/src/capstonenext/arch/BPF/BPFDisassembler.c
Line | Count | Source (jump to first uncovered line) |
1 | | /* Capstone Disassembly Engine */ |
2 | | /* BPF Backend by david942j <david942j@gmail.com>, 2019 */ |
3 | | /* SPDX-FileCopyrightText: 2024 Roee Toledano <roeetoledano10@gmail.com> */ |
4 | | /* SPDX-License-Identifier: BSD-3 */ |
5 | | |
6 | | #ifdef CAPSTONE_HAS_BPF |
7 | | |
8 | | #include <string.h> |
9 | | #include <stddef.h> // offsetof macro |
10 | | |
11 | | #include "BPFConstants.h" |
12 | | #include "BPFDisassembler.h" |
13 | | #include "BPFMapping.h" |
14 | | #include "../../Mapping.h" |
15 | | #include "../../cs_priv.h" |
16 | | #include "../../utils.h" |
17 | | |
18 | | ///< Malloc bpf_internal, also checks if code_len is large enough. |
19 | | static bpf_internal *alloc_bpf_internal(const size_t code_len) |
20 | 33.4k | { |
21 | 33.4k | bpf_internal *bpf; |
22 | | |
23 | 33.4k | if (code_len < 8) |
24 | 512 | return NULL; |
25 | 32.9k | bpf = cs_mem_malloc(sizeof(bpf_internal)); |
26 | 32.9k | if (bpf == NULL) |
27 | 0 | return NULL; |
28 | | /* default value */ |
29 | 32.9k | bpf->insn_size = 8; |
30 | 32.9k | return bpf; |
31 | 32.9k | } |
32 | | |
33 | | ///< Fetch a cBPF structure from code |
34 | | static bpf_internal *fetch_cbpf(MCInst *instr, const uint8_t *code, |
35 | | const size_t code_len) |
36 | 11.3k | { |
37 | 11.3k | bpf_internal *bpf; |
38 | | |
39 | 11.3k | bpf = alloc_bpf_internal(code_len); |
40 | 11.3k | if (bpf == NULL) |
41 | 152 | return NULL; |
42 | | |
43 | 11.2k | bpf->op = readBytes16(instr, code); |
44 | 11.2k | bpf->jt = code[2]; |
45 | 11.2k | bpf->jf = code[3]; |
46 | 11.2k | bpf->k = readBytes32(instr, code + 4); |
47 | 11.2k | return bpf; |
48 | 11.3k | } |
49 | | |
50 | | ///< Fetch an eBPF structure from code |
51 | | static bpf_internal *fetch_ebpf(MCInst *instr, const uint8_t *code, |
52 | | const size_t code_len) |
53 | 22.0k | { |
54 | 22.0k | bpf_internal *bpf; |
55 | | |
56 | 22.0k | bpf = alloc_bpf_internal(code_len); |
57 | 22.0k | if (bpf == NULL) |
58 | 360 | return NULL; |
59 | | |
60 | 21.7k | bpf->op = (uint16_t)code[0]; |
61 | 21.7k | bpf->dst = code[1] & 0xf; |
62 | 21.7k | bpf->src = (code[1] & 0xf0) >> 4; |
63 | | |
64 | | // eBPF has one 16-byte instruction: BPF_LD | BPF_DW | BPF_IMM, |
65 | | // in this case imm is combined with the next block's imm. |
66 | 21.7k | if (bpf->op == (BPF_CLASS_LD | BPF_SIZE_DW | BPF_MODE_IMM)) { |
67 | 717 | if (code_len < 16) { |
68 | 4 | cs_mem_free(bpf); |
69 | 4 | return NULL; |
70 | 4 | } |
71 | 713 | bpf->k = readBytes32(instr, code + 4) | |
72 | 713 | (((uint64_t)readBytes32(instr, code + 12)) << 32); |
73 | 713 | bpf->insn_size = 16; |
74 | 21.0k | } else { |
75 | 21.0k | bpf->offset = readBytes16(instr, code + 2); |
76 | 21.0k | bpf->k = readBytes32(instr, code + 4); |
77 | 21.0k | } |
78 | 21.7k | return bpf; |
79 | 21.7k | } |
80 | | |
81 | | #define CHECK_READABLE_REG(ud, reg) \ |
82 | 11.1k | do { \ |
83 | 11.1k | if (!((reg) >= BPF_REG_R0 && (reg) <= BPF_REG_R10)) \ |
84 | 11.1k | return false; \ |
85 | 11.1k | } while (0) |
86 | | |
87 | | #define CHECK_WRITEABLE_REG(ud, reg) \ |
88 | 5.84k | do { \ |
89 | 5.84k | if (!((reg) >= BPF_REG_R0 && (reg) < BPF_REG_R10)) \ |
90 | 5.84k | return false; \ |
91 | 5.84k | } while (0) |
92 | | |
93 | | #define CHECK_READABLE_AND_PUSH(ud, MI, r) \ |
94 | 11.1k | do { \ |
95 | 11.1k | CHECK_READABLE_REG(ud, r + BPF_REG_R0); \ |
96 | 11.1k | MCOperand_CreateReg0(MI, r + BPF_REG_R0); \ |
97 | 11.1k | } while (0) |
98 | | |
99 | | #define CHECK_WRITABLE_AND_PUSH(ud, MI, r) \ |
100 | 5.84k | do { \ |
101 | 5.84k | CHECK_WRITEABLE_REG(ud, r + BPF_REG_R0); \ |
102 | 5.84k | MCOperand_CreateReg0(MI, r + BPF_REG_R0); \ |
103 | 5.83k | } while (0) |
104 | | |
