOperand_isReg(op)) {
214
4.28k
          push_op_reg(bpf, MCOperand_getReg(op),
215
4.28k
                CS_AC_READ);
216
4.28k
        }
217
14.7k
      }
218
5.59k
      return;
219
5.59k
    }
220
12.1k
  }
221
222
6.50k
  if (!EBPF_MODE(MI->csh->mode)) {
223
    /* In cBPF mode, all registers in operands are accessed as read */
224
5.81k
    for (size_t i = 0; i < mc_op_count; i++) {
225
2.77k
      op = MCInst_getOperand(MI, i);
226
2.77k
      if (MCOperand_isImm(op))
227
1.49k
        push_op_imm(bpf, MCOperand_getImm(op), false);
228
1.27k
      else if (MCOperand_isReg(op))
229
1.27k
        push_op_reg(bpf, MCOperand_getReg(op),
230
1.27k
              CS_AC_READ);
231
2.77k
    }
232
3.03k
    return;
233
3.03k
  }
234
235
  /* remain cases are: eBPF mode && ALU */
236
  /* if (BPF_CLASS(opcode) == BPF_CLASS_ALU || BPF_CLASS(opcode) == BPF_CLASS_ALU64) */
237
238
  /* We have three types:
239
   * 1. {l,b}e dst               // dst = byteswap(dst)
240
   * 2. neg dst                  // dst = -dst
241
   * 3. <op> dst, {src_reg, imm} // dst = dst <op> src
242
   * so we can simply check the number of operands,
243
   * exactly one operand means we are in case 1. and 2.,
244
   * otherwise in case 3.
245
   */
246
3.46k
  if (mc_op_count == 1) {
247
672
    op = MCInst_getOperand(MI, 0);
248
672
    push_op_reg(bpf, MCOperand_getReg(op),
249
672
          CS_AC_READ | CS_AC_WRITE);
250
2.79k
  } else { // if (mc_op_count == 2)
251
2.79k
    op = MCInst_getOperand(MI, 0);
252
2.79k
    push_op_reg(bpf, MCOperand_getReg(op),
253
2.79k
          CS_AC_READ | CS_AC_WRITE);
254
255
2.79k
    op = MCInst_getOperand(MI, 1);
256
2.79k
    if (MCOperand_isImm(op))
257
2.53k
      push_op_imm(bpf, MCOperand_getImm(op), false);
258
262
    else if (MCOperand_isReg(op))
259
262
      push_op_reg(bpf, MCOperand_getReg(op), CS_AC_READ);
260
2.79k
  }
261
3.46k
}
262
263
static void print_operand(MCInst *MI, struct SStream *O, const cs_bpf_op *op)
264
32.7k
{
265
32.7k
  switch (op->type) {
266
0
  case BPF_OP_INVALID:
267
0
    SStream_concat(O, "invalid");
268
0
    break;
269
10.6k
  case BPF_OP_REG:
270
10.6k
    SStream_concat(O, BPF_reg_name((csh)MI->csh, op->reg));
271
10.6k
    break;
272
9.99k
  case BPF_OP_IMM:
273
9.99k
    if (op->is_signed)
274
4.42k
      printInt32Hex(O, op->imm);
275
5.56k
    else
276
5.56k
      SStream_concat(O, "0x%" PRIx64, op->imm);
277
9.99k
    break;
278
6.06k
  case BPF_OP_OFF:
279
6.06k
    if (op->is_signed)
280
3.67k
      printInt16HexOffset(O, op->off);
281
2.39k
    else
282
2.39k
      SStream_concat(O, "+0x%" PRIx32, op->off);
283
6.06k
    break;
284
5.20k
  case BPF_OP_MEM:
285
5.20k
    SStream_concat(O, "[");
286
287
5.20k
    if (op->is_pkt && EBPF_MODE(MI->csh->mode)) {
288
1.80k
      SStream_concat(O, "skb");
289
290
1.80k
      if (op->mem.base != BPF_REG_INVALID)
291
756
        SStream_concat(O, "+%s",
292
756
                 BPF_reg_name((csh)MI->csh,
293
756
                  op->mem.base));
294
1.04k
      else {
295
1.04k
        if (op->is_signed)
296
1.04k
          printInt32HexOffset(O, op->mem.disp);
297
0
        else
298
0
          SStream_concat(O, "+0x%" PRIx32,
299
0
                   op->mem.disp);
300
1.04k
      }
301
3.40k
    } else {
302
3.40k
      if (op->mem.base != BPF_REG_INVALID)
303
2.86k
        SStream_concat(O, BPF_reg_name((csh)MI->csh,
304
2.86k
                     op->mem.base));
305
3.40k
      if (op->mem.disp != 0) {
306
3.28k
        if (op->mem.base != BPF_REG_INVALID) {
307
          // if operation is signed, then it always uses off, not k
308
2.76k
          if (op->is_signed)
309
2.12k
            printInt16HexOffset(
310
2.12k
              O, op->mem.disp);
311
633
          else if (op->is_pkt)
312
633
            SStream_concat(O, "+0x%" PRIx32,
313
633
                     op->mem.disp);
314
0
          else
315
0
            SStream_concat(O, "+0x%" PRIx16,
316
0
                     op->mem.disp);
317
2.76k
        } else
318
524
          SStream_concat(O, "0x%" PRIx32,
319
524
                   op->mem.disp);
320
3.28k
      }
321
322
3.40k
      if (op->mem.base == BPF_REG_INVALID &&
323
3.40k
          op->mem.disp == 0)
324
18
        SStream_concat(O, "0x0");
325
3.40k
    }
326
327
5.20k
    SStream_concat(O, "]");
328
5.20k
    break;
329
397
  case BPF_OP_MMEM:
330
397
    SStream_concat(O, "m[0x%x]", op->mmem);
331
397
    break;
332
227
  case BPF_OP_MSH:
333
227
    SStream_concat(O, "4*([0x%x]&0xf)", op->msh);
334
227
    break;
335
249
  case BPF_OP_EXT:
336
249
    switch (op->ext) {
337
249
    case BPF_EXT_LEN:
338
249
      SStream_concat(O, "#len");
339
249
      break;
340
249
    }
341
249
    break;
342
32.7k
  }
343
32.7k
}
344
345
/*
346
 * 1. human readable mnemonic
347
 * 2. set pubOpcode (BPF_INSN_*)
348
 * 3. set detail->bpf.operands
349
 * */
350
void BPF_printInst(MCInst *MI, struct SStream *O, void *PrinterInfo)
351
18.8k
{
352
18.8k
  cs_bpf bpf = { 0 };
353
354
  /* set pubOpcode as instruction id */
355
18.8k
  SStream_concat(O, BPF_insn_name((csh)MI->csh, MCInst_getOpcodePub(MI)));
356
18.8k
  convert_operands(MI, &bpf);
357
51.5k
  for (size_t i = 0; i < bpf.op_count; i++) {
358
32.7k
    if (i == 0)
359
18.3k
      SStream_concat(O, "\t");
360
14.4k
    else
361
14.4k
      SStream_concat(O, ", ");
362
32.7k
    print_operand(MI, O, &bpf.operands[i]);
363
32.7k
  }
364
365
18.8k
#ifndef CAPSTONE_DIET
366
18.8k
  if (detail_is_set(MI)) {
367
18.8k
    MI->flat_insn->detail->bpf = bpf;
368
18.8k
  }
369
18.8k
#endif
370
18.8k
}