netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Stanislav Fomichev <sdf@fomichev.me>
To: Quentin Monnet <quentin.monnet@netronome.com>
Cc: Alexei Starovoitov <ast@kernel.org>,
	Daniel Borkmann <daniel@iogearbox.net>,
	netdev@vger.kernel.org, oss-drivers@netronome.com,
	Arnaldo Carvalho de Melo <acme@kernel.org>,
	Jesper Dangaard Brouer <brouer@redhat.com>,
	Stanislav Fomichev <sdf@google.com>
Subject: Re: [PATCH bpf-next 2/8] tools: bpftool: add probes for /proc/ eBPF parameters
Date: Thu, 13 Dec 2018 18:58:56 -0800	[thread overview]
Message-ID: <20181214025856.GD31012@mini-arch.hsd1.ca.comcast.net> (raw)
In-Reply-To: <20181213121922.6652-3-quentin.monnet@netronome.com>

On 12/13, Quentin Monnet wrote:
> Add a set of probes to dump the eBPF-related parameters available from
> /proc/: availability of bpf() syscall for unprivileged users,
> JIT compiler status and hardening status, kallsyms exports status.
> 
> Sample output:
> 
>     # bpftool feature probe kernel
>     Scanning system configuration...
>     bpf() syscall for unprivileged users is enabled
>     JIT compiler is disabled
>     JIT compiler hardening is disabled
>     JIT compiler kallsyms exports are disabled
>     ...
> 
>     # bpftool --json --pretty feature probe kernel
>     {
>         "system_config": {
>             "unprivileged_bpf_disabled": 0,
>             "bpf_jit_enable": 0,
>             "bpf_jit_harden": 0,
>             "bpf_jit_kallsyms": 0
>         },
>         ...
>     }
> 

[..]

>     # bpftool feature probe kernel macros prefix BPFTOOL_
>     #define UNPRIVILEGED_BPF_DISABLED UNPRIVILEGED_BPF_DISABLED_OFF
>     #define  UNPRIVILEGED_BPF_DISABLED_OFF 0
>     #define  UNPRIVILEGED_BPF_DISABLED_ON 1
>     #define  UNPRIVILEGED_BPF_DISABLED_UNKNOWN -1
This looks a bit complicated. For example, why not simply define:

#define UNPRIVILEGED_BPF_DISABLED 1 /* when it's explicitly disabled */
#define UNPRIVILEGED_BPF_ENABLED  1 /* when it's explicitly enabled */
#define UNPRIVILEGED_BPF_UNKNOWN  1 /* when unknown - maybe even skip
this altogether and treat unknown == disabled (worst case) */

Then, I, as a potential user, can do:

#if defined(UNPRIVILEGED_BPF_ENABLED)
/* do something useful */
#elif defined(UNPRIVILEGED_BPF_DISABLED)
/* print an error asking to use root */
#else
/* try anyway, fallback to error ? */
#endif

IMO, if don't want to do stuff like:

#if UNPRIVILEGED_BPF_DISABLED == UNPRIVILEGED_BPF_DISABLED_OFF
#elif UNPRIVILEGED_BPF_DISABLED == UNPRIVILEGED_BPF_DISABLED_ON
#else
#endif

I live in my mental model if ifdefs, not complicated cpp #if
comparisons.

Just a suggestion, I feel like we can keep it simple.

>     #define JIT_COMPILER_ENABLE JIT_COMPILER_ENABLE_OFF
>     #define  JIT_COMPILER_ENABLE_OFF 0
>     #define  JIT_COMPILER_ENABLE_ON 1
>     #define  JIT_COMPILER_ENABLE_ON_WITH_DEBUG 2
>     #define  JIT_COMPILER_ENABLE_UNKNOWN -1
Same here:
JIT_COMPILER_ENABLED
JIT_COMPILER_ENABLED_WITH_DEBUG
JIT_COMPILER_DISABLED
JIT_COMPILER_UNKNOWN

