~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/tools/testing/selftests/bpf/progs/cgrp_kfunc_failure.c

Version: ~ [ linux-6.11.5 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.58 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.114 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.169 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.228 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.284 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.322 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.9 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

  1 // SPDX-License-Identifier: GPL-2.0
  2 /* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */
  3 
  4 #include <vmlinux.h>
  5 #include <bpf/bpf_tracing.h>
  6 #include <bpf/bpf_helpers.h>
  7 
  8 #include "bpf_misc.h"
  9 #include "cgrp_kfunc_common.h"
 10 
 11 char _license[] SEC("license") = "GPL";
 12 
 13 /* Prototype for all of the program trace events below:
 14  *
 15  * TRACE_EVENT(cgroup_mkdir,
 16  *         TP_PROTO(struct cgroup *cgrp, const char *path),
 17  *         TP_ARGS(cgrp, path)
 18  */
 19 
 20 static struct __cgrps_kfunc_map_value *insert_lookup_cgrp(struct cgroup *cgrp)
 21 {
 22         int status;
 23 
 24         status = cgrps_kfunc_map_insert(cgrp);
 25         if (status)
 26                 return NULL;
 27 
 28         return cgrps_kfunc_map_value_lookup(cgrp);
 29 }
 30 
 31 SEC("tp_btf/cgroup_mkdir")
 32 __failure __msg("Possibly NULL pointer passed to trusted arg0")
 33 int BPF_PROG(cgrp_kfunc_acquire_untrusted, struct cgroup *cgrp, const char *path)
 34 {
 35         struct cgroup *acquired;
 36         struct __cgrps_kfunc_map_value *v;
 37 
 38         v = insert_lookup_cgrp(cgrp);
 39         if (!v)
 40                 return 0;
 41 
 42         /* Can't invoke bpf_cgroup_acquire() on an untrusted pointer. */
 43         acquired = bpf_cgroup_acquire(v->cgrp);
 44         if (acquired)
 45                 bpf_cgroup_release(acquired);
 46 
 47         return 0;
 48 }
 49 
 50 SEC("tp_btf/cgroup_mkdir")
 51 __failure __msg("Possibly NULL pointer passed to trusted arg0")
 52 int BPF_PROG(cgrp_kfunc_acquire_no_null_check, struct cgroup *cgrp, const char *path)
 53 {
 54         struct cgroup *acquired;
 55 
 56         acquired = bpf_cgroup_acquire(cgrp);
 57         /*
 58          * Can't invoke bpf_cgroup_release() without checking the return value
 59          * of bpf_cgroup_acquire().
 60          */
 61         bpf_cgroup_release(acquired);
 62 
 63         return 0;
 64 }
 65 
 66 SEC("tp_btf/cgroup_mkdir")
 67 __failure __msg("arg#0 pointer type STRUCT cgroup must point")
 68 int BPF_PROG(cgrp_kfunc_acquire_fp, struct cgroup *cgrp, const char *path)
 69 {
 70         struct cgroup *acquired, *stack_cgrp = (struct cgroup *)&path;
 71 
 72         /* Can't invoke bpf_cgroup_acquire() on a random frame pointer. */
 73         acquired = bpf_cgroup_acquire((struct cgroup *)&stack_cgrp);
 74         if (acquired)
 75                 bpf_cgroup_release(acquired);
 76 
 77         return 0;
 78 }
 79 
 80 SEC("kretprobe/cgroup_destroy_locked")
 81 __failure __msg("calling kernel function bpf_cgroup_acquire is not allowed")
 82 int BPF_PROG(cgrp_kfunc_acquire_unsafe_kretprobe, struct cgroup *cgrp)
 83 {
 84         struct cgroup *acquired;
 85 
 86         /* Can't acquire an untrusted struct cgroup * pointer. */
 87         acquired = bpf_cgroup_acquire(cgrp);
 88         if (acquired)
 89                 bpf_cgroup_release(acquired);
 90 
 91         return 0;
 92 }
 93 
 94 SEC("tp_btf/cgroup_mkdir")
 95 __failure __msg("cgrp_kfunc_acquire_trusted_walked")
 96 int BPF_PROG(cgrp_kfunc_acquire_trusted_walked, struct cgroup *cgrp, const char *path)
 97 {
 98         struct cgroup *acquired;
 99 
100         /* Can't invoke bpf_cgroup_acquire() on a pointer obtained from walking a trusted cgroup. */
101         acquired = bpf_cgroup_acquire(cgrp->old_dom_cgrp);
102         if (acquired)
103                 bpf_cgroup_release(acquired);
104 
105         return 0;
106 }
107 
108 SEC("tp_btf/cgroup_mkdir")
109 __failure __msg("Possibly NULL pointer passed to trusted arg0")
110 int BPF_PROG(cgrp_kfunc_acquire_null, struct cgroup *cgrp, const char *path)
