From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6534AC433F5 for ; Tue, 19 Apr 2022 19:02:09 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1357492AbiDSTEt (ORCPT ); Tue, 19 Apr 2022 15:04:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51104 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357537AbiDSTEF (ORCPT ); Tue, 19 Apr 2022 15:04:05 -0400 Received: from mail-yw1-x114a.google.com (mail-yw1-x114a.google.com [IPv6:2607:f8b0:4864:20::114a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 691643F8B4 for ; Tue, 19 Apr 2022 12:01:17 -0700 (PDT) Received: by mail-yw1-x114a.google.com with SMTP id 00721157ae682-2ebfdbe01f6so153380277b3.10 for ; Tue, 19 Apr 2022 12:01:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=+hP7tIoCUuYkQ+zjPRTuNKjqZ9jjmEEj0aj+0w5l79w=; b=g3b2g7jHMxTvUo6hv/ph8Rgcf3nplkB5t0OWATOkufPHnwymvu3C553RRafkAXfhQA yUH/pxnV1ha26rwAoqqHTyolav3gWSJ4kFKin+2vusoFcE7oX9oIh8FdqiDRwNXcCRv2 CfvSZ6ClGtt/SpvFsEI5FeMCgmMIW45rV9hiYSxJJUasrfLgLjSCm+nCZ8i701qH4f2r TiTa28iFa98tdLR7dXDwlOJvN109jX9DfAIDVlLLuw4LKUBqBwwgITpDiTRf2Din4M9K DXLLe6liMGRKGRMlT3XE5uM8qQUNsIZ+962koOsiNCTpiRj7Q8Lup26yu/BGgxWQN/i9 A5XQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=+hP7tIoCUuYkQ+zjPRTuNKjqZ9jjmEEj0aj+0w5l79w=; b=sEMXNWJ9QrFSP/omcwBcclWm0/T+tUn1KKsKszJ3cNj+ReKIVl3otTwuZeWzgaFRoL ZJCYtT/rifuy079edXCDups3UWf12KlpYO3W/g53J3vwOWNFI3Uy/r+3KSD1qYhnraWL MJmxxK6L4MWa/ACYwghYhwehmT+JIKlEHan0W7iR0/Lv6OsGXdaLqbFs/Agma/12CVzT 7SQnTrV0k0gYFUY2DNRSxBvPLqPFNtqmQXoemIKzxsFFCygEobF8OWcrZCTvXsL6QsXF 9rws/tNkdVZQ64dD2G1GoGw0khUFCXcUF6rZbeDhsz/8grJriCsRYYRBhVAarecEiDsH eyDw== X-Gm-Message-State: AOAM530PxGV1cOa48H4a6+3EteXgx5jR5BL/A2EvqpkrpjAIpJR4RET8 9dnmJSv9JeuamgYEj11lv9xswVI= X-Google-Smtp-Source: ABdhPJw0Aul9eK3DLWjQE1fqUb+rsC6AWoqIXQy8zlVqWFWgcegHpJuYpt4GHaPvn4FN85zVENCFOh8= X-Received: from sdf2.svl.corp.google.com ([2620:15c:2c4:201:37f:6746:8e66:a291]) (user=sdf job=sendgmr) by 2002:a81:7e0a:0:b0:2ec:e0ab:d19c with SMTP id o10-20020a817e0a000000b002ece0abd19cmr17479203ywn.465.1650394876692; Tue, 19 Apr 2022 12:01:16 -0700 (PDT) Date: Tue, 19 Apr 2022 12:00:53 -0700 In-Reply-To: <20220419190053.3395240-1-sdf@google.com> Message-Id: <20220419190053.3395240-9-sdf@google.com> Mime-Version: 1.0 References: <20220419190053.3395240-1-sdf@google.com> X-Mailer: git-send-email 2.36.0.rc0.470.gd361397f0d-goog Subject: [PATCH bpf-next v5 8/8] selftests/bpf: verify lsm_cgroup struct sock access From: Stanislav Fomichev To: netdev@vger.kernel.org, bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, Stanislav Fomichev Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org sk_priority & sk_mark are writable, the rest is readonly. Add new ldx_offset fixups to lookup the offset of struct field. Allow using test.kfunc regardless of prog_type. One interesting thing here is that the verifier doesn't really force me to add NULL checks anywhere :-/ Signed-off-by: Stanislav Fomichev --- tools/testing/selftests/bpf/test_verifier.c | 54 ++++++++++++++++++- .../selftests/bpf/verifier/lsm_cgroup.c | 34 ++++++++++++ 2 files changed, 87 insertions(+), 1 deletion(-) create mode 100644 tools/testing/selftests/bpf/verifier/lsm_cgroup.c diff --git a/tools/testing/selftests/bpf/test_verifier.c b/tools/testing/selftests/bpf/test_verifier.c index a2cd236c32eb..d6bc55c54aaa 100644 --- a/tools/testing/selftests/bpf/test_verifier.c +++ b/tools/testing/selftests/bpf/test_verifier.c @@ -75,6 +75,12 @@ struct kfunc_btf_id_pair { int insn_idx; }; +struct ldx_offset { + const char *strct; + const char *field; + int