1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #ifndef SANDBOX_LINUX_SECCOMP_BPF_CODEGEN_H__
6 #define SANDBOX_LINUX_SECCOMP_BPF_CODEGEN_H__
14 #include "base/macros.h"
15 #include "base/tuple.h"
16 #include "sandbox/sandbox_export.h"
22 // The code generator implements a basic assembler that can convert a
23 // graph of BPF instructions into a well-formed array of BPF
24 // instructions. Most notably, it ensures that jumps are always
25 // forward and don't exceed the limit of 255 instructions imposed by
26 // the instruction set.
28 // Callers would typically create a new CodeGen object and then use it
29 // to build a DAG of instruction nodes. They'll eventually call
30 // Compile() to convert this DAG to a Program.
33 // CodeGen::Node allow, branch, dag;
36 // gen.MakeInstruction(BPF_RET+BPF_K,
37 // ErrorCode(ErrorCode::ERR_ALLOWED).err()));
39 // gen.MakeInstruction(BPF_JMP+BPF_EQ+BPF_K, __NR_getpid,
40 // Trap(GetPidHandler, NULL), allow);
42 // gen.MakeInstruction(BPF_LD+BPF_W+BPF_ABS,
43 // offsetof(struct arch_seccomp_data, nr), branch);
45 // // Simplified code follows; in practice, it is important to avoid calling
46 // // any C++ destructors after starting the sandbox.
47 // CodeGen::Program program;
48 // gen.Compile(dag, program);
49 // const struct sock_fprog prog = {
50 // static_cast<unsigned short>(program->size()), &program[0] };
51 // prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog);
53 class SANDBOX_EXPORT CodeGen
{
55 // A vector of BPF instructions that need to be installed as a filter
56 // program in the kernel.
57 typedef std::vector
<struct sock_filter
> Program
;
59 // Node represents a node within the instruction DAG being compiled.
60 using Node
= Program::size_type
;
62 // kNullNode represents the "null" node; i.e., the reserved node
63 // value guaranteed to not equal any actual nodes.
64 static const Node kNullNode
= -1;
69 // MakeInstruction creates a node representing the specified
70 // instruction, or returns and existing equivalent node if one
71 // exists. For details on the possible parameters refer to
72 // https://www.kernel.org/doc/Documentation/networking/filter.txt.
73 // TODO(mdempsky): Reconsider using default arguments here.
74 Node
MakeInstruction(uint16_t code
,
79 // Compile linearizes the instruction DAG rooted at |head| into a
80 // program that can be executed by a BPF virtual machine.
81 void Compile(Node head
, Program
* program
);
84 using MemoKey
= Tuple4
<uint16_t, uint32_t, Node
, Node
>;
86 bool operator()(const MemoKey
& lhs
, const MemoKey
& rhs
) const;
89 // AppendInstruction adds a new instruction, ensuring that |jt| and
90 // |jf| are within range as necessary for |code|.
91 Node
AppendInstruction(uint16_t code
, uint32_t k
, Node jt
, Node jf
);
93 // WithinRange returns a node equivalent to |next| that is at most
94 // |range| instructions away from the (logical) beginning of the
96 Node
WithinRange(Node next
, size_t range
);
98 // Append appends a new instruction to the physical end (i.e.,
99 // logical beginning) of |program_|.
100 Node
Append(uint16_t code
, uint32_t k
, size_t jt
, size_t jf
);
102 // Offset returns how many instructions exist in |program_| after |target|.
103 size_t Offset(Node target
) const;
105 // NOTE: program_ is the compiled program in *reverse*, so that
106 // indices remain stable as we add instructions.
109 std::map
<MemoKey
, Node
, MemoKeyLess
> memos_
;
111 DISALLOW_COPY_AND_ASSIGN(CodeGen
);
114 } // namespace sandbox
116 #endif // SANDBOX_LINUX_SECCOMP_BPF_CODEGEN_H__