105 | | static bool decodeLoad(MCInst *MI, bpf_internal *bpf) |
106 | 9.90k | { |
107 | 9.90k | if (!EBPF_MODE(MI->csh->mode)) { |
108 | | /* |
109 | | * +-----+-----------+--------------------+ |
110 | | * | ldb | [k] | [x+k] | |
111 | | * | ldh | [k] | [x+k] | |
112 | | * +-----+-----------+--------------------+ |
113 | | */ |
114 | 4.17k | if (BPF_SIZE(bpf->op) == BPF_SIZE_DW) |
115 | 7 | return false; |
116 | 4.16k | if (BPF_SIZE(bpf->op) == BPF_SIZE_B || |
117 | 4.16k | BPF_SIZE(bpf->op) == BPF_SIZE_H) { |
118 | | /* no ldx */ |
119 | 1.14k | if (BPF_CLASS(bpf->op) != BPF_CLASS_LD) |
120 | 4 | return false; |
121 | | /* can only be BPF_ABS and BPF_IND */ |
122 | 1.13k | if (BPF_MODE(bpf->op) == BPF_MODE_ABS) { |
123 | 700 | MCOperand_CreateImm0(MI, bpf->k); |
124 | 700 | return true; |
125 | 700 | } else if (BPF_MODE(bpf->op) == BPF_MODE_IND) { |
126 | 431 | MCOperand_CreateReg0(MI, BPF_REG_X); |
127 | 431 | MCOperand_CreateImm0(MI, bpf->k); |
128 | 431 | return true; |
129 | 431 | } |
130 | 5 | return false; |
131 | 1.13k | } |
132 | | /* |
133 | | * +-----+----+------+------+-----+-------+ |
134 | | * | ld | #k | #len | M[k] | [k] | [x+k] | |
135 | | * +-----+----+------+------+-----+-------+ |
136 | | * | ldx | #k | #len | M[k] | 4*([k]&0xf) | |
137 | | * +-----+----+------+------+-------------+ |
138 | | */ |
139 | 3.02k | switch (BPF_MODE(bpf->op)) { |
140 | 1.22k | default: |
141 | 1.22k | break; |
142 | 1.22k | case BPF_MODE_IMM: |
143 | 863 | MCOperand_CreateImm0(MI, bpf->k); |
144 | 863 | return true; |
145 | 469 | case BPF_MODE_LEN: |
146 | 469 | return true; |
147 | 468 | case BPF_MODE_MEM: |
148 | 468 | MCOperand_CreateImm0(MI, bpf->k); |
149 | 468 | return true; |
150 | 3.02k | } |
151 | 1.22k | if (BPF_CLASS(bpf->op) == BPF_CLASS_LD) { |
152 | 630 | if (BPF_MODE(bpf->op) == BPF_MODE_ABS) { |
153 | 356 | MCOperand_CreateImm0(MI, bpf->k); |
154 | 356 | return true; |
155 | 356 | } else if (BPF_MODE(bpf->op) == BPF_MODE_IND) { |
156 | 272 | MCOperand_CreateReg0(MI, BPF_REG_X); |
157 | 272 | MCOperand_CreateImm0(MI, bpf->k); |
158 | 272 | return true; |
159 | 272 | } |
160 | 630 | } else { /* LDX */ |
161 | 598 | if (BPF_MODE(bpf->op) == BPF_MODE_MSH) { |
162 | 596 | MCOperand_CreateImm0(MI, bpf->k); |
163 | 596 | return true; |
164 | 596 | } |
165 | 598 | } |
166 | 4 | return false; |
167 | 1.22k | } |
168 | | |
169 | | /* eBPF mode */ |
170 | | /* |
171 | | * - IMM: lddw dst, imm64 |
172 | | * - ABS: ld{w,h,b} [k] |
173 | | * - IND: ld{w,h,b} [src] |
174 | | * - MEM: ldx{w,h,b,dw} dst, [src+off] |
175 | | */ |
176 | 5.73k | if (BPF_CLASS(bpf->op) == BPF_CLASS_LD) { |
177 | 4.00k | switch (BPF_MODE(bpf->op)) { |
178 | 741 | case BPF_MODE_IMM: |
179 | 741 | if (bpf->op != |
180 | 741 | (BPF_CLASS_LD | BPF_SIZE_DW | BPF_MODE_IMM)) |
181 | 28 | return false; |
182 | 713 | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
183 | 711 | MCOperand_CreateImm0(MI, bpf->k); |
184 | 711 | return true; |
185 | 2.43k | case BPF_MODE_ABS: |
186 | 2.43k | MCOperand_CreateImm0(MI, bpf->k); |
187 | 2.43k | return true; |
188 | 821 | case BPF_MODE_IND: |
189 | 821 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
190 | 819 | return true; |
191 | 4.00k | } |
192 | 7 | return false; |
193 | 4.00k | } |
194 | | /* LDX */ |
195 | 1.73k | if (BPF_MODE(bpf->op) == BPF_MODE_MEM) { |
196 | 1.71k | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
197 | 1.71k | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
198 | 1.70k | MCOperand_CreateImm0(MI, bpf->offset); |
199 | 1.70k | return true; |
200 | 1.71k | } |
201 | 18 | return false; |
202 | 1.73k | } |
203 | | |
204 | | static bool decodeStore(MCInst *MI, bpf_internal *bpf) |
205 | 2.73k | { |
206 | | /* in cBPF, only BPF_ST* | BPF_MEM | BPF_W is valid |
207 | | * while in eBPF: |
