extern crate goblin;
extern crate rand;
extern crate scroll;
use byteorder::{ByteOrder, LittleEndian};
use ebpf;
use elf::goblin::{
elf::{header::*, reloc::*, section_header::*, Elf},
error::Error as GoblinError,
};
use std::{collections::HashMap, mem, ops::Range, str};
use thiserror::Error;
#[derive(Debug, Error, PartialEq)]
pub enum ELFError {
#[error("Failed to parse ELF file: {0}")]
FailedToParse(String),
#[error("Entrypoint out of bounds")]
EntrypointOutOfBounds,
#[error("Invaid entrypoint")]
InvalidEntrypoint,
#[error("Failed to get section {0}")]
FailedToGetSection(String),
#[error("Unresolved symbol ({0}) at instruction #{1:?} (ELF file offset {2:#x})")]
UnresolvedSymbol(String, usize, usize),
#[error("Section not found: {0}")]
SectionNotFound(String),
#[error("Relative jump out of bounds at instruction #{0}")]
RelativeJumpOutOfBounds(usize),
#[error("Relocation hash collision while encoding instruction #{0}")]
RelocationHashCollision(usize),
#[error("Incompatible ELF: wrong endianess")]
WrongEndianess,
#[error("Incompatible ELF: wrong ABI")]
WrongABI,
#[error("Incompatible ELF: wrong machine")]
WrongMachine,
#[error("Incompatible ELF: wrong class")]
WrongClass,
#[error("Multiple text sections, consider removing llc option: -function-sections")]
MultipleTextSections,
#[error(".bss section not supported")]
BSSNotSupported,
#[error("Relocation failed, no loadable section contains virtual address {0:#x}")]
AddressOutsideLoadableSection(u64),
#[error("Relocation failed, invalid referenced virtual address {0:#x}")]
InvalidVirtualAddress(u64),
#[error("Relocation failed, unknown type {0:?}")]
UnknownRelocation(u32),
#[error("Failed to read relocation info")]
FailedToReadRelocationInfo,
#[error("Incompatible ELF: wrong type")]
WrongType,
#[error("Unknown symbol with index {0}")]
UnknownSymbol(usize),
#[error("Offset or value is out of bounds")]
OutOfBounds,
}
impl From<GoblinError> for ELFError {
fn from(error: GoblinError) -> Self {
match error {
GoblinError::Malformed(string) => Self::FailedToParse(format!("malformed: {}", string)),
GoblinError::BadMagic(magic) => Self::FailedToParse(format!("bad magic: {:#x}", magic)),
GoblinError::Scroll(error) => Self::FailedToParse(format!("read-write: {}", error)),
GoblinError::IO(error) => Self::FailedToParse(format!("io: {}", error)),
}
}
}
const BYTE_OFFSET_IMMEDIATE: usize = 4;
const BYTE_LENGTH_IMMEIDATE: usize = 4;
#[allow(non_camel_case_types)]
#[derive(Debug, PartialEq, Copy, Clone)]
enum BPFRelocationType {
R_BPF_NONE = 0,
R_BPF_64_RELATIVE = 8,
R_BPF_64_32 = 10,
}
impl BPFRelocationType {
fn from_x86_relocation_type(from: u32) -> Option<BPFRelocationType> {
match from {
R_X86_64_NONE => Some(BPFRelocationType::R_BPF_NONE),
R_X86_64_RELATIVE => Some(BPFRelocationType::R_BPF_64_RELATIVE),