And so on...
>     #define JIT_COMPILER_HARDEN JIT_COMPILER_HARDEN_OFF
>     #define  JIT_COMPILER_HARDEN_OFF 0
>     #define  JIT_COMPILER_HARDEN_FOR_UNPRIVILEGED 1
>     #define  JIT_COMPILER_HARDEN_FOR_ALL_USERS 2
>     #define  JIT_COMPILER_HARDEN_UNKNOWN -1
>     #define JIT_COMPILER_KALLSYMS JIT_COMPILER_KALLSYMS_OFF
>     #define  JIT_COMPILER_KALLSYMS_OFF 0
>     #define  JIT_COMPILER_KALLSYMS_FOR_ROOT 1
>     #define  JIT_COMPILER_KALLSYMS_UNKNOWN -1
>     ...
> 
> These probes are skipped if procfs is not mounted.
> 
> Signed-off-by: Quentin Monnet <quentin.monnet@netronome.com>
> Reviewed-by: Jakub Kicinski <jakub.kicinski@netronome.com>
> ---
>  tools/bpf/bpftool/feature.c | 271 ++++++++++++++++++++++++++++++++++++
>  1 file changed, 271 insertions(+)
> 
> diff --git a/tools/bpf/bpftool/feature.c b/tools/bpf/bpftool/feature.c
> index e1784611575d..9fa7016c7d21 100644
> --- a/tools/bpf/bpftool/feature.c
> +++ b/tools/bpf/bpftool/feature.c
> @@ -5,6 +5,7 @@
>  #include <string.h>
>  #include <unistd.h>
>  #include <sys/utsname.h>
> +#include <sys/vfs.h>
>  
>  #include <linux/filter.h>
>  #include <linux/limits.h>
> @@ -13,11 +14,29 @@
>  
>  #include "main.h"
>  
> +#ifndef PROC_SUPER_MAGIC
> +# define PROC_SUPER_MAGIC	0x9fa0
> +#endif
> +
>  enum probe_component {
>  	COMPONENT_UNSPEC,
>  	COMPONENT_KERNEL,
>  };
>  
> +/* Miscellaneous utility functions */
> +
> +static bool check_procfs(void)
> +{
> +	struct statfs st_fs;
> +
> +	if (statfs("/proc", &st_fs) < 0)
> +		return false;
> +	if ((unsigned long)st_fs.f_type != PROC_SUPER_MAGIC)
> +		return false;
> +
> +	return true;
> +}
> +
>  /* Printing utility functions */
>  
>  static void
> @@ -49,6 +68,236 @@ print_start_section(const char *json_title, const char *define_comment,
>  
>  /* Probing functions */
>  
> +static int read_procfs(const char *path)
> +{
> +	char *endptr, *line = NULL;
> +	size_t len = 0;
> +	FILE *fd;
> +	int res;
> +
> +	fd = fopen(path, "r");
> +	if (!fd)
> +		return -1;
> +
> +	res = getline(&line, &len, fd);
> +	fclose(fd);
> +	if (res < 0)
> +		return -1;
> +
> +	errno = 0;
> +	res = strtol(line, &endptr, 10);
> +	if (errno || *line == '\0' || *endptr != '\n')
> +		res = -1;
> +	free(line);
> +
> +	return res;
> +}
> +
> +static void probe_unprivileged_disabled(const char *define_prefix)
> +{
> +	int res;
> +
> +	res = read_procfs("/proc/sys/kernel/unprivileged_bpf_disabled");
> +	if (json_output) {
> +		jsonw_int_field(json_wtr, "unprivileged_bpf_disabled", res);
> +	} else if (define_prefix) {
> +		printf("#define %sUNPRIVILEGED_BPF_DISABLED ", define_prefix);
> +		switch (res) {
> +		case 0:
> +			printf("%sUNPRIVILEGED_BPF_DISABLED_OFF\n",
> +			       define_prefix);
> +			break;
> +		case 1:
> +			printf("%sUNPRIVILEGED_BPF_DISABLED_ON\n",
> +			       define_prefix);
> +			break;
> +		case -1:
> +			printf("%sUNPRIVILEGED_BPF_DISABLED_UNKNOWN\n",
> +			       define_prefix);
> +			break;
> +		default:
> +			printf("%d\n", res);
> +		}
> +		printf("#define  %sUNPRIVILEGED_BPF_DISABLED_OFF 0\n",
> +		       define_prefix);