208 | | * - BPF_STX | BPF_XADD | BPF_{W,DW} |
209 | | * - BPF_ST* | BPF_MEM | BPF_{W,H,B,DW} |
210 | | * are valid |
211 | | */ |
212 | 2.73k | if (!EBPF_MODE(MI->csh->mode)) { |
213 | | /* can only store to M[] */ |
214 | 98 | if (bpf->op != (BPF_CLASS(bpf->op) | BPF_MODE_MEM | BPF_SIZE_W)) |
215 | 16 | return false; |
216 | 82 | MCOperand_CreateImm0(MI, bpf->k); |
217 | 82 | return true; |
218 | 98 | } |
219 | | |
220 | | /* eBPF */ |
221 | 2.63k | if (BPF_MODE(bpf->op) == BPF_MODE_ATOMIC) { |
222 | 420 | if (BPF_CLASS(bpf->op) != BPF_CLASS_STX) |
223 | 2 | return false; |
224 | 418 | if (BPF_SIZE(bpf->op) != BPF_SIZE_W && |
225 | 418 | BPF_SIZE(bpf->op) != BPF_SIZE_DW) |
226 | 3 | return false; |
227 | | /* xadd [dst + off], src */ |
228 | 415 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
229 | 412 | MCOperand_CreateImm0(MI, bpf->offset); |
230 | 412 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
231 | 410 | return true; |
232 | 412 | } |
233 | | |
234 | 2.21k | if (BPF_MODE(bpf->op) != BPF_MODE_MEM) |
235 | 19 | return false; |
236 | | |
237 | | /* st [dst + off], src */ |
238 | 2.19k | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
239 | 2.19k | MCOperand_CreateImm0(MI, bpf->offset); |
240 | 2.19k | if (BPF_CLASS(bpf->op) == BPF_CLASS_ST) |
241 | 1.23k | MCOperand_CreateImm0(MI, bpf->k); |
242 | 955 | else |
243 | 955 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
244 | 2.18k | return true; |
245 | 2.19k | } |
246 | | |
247 | | static bool decodeALU(MCInst *MI, bpf_internal *bpf) |
248 | 5.57k | { |
249 | | /* Set MI->Operands */ |
250 | | |
251 | | /* cBPF */ |
252 | 5.57k | if (!EBPF_MODE(MI->csh->mode)) { |
253 | 2.10k | if (BPF_OP(bpf->op) > BPF_ALU_XOR) |
254 | 4 | return false; |
255 | | /* cBPF's NEG has no operands */ |
256 | 2.09k | if (BPF_OP(bpf->op) == BPF_ALU_NEG) |
257 | 211 | return true; |
258 | 1.88k | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
259 | 713 | MCOperand_CreateImm0(MI, bpf->k); |
260 | 1.17k | else /* BPF_SRC_X */ |
261 | 1.17k | MCOperand_CreateReg0(MI, BPF_REG_X); |
262 | 1.88k | return true; |
263 | 2.09k | } |
264 | | |
265 | | /* eBPF */ |
266 | | |
267 | 3.47k | if (BPF_OP(bpf->op) > BPF_ALU_END) |
268 | 10 | return false; |
269 | | /* ENDian's imm must be one of 16, 32, 64 */ |
270 | 3.46k | if (BPF_OP(bpf->op) == BPF_ALU_END) { |
271 | 621 | if (bpf->k != 16 && bpf->k != 32 && bpf->k != 64) |
272 | 44 | return false; |
273 | 577 | if (BPF_CLASS(bpf->op) == BPF_CLASS_ALU64 && |
274 | 577 | BPF_SRC(bpf->op) != BPF_SRC_LITTLE) |
275 | 1 | return false; |
276 | 577 | } |
277 | | |
278 | | /* - op dst, imm |
279 | | * - op dst, src |
280 | | * - neg dst |
281 | | * - le<imm> dst |
282 | | */ |
283 | | /* every ALU instructions have dst op */ |
284 | 3.41k | CHECK_WRITABLE_AND_PUSH(ud, MI, bpf->dst); |
285 | | |
286 | | /* special cases */ |
287 | 3.41k | if (BPF_OP(bpf->op) == BPF_ALU_NEG) |
288 | 232 | return true; |
289 | 3.18k | if (BPF_OP(bpf->op) == BPF_ALU_END) { |
290 | | /* bpf->k must be one of 16, 32, 64 */ |
291 | 576 | bpf->op |= ((uint32_t)bpf->k << 4); |
292 | 576 | return true; |
293 | 576 | } |
294 | | |
295 | | /* normal cases */ |
296 | 2.60k | if (BPF_SRC(bpf->op) == BPF_SRC_K) { |
297 | 2.32k | MCOperand_CreateImm0(MI, bpf->k); |
298 | 2.32k | } else { /* BPF_SRC_X */ |
299 | 281 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
300 | 281 | } |
301 | 2.60k | return true; |
302 | 2.60k | } |
303 | | |
304 | | static bool decodeJump(MCInst *MI, bpf_internal *bpf) |
305 | 6.00k | { |
306 | | /* cBPF and eBPF are very different in class jump */ |
307 | 6.00k | if (!EBPF_MODE(MI->csh->mode)) { |
308 | 940 | if (BPF_OP(bpf->op) > BPF_JUMP_JSET) |
309 | 2 | return false; |
310 | | |
311 | | /* ja is a special case of jumps */ |