insn_idx; +}; + struct bpf_test { const char *descr; struct bpf_insn insns[MAX_INSNS]; @@ -102,6 +108,7 @@ struct bpf_test { int fixup_map_ringbuf[MAX_FIXUPS]; int fixup_map_timer[MAX_FIXUPS]; struct kfunc_btf_id_pair fixup_kfunc_btf_id[MAX_FIXUPS]; + struct ldx_offset fixup_ldx[MAX_FIXUPS]; /* Expected verifier log output for result REJECT or VERBOSE_ACCEPT. * Can be a tab-separated sequence of expected strings. An empty string * means no log verification. @@ -755,6 +762,7 @@ static void do_test_fixup(struct bpf_test *test, enum bpf_prog_type prog_type, int *fixup_map_ringbuf = test->fixup_map_ringbuf; int *fixup_map_timer = test->fixup_map_timer; struct kfunc_btf_id_pair *fixup_kfunc_btf_id = test->fixup_kfunc_btf_id; + struct ldx_offset *fixup_ldx = test->fixup_ldx; if (test->fill_helper) { test->fill_insns = calloc(MAX_TEST_INSNS, sizeof(struct bpf_insn)); @@ -967,6 +975,50 @@ static void do_test_fixup(struct bpf_test *test, enum bpf_prog_type prog_type, fixup_kfunc_btf_id++; } while (fixup_kfunc_btf_id->kfunc); } + + if (fixup_ldx->strct) { + const struct btf_member *memb; + const struct btf_type *tp; + const char *name; + struct btf *btf; + int btf_id; + int off; + int i; + + btf = btf__load_vmlinux_btf(); + + do { + off = -1; + if (!btf) + goto next_ldx; + + btf_id = btf__find_by_name_kind(btf, + fixup_ldx->strct, + BTF_KIND_STRUCT); + if (btf_id < 0) + goto next_ldx; + + tp = btf__type_by_id(btf, btf_id); + memb = btf_members(tp); + + for (i = 0; i < btf_vlen(tp); i++) { + name = btf__name_by_offset(btf, + memb->name_off); + if (strcmp(fixup_ldx->field, name) == 0) { + off = memb->offset / 8; + break; + } + memb++; + } + +next_ldx: + prog[fixup_ldx->insn_idx].off = off; + fixup_ldx++; + + } while (fixup_ldx->strct); + + btf__free(btf); + } } struct libcap { @@ -1131,7 +1183,7 @@ static void do_test_single(struct bpf_test *test, bool unpriv, opts.log_level = 4; opts.prog_flags = pflags; - if (prog_type == BPF_PROG_TYPE_TRACING && test->kfunc) { + if (test->kfunc) { int attach_btf_id; attach_btf_id = libbpf_find_vmlinux_btf_id(test->kfunc, diff --git a/tools/testing/selftests/bpf/verifier/lsm_cgroup.c b/tools/testing/selftests/bpf/verifier/lsm_cgroup.c new file mode 100644 index 000000000000..af0efe783511 --- /dev/null +++ b/tools/testing/selftests/bpf/verifier/lsm_cgroup.c @@ -0,0 +1,34 @@ +#define SK_WRITABLE_FIELD(tp, field, size, res) \ +{ \ + .descr = field, \ + .insns = { \ + /* r1 = *(u64 *)(r1 + 0) */ \ + BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_1, 0), \ + /* r1 = *(u64 *)(r1 + offsetof(struct socket, sk)) */ \ + BPF_LDX_MEM(BPF_DW, BPF_REG_1, BPF_REG_1, 0), \ + /* r2 = *(u64 *)(r1 + offsetof(struct sock, )) */ \ + BPF_LDX_MEM(size, BPF_REG_2, BPF_REG_1, 0), \ + /* *(u64 *)(r1 + offsetof(struct sock, )) = r2 */ \ + BPF_STX_MEM(size, BPF_REG_1, BPF_REG_2, 0), \ + BPF_MOV64_IMM(BPF_REG_0, 1), \ + BPF_EXIT_INSN(), \ + }, \ + .result = res, \ + .errstr = res ? "no write support to 'struct sock' at off" : "", \ + .prog_type = BPF_PROG_TYPE_LSM, \ + .expected_attach_type = BPF_LSM_CGROUP, \ + .kfunc = "socket_post_create", \ + .fixup_ldx = { \ + { "socket", "sk", 1 }, \ + { tp, field, 2 }, \ + { tp, field, 3 }, \ + }, \ +} + +SK_WRITABLE_FIELD("sock_common", "skc_family", BPF_H, REJECT), +SK_WRITABLE_FIELD("sock", "sk_sndtimeo", BPF_DW, REJECT), +SK_WRITABLE_FIELD("sock", "sk_priority", BPF_W, ACCEPT), +SK_WRITABLE_FIELD("sock", "sk_mark", BPF_W, ACCEPT), +SK_WRITABLE_FIELD("sock", "sk_pacing_rate", BPF_DW, REJECT), + +#undef SK_WRITABLE_FIELD -- 2.36.0.rc0.470.gd361397f0d-goog