R_X86_64_32 => Some(BPFRelocationType::R_BPF_64_32),
_ => None,
}
}
}
#[derive(Debug, PartialEq)]
struct SectionInfo {
vaddr: u64,
offset_range: Range<usize>,
}
#[derive(Debug, PartialEq)]
pub struct EBpfElf {
elf_bytes: Vec<u8>,
entrypoint: usize,
text_section_info: SectionInfo,
ro_section_infos: Vec<SectionInfo>,
calls: HashMap<u32, usize>,
}
impl EBpfElf {
pub fn load(bytes: &[u8]) -> Result<Self, ELFError> {
let mut elf = Elf::parse(bytes)?;
let mut elf_bytes = bytes.to_vec();
Self::validate(&elf, &elf_bytes)?;
let mut calls = HashMap::default();
Self::relocate(&elf, &mut elf_bytes, &mut calls)?;
let text_section = Self::get_section(&elf, ".text")?;
let offset = elf.header.e_entry - text_section.sh_addr;
if offset % ebpf::INSN_SIZE as u64 != 0 {
return Err(ELFError::InvalidEntrypoint);
}
let entrypoint = offset as usize / ebpf::INSN_SIZE;
let text_section_info = SectionInfo {
vaddr: ebpf::MM_PROGRAM_START + text_section.sh_addr,
offset_range: text_section.file_range(),
};
let ro_section_infos = elf
.section_headers
.iter()
.filter_map(|section_header| {
if let Some(Ok(this_name)) = elf.shdr_strtab.get(section_header.sh_name) {
if this_name == ".rodata"
|| this_name == ".data.rel.ro"
|| this_name == ".eh_frame"
{
return Some(SectionInfo {
vaddr: ebpf::MM_PROGRAM_START + section_header.sh_addr,
offset_range: section_header.file_range(),
});
}
}
None
})
.collect();
Ok(Self {
elf_bytes,
entrypoint,
text_section_info,
ro_section_infos,
calls,
})
}
pub fn get_text_bytes(&self) -> Result<(u64, &[u8]), ELFError> {
Ok((
self.text_section_info.vaddr,
&self
.elf_bytes
.get(self.text_section_info.offset_range.clone())
.ok_or(ELFError::OutOfBounds)?,
))
}
pub fn get_ro_sections(&self) -> Result<Vec<(u64, &[u8])>, ELFError> {
self.ro_section_infos
.iter()
.map(|section_info| {
Ok((
section_info.vaddr,
self.elf_bytes
.get(section_info.offset_range.clone())
.ok_or(ELFError::OutOfBounds)?,
))
})
.collect::<Result<Vec<_>, ELFError>>()
}
pub fn get_entrypoint_instruction_offset(&self) -> Result<usize, ELFError> {
Ok(self.entrypoint)
}
pub fn lookup_bpf_call(&self, hash: u32) -> Option<&usize> {
self.calls.get(&hash)
}
pub fn report_unresolved_symbol(&self, insn_offset: usize) -> Result<(), ELFError> {
let elf = Elf::parse(&self.elf_bytes)?;
let text_section = Self::get_section(&elf, ".text")?;
let file_offset = insn_offset * ebpf::INSN_SIZE + text_section.sh_offset as usize;
let mut name = "Unknown";
for relocation in &elf.dynrels {
match BPFRelocationType::from_x86_relocation_type(relocation.r_type) {
Some(BPFRelocationType::R_BPF_64_32) => {
if relocation.r_offset as usize == file_offset {
let sym = elf
.dynsyms
.get(relocation.r_sym)
.ok_or(ELFError::UnknownSymbol(relocation.r_sym))?;
name = elf
.dynstrtab
.get(sym.st_name)
.ok_or(ELFError::UnknownSymbol(sym.st_name))?