312 | 938 | if (BPF_OP(bpf->op) == BPF_JUMP_JA) { |
313 | 70 | MCOperand_CreateImm0(MI, bpf->k); |
314 | 70 | return true; |
315 | 70 | } |
316 | | |
317 | 868 | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
318 | 606 | MCOperand_CreateImm0(MI, bpf->k); |
319 | 262 | else /* BPF_SRC_X */ |
320 | 262 | MCOperand_CreateReg0(MI, BPF_REG_X); |
321 | 868 | MCOperand_CreateImm0(MI, bpf->jt); |
322 | 868 | MCOperand_CreateImm0(MI, bpf->jf); |
323 | 5.06k | } else { |
324 | 5.06k | if (BPF_OP(bpf->op) > BPF_JUMP_JSLE) |
325 | 1 | return false; |
326 | | |
327 | | /* JMP32 has no CALL/EXIT instruction */ |
328 | | /* No operands for exit */ |
329 | 5.06k | if (BPF_OP(bpf->op) == BPF_JUMP_EXIT) |
330 | 225 | return bpf->op == (BPF_CLASS_JMP | BPF_JUMP_EXIT); |
331 | 4.84k | if (BPF_OP(bpf->op) == BPF_JUMP_CALL) { |
332 | 289 | if (bpf->op == (BPF_CLASS_JMP | BPF_JUMP_CALL)) { |
333 | 236 | MCOperand_CreateImm0(MI, bpf->k); |
334 | 236 | return true; |
335 | 236 | } |
336 | 53 | if (bpf->op == |
337 | 53 | (BPF_CLASS_JMP | BPF_JUMP_CALL | BPF_SRC_X)) { |
338 | 51 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->k); |
339 | 12 | return true; |
340 | 51 | } |
341 | 2 | return false; |
342 | 53 | } |
343 | | |
344 | | /* ja is a special case of jumps */ |
345 | 4.55k | if (BPF_OP(bpf->op) == BPF_JUMP_JA) { |
346 | 321 | if (BPF_SRC(bpf->op) != BPF_SRC_K) |
347 | 1 | return false; |
348 | 320 | if (BPF_CLASS(bpf->op) == BPF_CLASS_JMP) |
349 | 175 | MCOperand_CreateImm0(MI, bpf->offset); |
350 | 145 | else |
351 | 145 | MCOperand_CreateImm0(MI, bpf->k); |
352 | | |
353 | 320 | return true; |
354 | 321 | } |
355 | | |
356 | | /* <j> dst, src, +off */ |
357 | 4.23k | CHECK_READABLE_AND_PUSH(ud, MI, bpf->dst); |
358 | 4.23k | if (BPF_SRC(bpf->op) == BPF_SRC_K) |
359 | 4.12k | MCOperand_CreateImm0(MI, bpf->k); |
360 | 102 | else |
361 | 102 | CHECK_READABLE_AND_PUSH(ud, MI, bpf->src); |
362 | 4.23k | MCOperand_CreateImm0(MI, bpf->offset); |
363 | 4.23k | } |
364 | 5.09k | return true; |
365 | 6.00k | } |
366 | | |
367 | | static bool decodeReturn(MCInst *MI, bpf_internal *bpf) |
368 | 1.57k | { |
369 | | /* Here only handles the BPF_RET class in cBPF */ |
370 | 1.57k | switch (BPF_RVAL(bpf->op)) { |
371 | 476 | case BPF_SRC_K: |
372 | 476 | MCOperand_CreateImm0(MI, bpf->k); |
373 | 476 | return true; |
374 | 560 | case BPF_SRC_X: |
375 | 560 | MCOperand_CreateReg0(MI, BPF_REG_X); |
376 | 560 | return true; |
377 | 531 | case BPF_SRC_A: |
378 | 531 | MCOperand_CreateReg0(MI, BPF_REG_A); |
379 | 531 | return true; |
380 | 1.57k | } |
381 | 4 | return false; |
382 | 1.57k | } |
383 | | |
384 | | static bool decodeMISC(MCInst *MI, bpf_internal *bpf) |
385 | 215 | { |
386 | 215 | uint16_t op = bpf->op ^ BPF_CLASS_MISC; |
387 | 215 | return op == BPF_MISCOP_TAX || op == BPF_MISCOP_TXA; |
388 | 215 | } |
389 | | |
390 | | ///< 1. Check if the instruction is valid |
391 | | ///< 2. Set MI->opcode |
392 | | ///< 3. Set MI->Operands |
393 | | static bool getInstruction(MCInst *MI, bpf_internal *bpf) |
394 | 19.5k | { |
395 | 19.5k | cs_detail *detail; |
396 | | |
397 | 19.5k | detail = MI->flat_insn->detail; |
398 | | // initialize detail |
399 | 19.5k | if (detail) { |
400 | 19.5k | memset(detail, 0, offsetof(cs_detail, bpf) + sizeof(cs_bpf)); |
401 | 19.5k | } |
402 | | |
403 | 19.5k | MCInst_clear(MI); |
404 | | |
405 | 19.5k | switch (BPF_CLASS(bpf->op)) { |
406 | 0 | default: /* should never happen */ |
407 | 0 | return false; |
408 | 3.68k | case BPF_CLASS_LD: |
409 | 5.67k | case BPF_CLASS_LDX: |
410 | 5.67k | return decodeLoad(MI, bpf); |
411 | 639 | case BPF_CLASS_ST: |
412 | 1.42k | case BPF_CLASS_STX: |
413 | 1.42k | return decodeStore(MI, bpf); |
414 | 3.41k | case BPF_CLASS_ALU: |
415 | 3.41k | return decodeALU(MI, bpf); |