> +		printf("#define  %sUNPRIVILEGED_BPF_DISABLED_ON 1\n",
> +		       define_prefix);
> +		printf("#define  %sUNPRIVILEGED_BPF_DISABLED_UNKNOWN -1\n",
> +		       define_prefix);
> +	} else {
> +		switch (res) {
> +		case 0:
> +			printf("bpf() syscall for unprivileged users is enabled\n");
> +			break;
> +		case 1:
> +			printf("bpf() syscall restricted to privileged users\n");
> +			break;
> +		case -1:
> +			printf("Unable to retrieve required privileges for bpf() syscall\n");
> +			break;
> +		default:
> +			printf("bpf() syscall restriction has unknown value %d\n", res);
> +		}
> +	}
> +}
> +
> +static void probe_jit_enable(const char *define_prefix)
> +{
> +	int res;
> +
> +	res = read_procfs("/proc/sys/net/core/bpf_jit_enable");
> +	if (json_output) {
> +		jsonw_int_field(json_wtr, "bpf_jit_enable", res);
> +	} else if (define_prefix) {
> +		printf("#define %sJIT_COMPILER_ENABLE ", define_prefix);
> +		switch (res) {
> +		case 0:
> +			printf("%sJIT_COMPILER_ENABLE_OFF\n", define_prefix);
> +			break;
> +		case 1:
> +			printf("%sJIT_COMPILER_ENABLE_ON\n", define_prefix);
> +			break;
> +		case 2:
> +			printf("%sJIT_COMPILER_ENABLE_ON_WITH_DEBUG\n",
> +			       define_prefix);
> +			break;
> +		case -1:
> +			printf("%sJIT_COMPILER_ENABLE_UNKNOWN\n",
> +			       define_prefix);
> +			break;
> +		default:
> +			printf("%d\n", res);
> +		}
> +		printf("#define  %sJIT_COMPILER_ENABLE_OFF 0\n", define_prefix);
> +		printf("#define  %sJIT_COMPILER_ENABLE_ON 1\n", define_prefix);
> +		printf("#define  %sJIT_COMPILER_ENABLE_ON_WITH_DEBUG 2\n",
> +		       define_prefix);
> +		printf("#define  %sJIT_COMPILER_ENABLE_UNKNOWN -1\n",
> +		       define_prefix);
> +	} else {
> +		switch (res) {
> +		case 0:
> +			printf("JIT compiler is disabled\n");
> +			break;
> +		case 1:
> +			printf("JIT compiler is enabled\n");
> +			break;
> +		case 2:
> +			printf("JIT compiler is enabled with debugging traces in kernel logs\n");
> +			break;
> +		case -1:
> +			printf("Unable to retrieve JIT-compiler status\n");
> +			break;
> +		default:
> +			printf("JIT-compiler status has unknown value %d\n",
> +			       res);
> +		}
> +	}
> +}
> +
> +static void probe_jit_harden(const char *define_prefix)
> +{
> +	int res;
> +
> +	res = read_procfs("/proc/sys/net/core/bpf_jit_harden");
> +	if (json_output) {
> +		jsonw_int_field(json_wtr, "bpf_jit_harden", res);
> +	} else if (define_prefix) {
> +		printf("#define %sJIT_COMPILER_HARDEN ", define_prefix);
> +		switch (res) {
> +		case 0:
> +			printf("%sJIT_COMPILER_HARDEN_OFF\n", define_prefix);
> +			break;
> +		case 1:
> +			printf("%sJIT_COMPILER_HARDEN_FOR_UNPRIVILEGED\n",
> +			       define_prefix);
> +			break;
> +		case 2:
> +			printf("%sJIT_COMPILER_HARDEN_FOR_ALL_USERS\n",
> +			       define_prefix);
> +			break;
> +		case -1:
> +			printf("%sJIT_COMPILER_HARDEN_UNKNOWN\n",
> +			       define_prefix);
> +			break;
> +		default:
> +			printf("%d\n", res);
> +		}
> +		printf("#define  %sJIT_COMPILER_HARDEN_OFF 0\n", define_prefix);
> +		printf("#define  %sJIT_COMPILER_HARDEN_FOR_UNPRIVILEGED 1\n",
> +		       define_prefix);