.map_err(|_| ELFError::UnknownSymbol(sym.st_name))?;
}
}
_ => (),
}
}
Err(ELFError::UnresolvedSymbol(
name.to_string(),
file_offset / ebpf::INSN_SIZE + ebpf::ELF_INSN_DUMP_OFFSET,
file_offset,
))
}
pub fn fixup_relative_calls(
calls: &mut HashMap<u32, usize>,
elf_bytes: &mut [u8],
) -> Result<(), ELFError> {
for i in 0..elf_bytes.len() / ebpf::INSN_SIZE {
let mut insn = ebpf::get_insn(elf_bytes, i);
if insn.opc == 0x85 && insn.imm != -1 {
let insn_idx = i as isize + 1 + insn.imm as isize;
if insn_idx < 0 || insn_idx >= (elf_bytes.len() / ebpf::INSN_SIZE) as isize {
return Err(ELFError::RelativeJumpOutOfBounds(
i + ebpf::ELF_INSN_DUMP_OFFSET,
));
}
let mut key = [0u8; mem::size_of::<i64>()];
LittleEndian::write_u64(&mut key, i as u64);
let hash = ebpf::hash_symbol_name(&key);
if calls.insert(hash, insn_idx as usize).is_some() {
return Err(ELFError::RelocationHashCollision(
i + ebpf::ELF_INSN_DUMP_OFFSET,
));
}
insn.imm = hash as i32;
let mut checked_slice = elf_bytes
.get_mut(i * ebpf::INSN_SIZE..(i * ebpf::INSN_SIZE) + ebpf::INSN_SIZE)
.ok_or(ELFError::OutOfBounds)?;
checked_slice.copy_from_slice(&insn.to_vec());
}
}
Ok(())
}
pub fn validate(elf: &Elf, elf_bytes: &[u8]) -> Result<(), ELFError> {
if elf.header.e_ident[EI_CLASS] != ELFCLASS64 {
return Err(ELFError::WrongClass);
}
if elf.header.e_ident[EI_DATA] != ELFDATA2LSB {
return Err(ELFError::WrongEndianess);
}
if elf.header.e_ident[EI_OSABI] != ELFOSABI_NONE {
return Err(ELFError::WrongABI);
}
if elf.header.e_machine != EM_BPF {
return Err(ELFError::WrongMachine);
}
if elf.header.e_type != ET_DYN {
return Err(ELFError::WrongType);
}
let num_text_sections = elf.section_headers.iter().fold(0, |count, section_header| {
if let Some(Ok(this_name)) = elf.shdr_strtab.get(section_header.sh_name) {
if this_name == ".text" {
return count + 1;
}
}
count
});
if 1 != num_text_sections {
return Err(ELFError::MultipleTextSections);
}
for section_header in elf.section_headers.iter() {
if let Some(Ok(this_name)) = elf.shdr_strtab.get(section_header.sh_name) {
if this_name == ".bss" {
return Err(ELFError::BSSNotSupported);
}
}
}
for section_header in &elf.section_headers {
let start = section_header.sh_offset as usize;
let end = section_header
.sh_offset
.checked_add(section_header.sh_size)
.ok_or(ELFError::OutOfBounds)? as usize;
let _ = elf_bytes.get(start..end).ok_or(ELFError::OutOfBounds)?;
}
let text_section = Self::get_section(elf, ".text")?;
if !text_section
.vm_range()
.contains(&(elf.header.e_entry as usize))
{
return Err(ELFError::EntrypointOutOfBounds);
}
Ok(())
}
fn get_section(elf: &Elf, name: &str) -> Result<SectionHeader, ELFError> {
match elf.section_headers.iter().find(|section_header| {
if let Some(Ok(this_name)) = elf.shdr_strtab.get(section_header.sh_name) {
return this_name == name;
}
false
}) {
Some(section) => Ok(section.clone()),
None => Err(ELFError::SectionNotFound(name.to_string())),
}
}
fn relocate(
elf: &Elf,
elf_bytes: &mut [u8],
calls: &mut HashMap<u32, usize>,
) -> Result<(), ELFError> {
let text_section = Self::get_section(elf, ".text")?;
Self::fixup_relative_calls(
calls,
&mut elf_bytes
.get_mut(text_section.file_range())
.ok_or(ELFError::OutOfBounds)?,
)?;
for relocation in &elf.dynrels {
match BPFRelocationType::from_x86_relocation_type(relocation.r_type) {
Some(BPFRelocationType::R_BPF_64_RELATIVE) => {
let imm_offset = relocation.r_offset as usize + BYTE_OFFSET_IMMEDIATE;
let checked_slice = elf_bytes
.get(imm_offset..imm_offset + BYTE_LENGTH_IMMEIDATE)
.ok_or(ELFError::OutOfBounds)?;
let refd_va = LittleEndian::read_u32(&checked_slice) as u64;
if refd_va == 0 {
return Err(ELFError::InvalidVirtualAddress(refd_va));
}
let refd_pa = ebpf::MM_PROGRAM_START + refd_va;
if text_section
.file_range()
.contains(&(relocation.r_offset as usize))
{
let mut checked_slice = elf_bytes
.get_mut(imm_offset..imm_offset + BYTE_LENGTH_IMMEIDATE)
.ok_or(ELFError::OutOfBounds)?;
LittleEndian::write_u32(&mut checked_slice, (refd_pa & 0xFFFFFFFF) as u32);
let mut checked_slice = elf_bytes
.get_mut(
imm_offset + ebpf::INSN_SIZE
..imm_offset + ebpf::INSN_SIZE + BYTE_LENGTH_IMMEIDATE,
)
.ok_or(ELFError::OutOfBounds)?;
LittleEndian::write_u32(&mut checked_slice, (refd_pa >> 32) as u32);
} else {
let mut checked_slice = elf_bytes
.get_mut(
relocation.r_offset as usize
..relocation.r_offset as usize + mem::size_of::<u64>(),
)
.ok_or(ELFError::OutOfBounds)?;
LittleEndian::write_u64(&mut checked_slice, refd_pa);
}
}
Some(BPFRelocationType::R_BPF_64_32) => {
let sym = elf
.dynsyms
.get(relocation.r_sym)
.ok_or(ELFError::UnknownSymbol(relocation.r_sym))?;
let name = elf
.dynstrtab
.get(sym.st_name)
.ok_or(ELFError::UnknownSymbol(sym.st_name))?