416 | 3.79k | case BPF_CLASS_JMP: |
417 | 3.79k | return decodeJump(MI, bpf); |
418 | 3.05k | case BPF_CLASS_RET: |
419 | | /* case BPF_CLASS_JMP32: */ |
420 | 3.05k | if (EBPF_MODE(MI->csh->mode)) |
421 | 2.21k | return decodeJump(MI, bpf); |
422 | 836 | else |
423 | 836 | return decodeReturn(MI, bpf); |
424 | 2.21k | case BPF_CLASS_MISC: |
425 | | /* case BPF_CLASS_ALU64: */ |
426 | 2.21k | if (EBPF_MODE(MI->csh->mode)) |
427 | 2.15k | return decodeALU(MI, bpf); |
428 | 58 | else |
429 | 58 | return decodeMISC(MI, bpf); |
430 | 19.5k | } |
431 | 19.5k | } |
432 | | |
433 | | // Check for regular load instructions |
434 | | #define REG_LOAD_CASE(c) \ |
435 | 3.76k | case BPF_SIZE_##c: \ |
436 | 3.76k | if (BPF_CLASS(opcode) == BPF_CLASS_LD) \ |
437 | 3.76k | return BPF_INS_LD##c; \ |
438 | 3.76k | else \ |
439 | 3.76k | return BPF_INS_LDX##c; |
440 | | |
441 | | static bpf_insn op2insn_ld_cbpf(unsigned opcode) |
442 | 3.76k | { |
443 | 3.76k | switch (BPF_SIZE(opcode)) { |
444 | 2.00k | REG_LOAD_CASE(W); |
445 | 467 | REG_LOAD_CASE(H); |
446 | 549 | REG_LOAD_CASE(B); |
447 | 746 | REG_LOAD_CASE(DW); |
448 | 3.76k | } |
449 | | |
450 | 0 | return BPF_INS_INVALID; |
451 | 3.76k | } |
452 | | #undef REG_LOAD_CASE |
453 | | |
454 | | // Check for packet load instructions |
455 | | #define PACKET_LOAD_CASE(c) \ |
456 | 1.85k | case BPF_SIZE_##c: \ |
457 | 1.85k | if (BPF_MODE(opcode) == BPF_MODE_ABS) \ |
458 | 1.85k | return BPF_INS_LDABS##c; \ |
459 | 1.85k | else if (BPF_MODE(opcode) == BPF_MODE_IND) \ |
460 | 406 | return BPF_INS_LDIND##c; \ |
461 | 406 | else \ |
462 | 406 | return BPF_INS_INVALID; |
463 | | |
464 | | static bpf_insn op2insn_ld_ebpf(unsigned opcode) |
465 | 3.60k | { |
466 | 3.60k | if (BPF_CLASS(opcode) == BPF_CLASS_LD) { |
467 | 2.35k | switch (BPF_SIZE(opcode)) { |
468 | 1.03k | PACKET_LOAD_CASE(W); |
469 | 614 | PACKET_LOAD_CASE(H); |
470 | 211 | PACKET_LOAD_CASE(B); |
471 | 2.35k | } |
472 | 2.35k | } |
473 | | |
474 | | // If it's not a packet load instruction, it must be a regular load instruction |
475 | 1.75k | return op2insn_ld_cbpf(opcode); |
476 | 3.60k | } |
477 | | #undef PACKET_LOAD_CASE |
478 | | |
479 | | /* During parsing we already checked to make sure the size is D/DW and |
480 | | * mode is STX and not ST, so we don't need to check again*/ |
481 | | #define ALU_CASE_REG(c) \ |
482 | 115 | case BPF_ALU_##c: \ |
483 | 115 | if (BPF_SIZE(opcode) == BPF_SIZE_W) \ |
484 | 115 | return BPF_INS_A##c; \ |
485 | 115 | else \ |
486 | 115 | return BPF_INS_A##c##64; |
487 | | |
488 | | #define ALU_CASE_FETCH(c) \ |
489 | 89 | case BPF_ALU_##c | BPF_MODE_FETCH: \ |
490 | 89 | if (BPF_SIZE(opcode) == BPF_SIZE_W) \ |
491 | 89 | return BPF_INS_AF##c; \ |
492 | 89 | else \ |
493 | 89 | return BPF_INS_AF##c##64; |
494 | | |
495 | | #define COMPLEX_CASE(c) \ |
496 | 19 | case BPF_ATOMIC_##c | BPF_MODE_FETCH: \ |
497 | 19 | if (BPF_SIZE(opcode) == BPF_SIZE_DW) \ |
498 | 19 | return BPF_INS_A##c##64; \ |
499 | 19 | else \ |
500 | 19 | return BPF_INS_INVALID; |
501 | | |
502 | | #define CASE(c) \ |
503 | 1.15k | case BPF_SIZE_##c: \ |
504 | 1.15k | if (BPF_CLASS(opcode) == BPF_CLASS_ST) \ |
505 | 1.15k | return BPF_INS_ST##c; \ |
506 | 1.15k | else \ |
507 | 1.15k | return BPF_INS_STX##c; |
508 | | |
509 | | static bpf_insn op2insn_st(unsigned opcode, const uint32_t imm) |
510 | 1.39k | { |
511 | | /* |
512 | | * - BPF_STX | ALU atomic operations | BPF_{W,DW} |
513 | | * - BPF_STX | Complex atomic operations | BPF_{DW} |
514 | | * - BPF_ST* | BPF_MEM | BPF_{W,H,B,DW} |
515 | | */ |
516 | | |
517 | 1.39k | if (BPF_MODE(opcode) == BPF_MODE_ATOMIC) { |
518 | 239 | switch (imm) { |
519 | 21 | ALU_CASE_REG(ADD); |
520 | 20 | ALU_CASE_REG(OR); |
521 | 34 | ALU_CASE_REG(AND); |
522 | 40 | ALU_CASE_REG(XOR); |
