From nobody Sat Apr 27 09:03:26 2024 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 54228C433FE for ; Fri, 30 Sep 2022 20:47:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231156AbiI3Urf (ORCPT ); Fri, 30 Sep 2022 16:47:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231758AbiI3Ur3 (ORCPT ); Fri, 30 Sep 2022 16:47:29 -0400 Received: from mail-qk1-f178.google.com (mail-qk1-f178.google.com [209.85.222.178]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 155641FCC80; Fri, 30 Sep 2022 13:47:27 -0700 (PDT) Received: by mail-qk1-f178.google.com with SMTP id d17so3543775qko.13; Fri, 30 Sep 2022 13:47:27 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date; bh=jL03iSEn8nbqTPX0ryu/ndd+1KOISmUpaEAI2gzB6vU=; b=adQPFbaoXjaelzFPejChDjrB899ABNCdfrTIdQxdPZ9oa9p0lrM8/f843uWmgAgn0t pNWx8hes0lVi7Dv9YL9XJsV3cuT0f8wo+zwVVY9Am3oUE8/yD7AYYou9WPLbohnHAcgy EjXwtRLWiFqMcG+tmhNH3o370b0+O3gJ16+jl5W/s5QSnll9aWVuxclqNkzqAZwaYw8Z ciRxN0ZypBuCpSdwb+W9zMYw9H0zOtw8fbnmlna2vb3tNzm7mOYjZB83tGsrEzoEeCb3 4odz3jAAqq4kRMc0cAeG6RZ/WZ3Nou7m1ycFDHDNEbydbpTnDG8AHEgpvAuQfQS/G61A LFBw== X-Gm-Message-State: ACrzQf2xIR7m0L+BuBbiccrRlur1Uqvt+d0MObimakvnZDJ3HOZyaBdb Icl0iSmdAYyMIVkDhYUYLjk= X-Google-Smtp-Source: AMsMyM4k985WTzrOA/j6Foc42MXzKn+w7OmMgITF1PH4NVmNHc4FWXtCmqWMRlqF6ctHu9V6O0kLKg== X-Received: by 2002:a05:620a:462b:b0:6ce:7dce:82d6 with SMTP id br43-20020a05620a462b00b006ce7dce82d6mr7481060qkb.476.1664570846082; Fri, 30 Sep 2022 13:47:26 -0700 (PDT) Received: from localhost ([2620:10d:c091:480::dcb2]) by smtp.gmail.com with ESMTPSA id i13-20020a05620a248d00b006cbe3be300esm3555078qkn.12.2022.09.30.13.47.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Sep 2022 13:47:25 -0700 (PDT) From: David Vernet To: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev Cc: kernel-team@fb.com, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, yhs@fb.com, song@kernel.org, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, tj@kernel.org, memxor@gmail.com Subject: [PATCH 1/2] bpf: Add kfuncs for storing struct task_struct * as a kptr Date: Fri, 30 Sep 2022 15:47:19 -0500 Message-Id: <20220930204720.3116493-2-void@manifault.com> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220930204720.3116493-1-void@manifault.com> References: <20220930204720.3116493-1-void@manifault.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" Now that BPF supports adding new kernel functions with kfuncs, and storing kernel objects in maps with kptrs, we can add a set of kfuncs which allow struct task_struct objects to be stored in maps as referenced kptrs. The possible use-cases for doing this are plentiful. During tracing, for example, it would be useful to be able to collect some tasks that performed a certain operation, and then periodically summarize who they are, which cgroup they're in, how much CPU time they've spent, etc. In order to enable this, this patch adds three new kfuncs: struct task_struct *bpf_task_acquire(struct task_struct *p); struct task_struct *bpf_task_kptr_get(struct task_struct **pp); void bpf_task_release(struct task_struct *p); A follow-on patch will add selftests validating these kfuncs. Signed-off-by: David Vernet --- kernel/bpf/helpers.c | 75 +++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 74 insertions(+), 1 deletion(-) diff --git a/kernel/bpf/helpers.c b/kernel/bpf/helpers.c index b069517a3da0..eb9950eaec35 100644 --- a/kernel/bpf/helpers.c +++ b/kernel/bpf/helpers.c @@ -1711,9 +1711,82 @@ static const struct btf_kfunc_id_set tracing_kfunc_s= et =3D { .set =3D &tracing_btf_ids, }; =20 +/** + * bpf_task_acquire - Acquire a reference to a task. A task acquired by th= is + * kfunc which is not stored in a map as a kptr, must be released by calli= ng + * bpf_task_release(). + */ +__used noinline +struct task_struct *bpf_task_acquire(struct task_struct *p) +{ + refcount_inc(&p->rcu_users); + return p; +} + +/** + * bpf_task_kptr_get - Acquire a reference on a struct task_struct * kptr.