.map_err(|_| ELFError::UnknownSymbol(sym.st_name))?;
let hash = ebpf::hash_symbol_name(&name.as_bytes());
let imm_offset = relocation.r_offset as usize + BYTE_OFFSET_IMMEDIATE;
let mut checked_slice = elf_bytes
.get_mut(imm_offset..imm_offset + BYTE_LENGTH_IMMEIDATE)
.ok_or(ELFError::OutOfBounds)?;
LittleEndian::write_u32(&mut checked_slice, hash);
let text_section = Self::get_section(elf, ".text")?;
if sym.is_function() && sym.st_value != 0 {
if !text_section.vm_range().contains(&(sym.st_value as usize)) {
return Err(ELFError::OutOfBounds);
}
calls.insert(
hash,
(sym.st_value - text_section.sh_addr) as usize / ebpf::INSN_SIZE,
);
}
}
_ => return Err(ELFError::UnknownRelocation(relocation.r_type)),
}
}
Ok(())
}
#[allow(dead_code)]
fn dump_data(name: &str, prog: &[u8]) {
let mut eight_bytes: Vec<u8> = Vec::new();
println!("{}", name);
for i in prog.iter() {
if eight_bytes.len() >= 7 {
println!("{:02X?}", eight_bytes);
eight_bytes.clear();
} else {
eight_bytes.push(*i);
}
}
}
}
#[cfg(test)]
mod test {
use super::*;
use crate::fuzz;
use ebpf;
use elf::scroll::Pwrite;
use rand::{distributions::Uniform, Rng};
use std::{collections::HashMap, fs::File, io::Read};
#[test]
fn test_validate() {
let mut file = File::open("tests/elfs/noop.so").expect("file open failed");
let mut bytes = Vec::new();
file.read_to_end(&mut bytes)
.expect("failed to read elf file");
let mut parsed_elf = Elf::parse(&bytes).unwrap();
let mut elf_bytes = bytes.to_vec();
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect("validation failed");
parsed_elf.header.e_ident[EI_CLASS] = ELFCLASS32;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect_err("allowed bad class");
parsed_elf.header.e_ident[EI_CLASS] = ELFCLASS64;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect("validation failed");
parsed_elf.header.e_ident[EI_DATA] = ELFDATA2MSB;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect_err("allowed big endian");
parsed_elf.header.e_ident[EI_DATA] = ELFDATA2LSB;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect("validation failed");
parsed_elf.header.e_ident[EI_OSABI] = 1;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect_err("allowed wrong abi");
parsed_elf.header.e_ident[EI_OSABI] = ELFOSABI_NONE;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect("validation failed");
parsed_elf.header.e_machine = EM_QDSP6;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect_err("allowed wrong machine");
parsed_elf.header.e_machine = EM_BPF;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect("validation failed");
parsed_elf.header.e_type = ET_REL;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect_err("allowed wrong type");
parsed_elf.header.e_type = ET_DYN;
EBpfElf::validate(&parsed_elf, &mut elf_bytes).expect("validation failed");
}
#[test]
fn test_load() {
let mut file = File::open("tests/elfs/noop.so").expect("file open failed");
let mut elf_bytes = Vec::new();
file.read_to_end(&mut elf_bytes)