523 | 20 | ALU_CASE_FETCH(ADD); |
524 | 28 | ALU_CASE_FETCH(OR); |
525 | 21 | ALU_CASE_FETCH(AND); |
526 | 20 | ALU_CASE_FETCH(XOR); |
527 | 8 | COMPLEX_CASE(XCHG); |
528 | 11 | COMPLEX_CASE(CMPXCHG); |
529 | 16 | default: // Reached if complex atomic operation is used without fetch modifier |
530 | 16 | return BPF_INS_INVALID; |
531 | 239 | } |
532 | 239 | } |
533 | | |
534 | | /* should be BPF_MEM */ |
535 | 1.15k | switch (BPF_SIZE(opcode)) { |
536 | 338 | CASE(W); |
537 | 106 | CASE(H); |
538 | 313 | CASE(B); |
539 | 402 | CASE(DW); |
540 | 1.15k | } |
541 | | |
542 | 0 | return BPF_INS_INVALID; |
543 | 1.15k | } |
544 | | #undef CASE |
545 | | |
546 | | #define CASE(c) \ |
547 | 4.19k | case BPF_ALU_##c: \ |
548 | 4.19k | CASE_IF(c) |
549 | | |
550 | | #define CASE_IF(c) \ |
551 | 4.87k | do { \ |
552 | 4.87k | if (BPF_CLASS(opcode) == BPF_CLASS_ALU) \ |
553 | 4.87k | return BPF_INS_##c; \ |
554 | 4.87k | else \ |
555 | 4.87k | return BPF_INS_##c##64; \ |
556 | 4.87k | } while (0) |
557 | | |
558 | | static bpf_insn op2insn_alu(unsigned opcode, const uint16_t off, |
559 | | const bool is_ebpf) |
560 | 5.51k | { |
561 | | /* Endian is a special case */ |
562 | 5.51k | if (BPF_OP(opcode) == BPF_ALU_END) { |
563 | 576 | if (BPF_CLASS(opcode) == BPF_CLASS_ALU64) { |
564 | 82 | switch (opcode ^ BPF_CLASS_ALU64 ^ BPF_ALU_END ^ |
565 | 82 | BPF_SRC_LITTLE) { |
566 | 17 | case (16 << 4): |
567 | 17 | return BPF_INS_BSWAP16; |
568 | 46 | case (32 << 4): |
569 | 46 | return BPF_INS_BSWAP32; |
570 | 19 | case (64 << 4): |
571 | 19 | return BPF_INS_BSWAP64; |
572 | 0 | default: |
573 | 0 | return BPF_INS_INVALID; |
574 | 82 | } |
575 | 82 | } |
576 | | |
577 | 494 | switch (opcode ^ BPF_CLASS_ALU ^ BPF_ALU_END) { |
578 | 18 | case BPF_SRC_LITTLE | (16 << 4): |
579 | 18 | return BPF_INS_LE16; |
580 | 12 | case BPF_SRC_LITTLE | (32 << 4): |
581 | 12 | return BPF_INS_LE32; |
582 | 1 | case BPF_SRC_LITTLE | (64 << 4): |
583 | 1 | return BPF_INS_LE64; |
584 | 124 | case BPF_SRC_BIG | (16 << 4): |
585 | 124 | return BPF_INS_BE16; |
586 | 329 | case BPF_SRC_BIG | (32 << 4): |
587 | 329 | return BPF_INS_BE32; |
588 | 10 | case BPF_SRC_BIG | (64 << 4): |
589 | 10 | return BPF_INS_BE64; |
590 | 494 | } |
591 | 0 | return BPF_INS_INVALID; |
592 | 494 | } |
593 | | |
594 | 4.93k | switch (BPF_OP(opcode)) { |
595 | 287 | CASE(ADD); |
596 | 326 | CASE(SUB); |
597 | 359 | CASE(MUL); |
598 | 503 | CASE(OR); |
599 | 649 | CASE(AND); |
600 | 424 | CASE(LSH); |
601 | 619 | CASE(RSH); |
602 | 443 | CASE(NEG); |
603 | 303 | CASE(XOR); |
604 | 282 | CASE(ARSH); |
605 | 263 | case BPF_ALU_DIV: |
606 | 263 | if (!is_ebpf || off == 0) |
607 | 223 | CASE_IF(DIV); |
608 | 40 | else if (off == 1) |
609 | 29 | CASE_IF(SDIV); |
610 | 11 | else |
611 | 11 | return BPF_INS_INVALID; |
612 | 282 | case BPF_ALU_MOD: |
613 | 282 | if (!is_ebpf || off == 0) |
614 | 239 | CASE_IF(MOD); |
615 | 43 | else if (off == 1) |
616 | 31 | CASE_IF(SMOD); |
617 | 12 | else |
618 | 12 | return BPF_INS_INVALID; |
619 | 195 | case BPF_ALU_MOV: |
620 | | /* BPF_CLASS_ALU can have: mov, mov8s, mov16s |
621 | | * BPF_CLASS_ALU64 can have: mov, mov8s, mov16s, mov32s |
622 | | * */ |
623 | 195 | if (off == 0) |
624 | 102 | CASE_IF(MOV); |
625 | 93 | else if (off == 8) |
626 | 16 | CASE_IF(MOVSB); |
627 | 77 | else if (off == 16) |
628 | 39 | CASE_IF(MOVSH); |
629 | 38 | else if (off == 32 && BPF_CLASS(opcode) == BPF_CLASS_ALU64) |
630 | 18 | return BPF_INS_MOVSW64; |
631 | 20 | else |
632 | 20 | return BPF_INS_INVALID; |
633 | 4.93k | } |
634 | | |
635 | 0 | return BPF_INS_INVALID; |
636 | 4.93k | } |
637 | | #undef CASE_IF |
638 | | #undef CASE |
639 | | |
640 | 5.95k | #define BPF_CALLX (BPF_CLASS_JMP | BPF_JUMP_CALL | BPF_SRC_X) |
641 | | |
642 | | #define CASE(c) \ |
643 | 5.09k | case BPF_JUMP_##c: \ |