> +		printf("#define  %sJIT_COMPILER_HARDEN_FOR_ALL_USERS 2\n",
> +		       define_prefix);
> +		printf("#define  %sJIT_COMPILER_HARDEN_UNKNOWN -1\n",
> +		       define_prefix);
> +	} else {
> +		switch (res) {
> +		case 0:
> +			printf("JIT compiler hardening is disabled\n");
> +			break;
> +		case 1:
> +			printf("JIT compiler hardening is enabled for unprivileged users\n");
> +			break;
> +		case 2:
> +			printf("JIT compiler hardening is enabled for all users\n");
> +			break;
> +		case -1:
> +			printf("Unable to retrieve JIT hardening status\n");
> +			break;
> +		default:
> +			printf("JIT hardening status has unknown value %d\n",
> +			       res);
> +		}
> +	}
> +}
> +
> +static void probe_jit_kallsyms(const char *define_prefix)
> +{
> +	int res;
> +
> +	res = read_procfs("/proc/sys/net/core/bpf_jit_kallsyms");
> +	if (json_output) {
> +		jsonw_int_field(json_wtr, "bpf_jit_kallsyms", res);
> +	} else if (define_prefix) {
> +		printf("#define %sJIT_COMPILER_KALLSYMS ", define_prefix);
> +		switch (res) {
> +		case 0:
> +			printf("%sJIT_COMPILER_KALLSYMS_OFF\n", define_prefix);
> +			break;
> +		case 1:
> +			printf("%sJIT_COMPILER_KALLSYMS_FOR_ROOT\n",
> +			       define_prefix);
> +			break;
> +		case -1:
> +			printf("%sJIT_COMPILER_KALLSYMS_UNKNOWN\n",
> +			       define_prefix);
> +			break;
> +		default:
> +			printf("%d\n", res);
> +		}
> +		printf("#define  %sJIT_COMPILER_KALLSYMS_OFF 0\n",
> +		       define_prefix);
> +		printf("#define  %sJIT_COMPILER_KALLSYMS_FOR_ROOT 1\n",
> +		       define_prefix);
> +		printf("#define  %sJIT_COMPILER_KALLSYMS_UNKNOWN -1\n",
> +		       define_prefix);
> +	} else {
> +		switch (res) {
> +		case 0:
> +			printf("JIT compiler kallsyms exports are disabled\n");
> +			break;
> +		case 1:
> +			printf("JIT compiler kallsyms exports are enabled for root\n");
> +			break;
> +		case -1:
> +			printf("Unable to retrieve JIT kallsyms export status\n");
> +			break;
> +		default:
> +			printf("JIT kallsyms exports status has unknown value %d\n", res);
> +		}
> +	}
> +}
> +
>  static int probe_kernel_version(const char *define_prefix)
>  {
>  	int version, subversion, patchlevel, code = 0;
> @@ -138,6 +387,28 @@ static int do_probe(int argc, char **argv)
>  	if (json_output)
>  		jsonw_start_object(json_wtr);
>  
> +	switch (target) {
> +	case COMPONENT_KERNEL:
> +	case COMPONENT_UNSPEC:
> +		print_start_section("system_config",
> +				    "/*** System configuration ***/",
> +				    "Scanning system configuration...",
> +				    define_prefix);
> +		if (check_procfs()) {
> +			probe_unprivileged_disabled(define_prefix);
> +			probe_jit_enable(define_prefix);
> +			probe_jit_harden(define_prefix);
> +			probe_jit_kallsyms(define_prefix);
> +		} else {
> +			p_info("/* procfs not mounted, skipping related probes */");
> +		}
> +		if (json_output)
> +			jsonw_end_object(json_wtr);
> +		else
> +			printf("\n");
> +		break;
> +	}
> +
>  	print_start_section("syscall_config",
>  			    "/*** System call and kernel version ***/",
>  			    "Scanning system call and kernel version...",
> -- 
> 2.17.1
> 