111 {
112         struct cgroup *acquired;
113 
114         /* Can't invoke bpf_cgroup_acquire() on a NULL pointer. */
115         acquired = bpf_cgroup_acquire(NULL);
116         if (acquired)
117                 bpf_cgroup_release(acquired);
118 
119         return 0;
120 }
121 
122 SEC("tp_btf/cgroup_mkdir")
123 __failure __msg("Unreleased reference")
124 int BPF_PROG(cgrp_kfunc_acquire_unreleased, struct cgroup *cgrp, const char *path)
125 {
126         struct cgroup *acquired;
127 
128         acquired = bpf_cgroup_acquire(cgrp);
129 
130         /* Acquired cgroup is never released. */
131         __sink(acquired);
132 
133         return 0;
134 }
135 
136 SEC("tp_btf/cgroup_mkdir")
137 __failure __msg("Unreleased reference")
138 int BPF_PROG(cgrp_kfunc_xchg_unreleased, struct cgroup *cgrp, const char *path)
139 {
140         struct cgroup *kptr;
141         struct __cgrps_kfunc_map_value *v;
142 
143         v = insert_lookup_cgrp(cgrp);
144         if (!v)
145                 return 0;
146 
147         kptr = bpf_kptr_xchg(&v->cgrp, NULL);
148         if (!kptr)
149                 return 0;
150 
151         /* Kptr retrieved from map is never released. */
152 
153         return 0;
154 }
155 
156 SEC("tp_btf/cgroup_mkdir")
157 __failure __msg("must be referenced or trusted")
158 int BPF_PROG(cgrp_kfunc_rcu_get_release, struct cgroup *cgrp, const char *path)
159 {
160         struct cgroup *kptr;
161         struct __cgrps_kfunc_map_value *v;
162 
163         v = insert_lookup_cgrp(cgrp);
164         if (!v)
165                 return 0;
166 
167         bpf_rcu_read_lock();
168         kptr = v->cgrp;
169         if (kptr)
170                 /* Can't release a cgroup kptr stored in a map. */
171                 bpf_cgroup_release(kptr);
172         bpf_rcu_read_unlock();
173 
174         return 0;
175 }
176 
177 SEC("tp_btf/cgroup_mkdir")
178 __failure __msg("Possibly NULL pointer passed to trusted arg0")
179 int BPF_PROG(cgrp_kfunc_release_untrusted, struct cgroup *cgrp, const char *path)
180 {
181         struct __cgrps_kfunc_map_value *v;
182 
183         v = insert_lookup_cgrp(cgrp);
184         if (!v)
185                 return 0;
186 
187         /* Can't invoke bpf_cgroup_release() on an untrusted pointer. */
188         bpf_cgroup_release(v->cgrp);
189 
190         return 0;
191 }
192 
193 SEC("tp_btf/cgroup_mkdir")
194 __failure __msg("arg#0 pointer type STRUCT cgroup must point")
195 int BPF_PROG(cgrp_kfunc_release_fp, struct cgroup *cgrp, const char *path)
196 {
197         struct cgroup *acquired = (struct cgroup *)&path;
198 
199         /* Cannot release random frame pointer. */
200         bpf_cgroup_release(acquired);
201 
202         return 0;
203 }
204 
205 SEC("tp_btf/cgroup_mkdir")
206 __failure __msg("Possibly NULL pointer passed to trusted arg0")
207 int BPF_PROG(cgrp_kfunc_release_null, struct cgroup *cgrp, const char *path)
208 {
209         struct __cgrps_kfunc_map_value local, *v;
210         long status;
211         struct cgroup *acquired, *old;
212         s32 id;
213 
214         status = bpf_probe_read_kernel(&id, sizeof(id), &cgrp->self.id);
215         if (status)
216                 return 0;
217 
218         local.cgrp = NULL;
219         status = bpf_map_update_elem(&__cgrps_kfunc_map, &id, &local, BPF_NOEXIST);
220         if (status)
221                 return status;
222 
223         v = bpf_map_lookup_elem(&__cgrps_kfunc_map, &id);
224         if (!v)
225                 return -ENOENT;
226 
227         acquired = bpf_cgroup_acquire(cgrp);
228         if (!acquired)
229                 return -ENOENT;
230 
231         old = bpf_kptr_xchg(&v->cgrp, acquired);
232 
233         /* old cannot be passed to bpf_cgroup_release() without a NULL check. */
234         bpf_cgroup_release(old);
235 
236         return 0;
237 }
238 
239 SEC("tp_btf/cgroup_mkdir")
240 __failure __msg("release kernel function bpf_cgroup_release expects")
241 int BPF_PROG(cgrp_kfunc_release_unacquired, struct cgroup *cgrp, const char *path)
242 {
243         /* Cannot release trusted cgroup pointer which was not acquired. */
244         bpf_cgroup_release(cgrp);
245 
246         return 0;
247 }
248 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php