644 | 5.09k | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) \ |
645 | 5.09k | return BPF_INS_##c; \ |
646 | 5.09k | else \ |
647 | 5.09k | return BPF_INS_##c##32; |
648 | | |
649 | | #define SPEC_CASE(c) \ |
650 | 459 | case BPF_JUMP_##c: \ |
651 | 459 | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) \ |
652 | 459 | return BPF_INS_##c; \ |
653 | 459 | else \ |
654 | 459 | return BPF_INS_INVALID; |
655 | | |
656 | | static bpf_insn op2insn_jmp(unsigned opcode) |
657 | 5.95k | { |
658 | 5.95k | if (opcode == BPF_CALLX) { |
659 | 12 | return BPF_INS_CALLX; |
660 | 12 | } |
661 | | |
662 | 5.94k | switch (BPF_OP(opcode)) { |
663 | 390 | case BPF_JUMP_JA: |
664 | 390 | if (BPF_CLASS(opcode) == BPF_CLASS_JMP) |
665 | 245 | return BPF_INS_JA; |
666 | 145 | else |
667 | 145 | return BPF_INS_JAL; |
668 | 441 | CASE(JEQ); |
669 | 314 | CASE(JGT); |
670 | 346 | CASE(JGE); |
671 | 577 | CASE(JSET); |
672 | 405 | CASE(JNE); |
673 | 816 | CASE(JSGT); |
674 | 519 | CASE(JSGE); |
675 | 236 | SPEC_CASE(CALL); |
676 | 223 | SPEC_CASE(EXIT); |
677 | 448 | CASE(JLT); |
678 | 619 | CASE(JLE); |
679 | 372 | CASE(JSLT); |
680 | 241 | CASE(JSLE); |
681 | 5.94k | } |
682 | | |
683 | 0 | return BPF_INS_INVALID; |
684 | 5.94k | } |
685 | | #undef SPEC_CASE |
686 | | #undef CASE |
687 | | #undef BPF_CALLX |
688 | | |
689 | | #ifndef CAPSTONE_DIET |
690 | | |
691 | | static void update_regs_access(MCInst *MI, cs_detail *detail, |
692 | | bpf_insn insn_id, unsigned int opcode) |
693 | 19.3k | { |
694 | 19.3k | if (insn_id == BPF_INS_INVALID) |
695 | 0 | return; |
696 | | /* |
697 | | * In eBPF mode, only these instructions have implicit registers access: |
698 | | * - legacy ld{w,h,b,dw} * // w: r0 |
699 | | * - exit // r: r0 |
700 | | */ |
701 | 19.3k | if (EBPF_MODE(MI->csh->mode)) { |
702 | 13.3k | switch (insn_id) { |
703 | 10.7k | default: |
704 | 10.7k | break; |
705 | 10.7k | case BPF_INS_LDABSW: |
706 | 1.32k | case BPF_INS_LDABSH: |
707 | 1.45k | case BPF_INS_LDABSB: |
708 | 1.56k | case BPF_INS_LDINDW: |
709 | 1.77k | case BPF_INS_LDINDH: |
710 | 1.85k | case BPF_INS_LDINDB: |
711 | 2.35k | case BPF_INS_LDDW: |
712 | 2.35k | if (BPF_MODE(opcode) == BPF_MODE_ABS || |
713 | 2.35k | BPF_MODE(opcode) == BPF_MODE_IND) |
714 | 2.10k | map_add_implicit_write(MI, BPF_REG_R0); |
715 | 2.35k | break; |
716 | 223 | case BPF_INS_EXIT: |
717 | 223 | map_add_implicit_read(MI, BPF_REG_R0); |
718 | 223 | break; |
719 | 13.3k | } |
720 | 13.3k | return; |
721 | 13.3k | } |
722 | | |
723 | | /* cBPF mode */ |
724 | 5.96k | switch (BPF_CLASS(opcode)) { |
725 | 833 | default: |
726 | 833 | break; |
727 | 1.29k | case BPF_CLASS_LD: |
728 | 1.29k | map_add_implicit_write(MI, BPF_REG_A); |
729 | 1.29k | break; |
730 | 726 | case BPF_CLASS_LDX: |
731 | 726 | map_add_implicit_write(MI, BPF_REG_X); |
732 | 726 | break; |
733 | 21 | case BPF_CLASS_ST: |
734 | 21 | map_add_implicit_read(MI, BPF_REG_A); |
735 | 21 | break; |
736 | 15 | case BPF_CLASS_STX: |
737 | 15 | map_add_implicit_read(MI, BPF_REG_X); |
738 | 15 | break; |
739 | 2.09k | case BPF_CLASS_ALU: |
740 | 2.09k | map_add_implicit_read(MI, BPF_REG_A); |
741 | 2.09k | map_add_implicit_write(MI, BPF_REG_A); |
742 | 2.09k | break; |
743 | 938 | case BPF_CLASS_JMP: |
744 | 938 | if (insn_id != BPF_INS_JA) // except the unconditional jump |
745 | 868 | map_add_implicit_read(MI, BPF_REG_A); |
746 | 938 | break; |
747 | | /* case BPF_CLASS_RET: */ |
748 | 46 | case BPF_CLASS_MISC: |
749 | 46 | if (insn_id == BPF_INS_TAX) { |
750 | 11 | map_add_implicit_read(MI, BPF_REG_A); |
751 | 11 | map_add_implicit_write(MI, BPF_REG_X); |
752 | 35 | } else { |
753 | 35 | map_add_implicit_read(MI, BPF_REG_X); |
754 | 35 | map_add_implicit_write(MI, BPF_REG_A); |
755 | 35 | } |
756 | 46 | break; |