  reply	other threads:[~2018-12-14  2:58 UTC|newest]

Thread overview: 41+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-12-13 12:19 [PATCH bpf-next 0/8] tools: bpftool: add probes for system and device Quentin Monnet
2018-12-13 12:19 ` [PATCH bpf-next 1/8] tools: bpftool: add basic probe capability, probe syscall and kversion Quentin Monnet
2018-12-14  2:50   ` Stanislav Fomichev
2018-12-14 11:27     ` Quentin Monnet
2018-12-14 18:45       ` Stanislav Fomichev
2018-12-15  3:31         ` Quentin Monnet
2018-12-14 23:35   ` Daniel Borkmann
2018-12-15  3:31     ` Quentin Monnet
2018-12-13 12:19 ` [PATCH bpf-next 2/8] tools: bpftool: add probes for /proc/ eBPF parameters Quentin Monnet
2018-12-14  2:58   ` Stanislav Fomichev [this message]
2018-12-14 11:27     ` Quentin Monnet
2018-12-14 23:40   ` Daniel Borkmann
2018-12-15  3:31     ` Quentin Monnet
2018-12-16  0:14       ` Daniel Borkmann
2018-12-17 10:44         ` Quentin Monnet
2018-12-17 11:11           ` Daniel Borkmann
2018-12-13 12:19 ` [PATCH bpf-next 3/8] tools: bpftool: add probes for kernel configuration options Quentin Monnet
2018-12-14 23:56   ` Daniel Borkmann
2018-12-15  3:32     ` Quentin Monnet
2018-12-19 18:49       ` Quentin Monnet
2018-12-13 12:19 ` [PATCH bpf-next 4/8] tools: bpftool: add probes for eBPF program types Quentin Monnet
2018-12-13 12:19 ` [PATCH bpf-next 5/8] tools: bpftool: add probes for eBPF map types Quentin Monnet
2018-12-13 12:19 ` [PATCH bpf-next 6/8] tools: bpftool: add probes for eBPF helper functions Quentin Monnet
2018-12-15  0:08   ` Daniel Borkmann
2018-12-15  3:32     ` Quentin Monnet
2018-12-15 23:57       ` Daniel Borkmann
2018-12-17 10:18         ` Quentin Monnet
2018-12-18  0:42           ` Daniel Borkmann
2018-12-19 19:02             ` Quentin Monnet
2018-12-13 12:19 ` [PATCH bpf-next 7/8] tools: bpftool: add probes for a network device Quentin Monnet
2018-12-13 12:19 ` [PATCH bpf-next 8/8] tools: bpftool: add bash completion for bpftool probes Quentin Monnet
2018-12-13 13:03 ` [PATCH bpf-next 0/8] tools: bpftool: add probes for system and device Arnaldo Carvalho de Melo
2018-12-13 13:49   ` Debugging eBPF was: " Arnaldo Carvalho de Melo
2018-12-13 20:55     ` Alexei Starovoitov
2018-12-14 13:39       ` Arnaldo Carvalho de Melo
2018-12-14 11:53 ` Quentin Monnet
2018-12-14 18:21   ` Stanislav Fomichev
2018-12-14 18:41     ` [oss-drivers] " Quentin Monnet
2018-12-14 14:00 ` Arnaldo Carvalho de Melo
2018-12-14 14:56   ` Quentin Monnet
2018-12-14 17:26     ` Arnaldo Carvalho de Melo

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20181214025856.GD31012@mini-arch.hsd1.ca.comcast.net \
    --to=sdf@fomichev.me \
    --cc=acme@kernel.org \
    --cc=ast@kernel.org \
    --cc=brouer@redhat.com \
    --cc=daniel@iogearbox.net \
    --cc=netdev@vger.kernel.org \
    --cc=oss-drivers@netronome.com \
    --cc=quentin.monnet@netronome.com \
    --cc=sdf@google.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).