= A + * task kptr acquired by this kfunc which is not stored in a map as a kptr, + * must be released by calling bpf_task_release(). + */ +__used noinline +struct task_struct *bpf_task_kptr_get(struct task_struct **pp) +{ + struct task_struct *p; + + rcu_read_lock(); + p =3D READ_ONCE(*pp); + if (p && !refcount_inc_not_zero(&p->rcu_users)) + p =3D NULL; + rcu_read_unlock(); + + return p; +} + +/** + * bpf_task_release - Release the reference acquired on a struct task_stru= ct *. + * If this kfunc is invoked in an RCU read region, the task_struct is + * guaranteed to not be freed until the current grace period has ended, ev= en if + * its refcount drops to 0. + */ +__used noinline void bpf_task_release(struct task_struct *p) +{ + if (!p) + return; + + put_task_struct_rcu_user(p); +} + +BTF_SET8_START(task_kfunc_btf_ids) +BTF_ID_FLAGS(func, bpf_task_acquire, KF_ACQUIRE) +BTF_ID_FLAGS(func, bpf_task_kptr_get, KF_ACQUIRE | KF_KPTR_GET | KF_RET_NU= LL) +BTF_ID_FLAGS(func, bpf_task_release, KF_RELEASE | KF_TRUSTED_ARGS) +BTF_SET8_END(task_kfunc_btf_ids) + +static const struct btf_kfunc_id_set task_kfunc_set =3D { + .owner =3D THIS_MODULE, + .set =3D &task_kfunc_btf_ids, +}; + +BTF_ID_LIST(task_dtor_kfunc_ids) +BTF_ID(struct, task_struct) +BTF_ID(func, bpf_task_release) + static int __init kfunc_init(void) { - return register_btf_kfunc_id_set(BPF_PROG_TYPE_TRACING, &tracing_kfunc_se= t); + int ret; + const struct btf_id_dtor_kfunc helper_dtor_kfuncs[] =3D { + { + .btf_id =3D task_dtor_kfunc_ids[0], + .kfunc_btf_id =3D task_dtor_kfunc_ids[1] + }, + }; + + ret =3D register_btf_kfunc_id_set(BPF_PROG_TYPE_TRACING, &tracing_kfunc_s= et); + ret =3D ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_TRACING, &task_kfu= nc_set); + ret =3D ret ?: register_btf_kfunc_id_set(BPF_PROG_TYPE_STRUCT_OPS, &task_= kfunc_set); + return ret ?: register_btf_id_dtor_kfuncs(helper_dtor_kfuncs, + ARRAY_SIZE(helper_dtor_kfuncs), + THIS_MODULE); } =20 late_initcall(kfunc_init); --=20 2.37.3 From nobody Sat Apr 27 09:03:26 2024 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id A44E7C433FE for ; Fri, 30 Sep 2022 20:47:49 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232066AbiI3Urq (ORCPT ); Fri, 30 Sep 2022 16:47:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40520 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231859AbiI3Urb (ORCPT ); Fri, 30 Sep 2022 16:47:31 -0400 Received: from mail-qk1-f182.google.com (mail-qk1-f182.google.com [209.85.222.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 064F21F8C0F; Fri, 30 Sep 2022 13:47:29 -0700 (PDT) Received: by mail-qk1-f182.google.com with SMTP id u28so3560212qku.2; Fri, 30 Sep 2022 13:47:28 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date; bh=gC4v+JaNFy4z2lxH9h2SqzP693Fgwbp4e0E9X/ZmHZA=; b=xZxXVX5dslG3AQ25ZR6VMb8UWH48dPwvyrD2uxkO3PmhTYZCyCsI1Qstaw+3EGYYOH yPsLOcZTFkKgZgP4l8DLSgJWSYnp28oBRM66o7Ns578CcCcDAOnoJb3SgOcALwTY2VDC j+LUtFmsyge+npNCoZczB95XuUoZCY4aOYOaId52eziphC7s4qylfmyV6/aZpN4j4KGS ng4Y2RAZoUPnYA/ZwfpdL9GJ8dUG6AjqZsNLLalg5XP9Peeu3/yRhtSdgqgLyboOl0Yj S3RVh/ZSYhi31QSgkcDWaVoZo5ucsB9jyS3zO7sJVqgZsN7M7YQUsYH8XvxqaQXnF8rC m4xw== X-Gm-Message-State: ACrzQf3Tzmqn89rOP7ZN3w7VYGw29WPKqqzp/ew+/GOs/b/y0j/UZ34A wogJ2IyJu/sgrH9siqcZ+ps= X-Google-Smtp-Source: AMsMyM4T3hiU98Oj3ZcJ/Naox8MLN6IDStDzNFJaqg2/JAsM8rc1kps5/VwTZfaFjbbhAxNvojZVBA== X-Received: by 2002:a37:38d:0:b0:6cd:fd39:10e5 with SMTP id 135-20020a37038d000000b006cdfd3910e5mr7357983qkd.784.1664570847667; Fri, 30 Sep 2022 13:47:27 -0700 (PDT) Received: from localhost ([2620:10d:c091:480::dcb2]) by smtp.gmail.com with ESMTPSA id u5-20020a05620a454500b006bb87c4833asm3659343qkp.109.2022.09.30.13.47.