757 | 5.96k | } |
758 | 5.96k | } |
759 | | #endif |
760 | | |
761 | | static bool setFinalOpcode(MCInst *MI, const bpf_internal *bpf) |
762 | 19.3k | { |
763 | 19.3k | bpf_insn id = BPF_INS_INVALID; |
764 | 19.3k | #ifndef CAPSTONE_DIET |
765 | 19.3k | cs_detail *detail; |
766 | | |
767 | 19.3k | detail = get_detail(MI); |
768 | 19.3k | #endif |
769 | | |
770 | 19.3k | const uint16_t opcode = bpf->op; |
771 | 19.3k | switch (BPF_CLASS(opcode)) { |
772 | 0 | default: // will never happen |
773 | 0 | break; |
774 | 3.64k | case BPF_CLASS_LD: |
775 | 5.62k | case BPF_CLASS_LDX: |
776 | 5.62k | if (EBPF_MODE(MI->csh->mode)) |
777 | 3.60k | id = op2insn_ld_ebpf(opcode); |
778 | 2.01k | else |
779 | 2.01k | id = op2insn_ld_cbpf(opcode); |
780 | 5.62k | add_group(MI, BPF_GRP_LOAD); |
781 | 5.62k | break; |
782 | 626 | case BPF_CLASS_ST: |
783 | 1.39k | case BPF_CLASS_STX: |
784 | 1.39k | id = op2insn_st(opcode, bpf->k); |
785 | 1.39k | add_group(MI, BPF_GRP_STORE); |
786 | 1.39k | break; |
787 | 3.39k | case BPF_CLASS_ALU: |
788 | 3.39k | id = op2insn_alu(opcode, bpf->offset, EBPF_MODE(MI->csh->mode)); |
789 | 3.39k | add_group(MI, BPF_GRP_ALU); |
790 | 3.39k | break; |
791 | 3.74k | case BPF_CLASS_JMP: |
792 | 3.74k | id = op2insn_jmp(opcode); |
793 | 3.74k | #ifndef CAPSTONE_DIET |
794 | 3.74k | if (id == BPF_INS_CALL || id == BPF_INS_CALLX) |
795 | 248 | add_group(MI, BPF_GRP_CALL); |
796 | 3.50k | else if (id == BPF_INS_EXIT) |
797 | 223 | add_group(MI, BPF_GRP_RETURN); |
798 | 3.27k | else |
799 | 3.27k | add_group(MI, BPF_GRP_JUMP); |
800 | 3.74k | #endif |
801 | 3.74k | break; |
802 | 3.04k | case BPF_CLASS_RET: |
803 | | /* case BPF_CLASS_JMP32: */ |
804 | 3.04k | if (EBPF_MODE(MI->csh->mode)) { |
805 | 2.21k | id = op2insn_jmp(opcode); |
806 | 2.21k | add_group(MI, BPF_GRP_JUMP); |
807 | 2.21k | } else { |
808 | 833 | id = BPF_INS_RET; |
809 | 833 | add_group(MI, BPF_GRP_RETURN); |
810 | 833 | } |
811 | 3.04k | break; |
812 | | // BPF_CLASS_MISC and BPF_CLASS_ALU64 have exactly same value |
813 | 2.16k | case BPF_CLASS_MISC: |
814 | | /* case BPF_CLASS_ALU64: */ |
815 | 2.16k | if (EBPF_MODE(MI->csh->mode)) { |
816 | | // ALU64 in eBPF |
817 | 2.11k | id = op2insn_alu(opcode, bpf->offset, true); |
818 | 2.11k | add_group(MI, BPF_GRP_ALU); |
819 | 2.11k | } else { |
820 | 46 | if (BPF_MISCOP(opcode) == BPF_MISCOP_TXA) |
821 | 35 | id = BPF_INS_TXA; |
822 | 11 | else |
823 | 11 | id = BPF_INS_TAX; |
824 | 46 | add_group(MI, BPF_GRP_MISC); |
825 | 46 | } |
826 | 2.16k | break; |
827 | 19.3k | } |
828 | | |
829 | 19.3k | if (id == BPF_INS_INVALID) |
830 | 61 | return false; |
831 | | |
832 | 19.3k | MCInst_setOpcodePub(MI, id); |
833 | 19.3k | #undef PUSH_GROUP |
834 | | |
835 | 19.3k | #ifndef CAPSTONE_DIET |
836 | 19.3k | if (detail) { |
837 | 19.3k | update_regs_access(MI, detail, id, opcode); |
838 | 19.3k | } |
839 | 19.3k | #endif |
840 | 19.3k | return true; |
841 | 19.3k | } |
842 | | |
843 | | bool BPF_getInstruction(csh ud, const uint8_t *code, size_t code_len, |
844 | | MCInst *instr, uint16_t *size, uint64_t address, |
845 | | void *info) |
846 | 19.9k | { |
847 | 19.9k | bpf_internal *bpf; |
848 | | |
849 | 19.9k | if (EBPF_MODE(instr->csh->mode)) |
850 | 13.8k | bpf = fetch_ebpf(instr, code, code_len); |
851 | 6.10k | else |
852 | 6.10k | bpf = fetch_cbpf(instr, code, code_len); |
853 | 19.9k | if (bpf == NULL) |
854 | 358 | return false; |
855 | 19.5k | if (!getInstruction(instr, bpf) || !setFinalOpcode(instr, bpf)) { |
856 | 272 | cs_mem_free(bpf); |
857 | 272 | return false; |
858 | 272 | } |
859 | 19.3k | MCInst_setOpcode(instr, bpf->op); |
860 | | |
861 | 19.3k | *size = bpf->insn_size; |
862 | 19.3k | cs_mem_free(bpf); |
863 | | |
864 | 19.3k | return true; |
865 | 19.5k | } |
866 | | |
867 | | #endif |