.expect("failed to read elf file");
EBpfElf::load(&elf_bytes).expect("validation failed");
}
#[test]
fn test_entrypoint() {
let mut file = File::open("tests/elfs/noop.so").expect("file open failed");
let mut elf_bytes = Vec::new();
file.read_to_end(&mut elf_bytes)
.expect("failed to read elf file");
let mut elf = EBpfElf::load(&elf_bytes).expect("validation failed");
let mut parsed_elf = Elf::parse(&elf_bytes).unwrap();
let initial_e_entry = parsed_elf.header.e_entry;
assert_eq!(
0,
elf.get_entrypoint_instruction_offset()
.expect("failed to get entrypoint")
);
parsed_elf.header.e_entry = parsed_elf.header.e_entry + 8;
let mut elf_bytes = elf_bytes.clone();
elf_bytes.pwrite(parsed_elf.header, 0).unwrap();
let mut elf = EBpfElf::load(&elf_bytes).expect("validation failed");
assert_eq!(
1,
elf.get_entrypoint_instruction_offset()
.expect("failed to get entrypoint")
);
parsed_elf.header.e_entry = 1;
let mut elf_bytes = elf_bytes.clone();
elf_bytes.pwrite(parsed_elf.header, 0).unwrap();
assert_eq!(
Err(ELFError::EntrypointOutOfBounds),
EBpfElf::load(&elf_bytes)
);
parsed_elf.header.e_entry = std::u64::MAX;
let mut elf_bytes = elf_bytes.clone();
elf_bytes.pwrite(parsed_elf.header, 0).unwrap();
assert_eq!(
Err(ELFError::EntrypointOutOfBounds),
EBpfElf::load(&elf_bytes)
);
parsed_elf.header.e_entry = initial_e_entry + ebpf::INSN_SIZE as u64 + 1;
let mut elf_bytes = elf_bytes.clone();
elf_bytes.pwrite(parsed_elf.header, 0).unwrap();
assert_eq!(Err(ELFError::InvalidEntrypoint), EBpfElf::load(&elf_bytes));
parsed_elf.header.e_entry = initial_e_entry;
let mut elf_bytes = elf_bytes.clone();
elf_bytes.pwrite(parsed_elf.header, 0).unwrap();
let mut elf = EBpfElf::load(&elf_bytes).expect("validation failed");
assert_eq!(
0,
elf.get_entrypoint_instruction_offset()
.expect("failed to get entrypoint")
);
}
#[test]
fn test_fixup_relative_calls_back() {
let mut calls: HashMap<u32, usize> = HashMap::new();
#[rustfmt::skip]
let mut prog = vec![
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x85, 0x10, 0x00, 0x00, 0xfe, 0xff, 0xff, 0xff];
EBpfElf::fixup_relative_calls(&mut calls, &mut prog).unwrap();
let key = ebpf::hash_symbol_name(&[5, 0, 0, 0, 0, 0, 0, 0]);
let insn = ebpf::Insn {
opc: 0x85,
dst: 0,
src: 1,
off: 0,
imm: key as i32,
};
assert_eq!(insn.to_array(), prog[40..]);
assert_eq!(*calls.get(&key).unwrap(), 4);
let mut calls: HashMap<u32, usize> = HashMap::new();
prog.splice(44.., vec![0xfa, 0xff, 0xff, 0xff]);
EBpfElf::fixup_relative_calls(&mut calls, &mut prog).unwrap();
let key = ebpf::hash_symbol_name(&[5, 0, 0, 0, 0, 0, 0, 0]);
let insn = ebpf::Insn {
opc: 0x85,
dst: 0,
src: 1,
off: 0,
imm: key as i32,
};
assert_eq!(insn.to_array(), prog[40..]);
assert_eq!(*calls.get(&key).unwrap(), 0);
}
#[test]
fn test_fixup_relative_calls_forward() {
let mut calls: HashMap<u32, usize> = HashMap::new();
#[rustfmt::skip]
let mut prog = vec![
0x85, 0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00];
