mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

Certain bpf syscall subcommands are available for usage from both userspace and the kernel. LSM modules or eBPF gatekeeper programs may need to take a different course of action depending on whether or not a BPF syscall originated from the kernel or userspace. Additionally, some of the bpf_attr struct fields contain pointers to arbitrary memory. Currently the functionality to determine whether or not a pointer refers to kernel memory or userspace memory is exposed to the bpf verifier, but that information is missing from various LSM hooks. Here we augment the LSM hooks to provide this data, by simply passing a boolean flag indicating whether or not the call originated in the kernel, in any hook that contains a bpf_attr struct that corresponds to a subcommand that may be called from the kernel. Signed-off-by: Blaise Boscaccy <bboscaccy@linux.microsoft.com> Acked-by: Song Liu <song@kernel.org> Acked-by: Paul Moore <paul@paul-moore.com> Link: https://lore.kernel.org/r/20250310221737.821889-2-bboscaccy@linux.microsoft.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
71 lines
1.6 KiB
C
71 lines
1.6 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (C) 2023 Yafang Shao <laoar.shao@gmail.com> */
|
|
|
|
#include "vmlinux.h"
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
#include <bpf/bpf_core_read.h>
|
|
|
|
__u32 target_ancestor_level;
|
|
__u64 target_ancestor_cgid;
|
|
int target_pid, target_hid;
|
|
|
|
struct cgroup *bpf_task_get_cgroup1(struct task_struct *task, int hierarchy_id) __ksym;
|
|
struct cgroup *bpf_cgroup_ancestor(struct cgroup *cgrp, int level) __ksym;
|
|
void bpf_cgroup_release(struct cgroup *cgrp) __ksym;
|
|
|
|
static int bpf_link_create_verify(int cmd)
|
|
{
|
|
struct cgroup *cgrp, *ancestor;
|
|
struct task_struct *task;
|
|
int ret = 0;
|
|
|
|
if (cmd != BPF_LINK_CREATE)
|
|
return 0;
|
|
|
|
task = bpf_get_current_task_btf();
|
|
|
|
/* Then it can run in parallel with others */
|
|
if (task->pid != target_pid)
|
|
return 0;
|
|
|
|
cgrp = bpf_task_get_cgroup1(task, target_hid);
|
|
if (!cgrp)
|
|
return 0;
|
|
|
|
/* Refuse it if its cgid or its ancestor's cgid is the target cgid */
|
|
if (cgrp->kn->id == target_ancestor_cgid)
|
|
ret = -1;
|
|
|
|
ancestor = bpf_cgroup_ancestor(cgrp, target_ancestor_level);
|
|
if (!ancestor)
|
|
goto out;
|
|
|
|
if (ancestor->kn->id == target_ancestor_cgid)
|
|
ret = -1;
|
|
bpf_cgroup_release(ancestor);
|
|
|
|
out:
|
|
bpf_cgroup_release(cgrp);
|
|
return ret;
|
|
}
|
|
|
|
SEC("lsm/bpf")
|
|
int BPF_PROG(lsm_run, int cmd, union bpf_attr *attr, unsigned int size, bool kernel)
|
|
{
|
|
return bpf_link_create_verify(cmd);
|
|
}
|
|
|
|
SEC("lsm.s/bpf")
|
|
int BPF_PROG(lsm_s_run, int cmd, union bpf_attr *attr, unsigned int size, bool kernel)
|
|
{
|
|
return bpf_link_create_verify(cmd);
|
|
}
|
|
|
|
SEC("fentry")
|
|
int BPF_PROG(fentry_run)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
char _license[] SEC("license") = "GPL";
|