linux/tools/testing/selftests/bpf/progs/mem_rdonly_untrusted.c
Eduard Zingerman f1f5d6f25d selftests/bpf: ptr_to_btf_id struct walk ending with primitive pointer
Validate that reading a PTR_TO_BTF_ID field produces a value of type
PTR_TO_MEM|MEM_RDONLY|PTR_UNTRUSTED, if field is a pointer to a
primitive type.

Acked-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Signed-off-by: Eduard Zingerman <eddyz87@gmail.com>
Link: https://lore.kernel.org/r/20250704230354.1323244-4-eddyz87@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2025-07-07 08:25:06 -07:00

229 lines
4 KiB
C

// SPDX-License-Identifier: GPL-2.0
#include <vmlinux.h>
#include <bpf/bpf_core_read.h>
#include "bpf_misc.h"
#include "../test_kmods/bpf_testmod_kfunc.h"
SEC("tp_btf/sys_enter")
__success
__log_level(2)
__msg("r8 = *(u64 *)(r7 +0) ; R7_w=ptr_nameidata(off={{[0-9]+}}) R8_w=rdonly_untrusted_mem(sz=0)")
__msg("r9 = *(u8 *)(r8 +0) ; R8_w=rdonly_untrusted_mem(sz=0) R9_w=scalar")
int btf_id_to_ptr_mem(void *ctx)
{
struct task_struct *task;
struct nameidata *idata;
u64 ret, off;
task = bpf_get_current_task_btf();
idata = task->nameidata;
off = bpf_core_field_offset(struct nameidata, pathname);
/*
* asm block to have reliable match target for __msg, equivalent of:
* ret = task->nameidata->pathname[0];
*/
asm volatile (
"r7 = %[idata];"
"r7 += %[off];"
"r8 = *(u64 *)(r7 + 0);"
"r9 = *(u8 *)(r8 + 0);"
"%[ret] = r9;"
: [ret]"=r"(ret)
: [idata]"r"(idata),
[off]"r"(off)
: "r7", "r8", "r9");
return ret;
}
SEC("socket")
__success
__retval(0)
int ldx_is_ok_bad_addr(void *ctx)
{
char *p;
if (!bpf_core_enum_value_exists(enum bpf_features, BPF_FEAT_RDONLY_CAST_TO_VOID))
return 42;
p = bpf_rdonly_cast(0, 0);
return p[0x7fff];
}
SEC("socket")
__success
__retval(1)
int ldx_is_ok_good_addr(void *ctx)
{
int v, *p;
v = 1;
p = bpf_rdonly_cast(&v, 0);
return *p;
}
SEC("socket")
__success
int offset_not_tracked(void *ctx)
{
int *p, i, s;
p = bpf_rdonly_cast(0, 0);
s = 0;
bpf_for(i, 0, 1000 * 1000 * 1000) {
p++;
s += *p;
}
return s;
}
SEC("socket")
__failure
__msg("cannot write into rdonly_untrusted_mem")
int stx_not_ok(void *ctx)
{
int v, *p;
v = 1;
p = bpf_rdonly_cast(&v, 0);
*p = 1;
return 0;
}
SEC("socket")
__failure
__msg("cannot write into rdonly_untrusted_mem")
int atomic_not_ok(void *ctx)
{
int v, *p;
v = 1;
p = bpf_rdonly_cast(&v, 0);
__sync_fetch_and_add(p, 1);
return 0;
}
SEC("socket")
__failure
__msg("cannot write into rdonly_untrusted_mem")
int atomic_rmw_not_ok(void *ctx)
{
long v, *p;
v = 1;
p = bpf_rdonly_cast(&v, 0);
return __sync_val_compare_and_swap(p, 0, 42);
}
SEC("socket")
__failure
__msg("invalid access to memory, mem_size=0 off=0 size=4")
__msg("R1 min value is outside of the allowed memory range")
int kfunc_param_not_ok(void *ctx)
{
int *p;
p = bpf_rdonly_cast(0, 0);
bpf_kfunc_trusted_num_test(p);
return 0;
}
SEC("?fentry.s/" SYS_PREFIX "sys_getpgid")
__failure
__msg("R1 type=rdonly_untrusted_mem expected=")
int helper_param_not_ok(void *ctx)
{
char *p;
p = bpf_rdonly_cast(0, 0);
/*
* Any helper with ARG_CONST_SIZE_OR_ZERO constraint will do,
* the most permissive constraint
*/
bpf_copy_from_user(p, 0, (void *)42);
return 0;
}
static __noinline u64 *get_some_addr(void)
{
if (bpf_get_prandom_u32())
return bpf_rdonly_cast(0, bpf_core_type_id_kernel(struct sock));
else
return bpf_rdonly_cast(0, 0);
}
SEC("socket")
__success
__retval(0)
int mixed_mem_type(void *ctx)
{
u64 *p;
/* Try to avoid compiler hoisting load to if branches by using __noinline func. */
p = get_some_addr();
return *p;
}
__attribute__((__aligned__(8)))
u8 global[] = {
0x11, 0x22, 0x33, 0x44,
0x55, 0x66, 0x77, 0x88,
0x99
};
__always_inline
static u64 combine(void *p)
{
u64 acc;
acc = 0;
#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
acc |= (*(u64 *)p >> 56) << 24;
acc |= (*(u32 *)p >> 24) << 16;
acc |= (*(u16 *)p >> 8) << 8;
acc |= *(u8 *)p;
#else
acc |= (*(u64 *)p & 0xff) << 24;
acc |= (*(u32 *)p & 0xff) << 16;
acc |= (*(u16 *)p & 0xff) << 8;
acc |= *(u8 *)p;
#endif
return acc;
}
SEC("socket")
__retval(0x88442211)
int diff_size_access(void *ctx)
{
return combine(bpf_rdonly_cast(&global, 0));
}
SEC("socket")
__retval(0x99553322)
int misaligned_access(void *ctx)
{
return combine(bpf_rdonly_cast(&global, 0) + 1);
}
__weak int return_one(void)
{
return 1;
}
SEC("socket")
__success
__retval(1)
int null_check(void *ctx)
{
int *p;
p = bpf_rdonly_cast(0, 0);
if (p == 0)
/* make this a function call to avoid compiler
* moving r0 assignment before check.
*/
return return_one();
return 0;
}
char _license[] SEC("license") = "GPL";