EBpfElf::fixup_relative_calls(&mut calls, &mut prog).unwrap();
let key = ebpf::hash_symbol_name(&[0, 0, 0, 0, 0, 0, 0, 0]);
let insn = ebpf::Insn {
opc: 0x85,
dst: 0,
src: 1,
off: 0,
imm: key as i32,
};
assert_eq!(insn.to_array(), prog[..8]);
assert_eq!(*calls.get(&key).unwrap(), 1);
let mut calls: HashMap<u32, usize> = HashMap::new();
prog.splice(4..8, vec![0x04, 0x00, 0x00, 0x00]);
EBpfElf::fixup_relative_calls(&mut calls, &mut prog).unwrap();
let key = ebpf::hash_symbol_name(&[0, 0, 0, 0, 0, 0, 0, 0]);
let insn = ebpf::Insn {
opc: 0x85,
dst: 0,
src: 1,
off: 0,
imm: key as i32,
};
assert_eq!(insn.to_array(), prog[..8]);
assert_eq!(*calls.get(&key).unwrap(), 5);
}
#[test]
#[should_panic(
expected = "called `Result::unwrap()` on an `Err` value: RelativeJumpOutOfBounds(29)"
)]
fn test_fixup_relative_calls_out_of_bounds_forward() {
let mut calls: HashMap<u32, usize> = HashMap::new();
#[rustfmt::skip]
let mut prog = vec![
0x85, 0x10, 0x00, 0x00, 0x05, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00];
EBpfElf::fixup_relative_calls(&mut calls, &mut prog).unwrap();
let key = ebpf::hash_symbol_name(&[0]);
let insn = ebpf::Insn {
opc: 0x85,
dst: 0,
src: 1,
off: 0,
imm: key as i32,
};
assert_eq!(insn.to_array(), prog[..8]);
assert_eq!(*calls.get(&key).unwrap(), 1);
}
#[test]
#[should_panic(
expected = "called `Result::unwrap()` on an `Err` value: RelativeJumpOutOfBounds(34)"
)]
fn test_fixup_relative_calls_out_of_bounds_back() {
let mut calls: HashMap<u32, usize> = HashMap::new();
#[rustfmt::skip]
let mut prog = vec![
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0xb7, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x85, 0x10, 0x00, 0x00, 0xf9, 0xff, 0xff, 0xff];
EBpfElf::fixup_relative_calls(&mut calls, &mut prog).unwrap();
let key = ebpf::hash_symbol_name(&[5]);
let insn = ebpf::Insn {
opc: 0x85,
dst: 0,
src: 1,
off: 0,
imm: key as i32,
};
assert_eq!(insn.to_array(), prog[40..]);
assert_eq!(*calls.get(&key).unwrap(), 4);
}
#[test]
#[ignore]
fn test_fuzz_load() {
let mut rng = rand::thread_rng();
let range = Uniform::new(0, 255);
println!("random bytes");
for _ in 0..1_000 {
let elf_bytes: Vec<u8> = (0..100).map(|_| rng.sample(&range)).collect();
let _ = EBpfElf::load(&elf_bytes);
}
let mut file = File::open("tests/elfs/noop.so").expect("file open failed");
let mut elf_bytes = Vec::new();
file.read_to_end(&mut elf_bytes)
.expect("failed to read elf file");
let mut parsed_elf = Elf::parse(&elf_bytes).unwrap();
println!("mangle elf header");
fuzz(
&elf_bytes,
1_000_000,
100,
0..parsed_elf.header.e_ehsize as usize,
0..255,
|bytes: &mut [u8]| {
let _ = EBpfElf::load(bytes);
},
);
println!("mangle section headers");
fuzz(
&elf_bytes,
1_000_000,
100,
parsed_elf.header.e_shoff as usize..elf_bytes.len(),
0..255,
|bytes: &mut [u8]| {
let _ = EBpfElf::load(bytes);
},
);
println!("mangle whole elf");
fuzz(
&elf_bytes,
1_000_000,
100,
0..elf_bytes.len(),
0..255,
|bytes: &mut [u8]| {
let _ = EBpfElf::load(bytes);
},
);
}
}