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Sep 2022 13:47:27 -0700 (PDT) From: David Vernet To: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev Cc: kernel-team@fb.com, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, yhs@fb.com, song@kernel.org, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, tj@kernel.org, memxor@gmail.com Subject: [PATCH 2/2] bpf/selftests: Add selftests for new task kfuncs Date: Fri, 30 Sep 2022 15:47:20 -0500 Message-Id: <20220930204720.3116493-3-void@manifault.com> X-Mailer: git-send-email 2.37.3 In-Reply-To: <20220930204720.3116493-1-void@manifault.com> References: <20220930204720.3116493-1-void@manifault.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" A previous change added a series of kfuncs for storing struct task_struct objects as referenced kptrs. This patch adds a new task_kfunc test suite for validating their expected behavior. Signed-off-by: David Vernet --- .../selftests/bpf/prog_tests/task_kfunc.c | 155 ++++++++++++ .../selftests/bpf/progs/task_kfunc_common.h | 83 +++++++ .../selftests/bpf/progs/task_kfunc_failure.c | 225 ++++++++++++++++++ .../selftests/bpf/progs/task_kfunc_success.c | 113 +++++++++ 4 files changed, 576 insertions(+) create mode 100644 tools/testing/selftests/bpf/prog_tests/task_kfunc.c create mode 100644 tools/testing/selftests/bpf/progs/task_kfunc_common.h create mode 100644 tools/testing/selftests/bpf/progs/task_kfunc_failure.c create mode 100644 tools/testing/selftests/bpf/progs/task_kfunc_success.c diff --git a/tools/testing/selftests/bpf/prog_tests/task_kfunc.c b/tools/te= sting/selftests/bpf/prog_tests/task_kfunc.c new file mode 100644 index 000000000000..d5bc04cbee94 --- /dev/null +++ b/tools/testing/selftests/bpf/prog_tests/task_kfunc.c @@ -0,0 +1,155 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */ + +#define _GNU_SOURCE +#include +#include +#include + +#include "task_kfunc_failure.skel.h" +#include "task_kfunc_success.skel.h" + +static size_t log_buf_sz =3D 1 << 20; /* 1 MB */ +static char obj_log_buf[1048576]; + +static struct task_kfunc_success *open_load_task_kfunc_skel(void) +{ + struct task_kfunc_success *skel; + int err; + + skel =3D task_kfunc_success__open(); + if (!ASSERT_OK_PTR(skel, "skel_open")) + return NULL; + + skel->bss->pid =3D getpid(); + + err =3D task_kfunc_success__load(skel); + if (!ASSERT_OK(err, "skel_load")) + goto cleanup; + + return skel; + +cleanup: + task_kfunc_success__destroy(skel); + return NULL; +} + +static void run_success_test(const char *prog_name) +{ + struct task_kfunc_success *skel; + int status; + pid_t child_pid; + struct bpf_program *prog; + struct bpf_link *link =3D NULL; + + skel =3D open_load_task_kfunc_skel(); + if (!ASSERT_OK_PTR(skel, "open_load_skel")) + return; + + if (!ASSERT_OK(skel->bss->err, "pre_spawn_err")) + goto cleanup; + + prog =3D bpf_object__find_program_by_name(skel->obj, prog_name); + if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name")) + goto cleanup; + + link =3D bpf_program__attach(prog); + if (!ASSERT_OK_PTR(link, "attached_link")) + goto cleanup; + + child_pid =3D fork(); + if (!ASSERT_GT(child_pid, -1, "child_pid")) + goto cleanup; + if (child_pid =3D=3D 0) + _exit(0); + waitpid(child_pid, &status, 0); + + ASSERT_OK(skel->bss->err, "post_wait_err"); + +cleanup: + bpf_link__destroy(link); + task_kfunc_success__destroy(skel); +} + +static const char * const success_tests[] =3D { + "test_task_acquire_release", + "test_task_acquire_leave_in_map", + "test_task_xchg_release", + "test_task_get_release", +}; + +static struct { + const char *prog_name; + const char *expected_err_msg; +} failure_tests[] =3D { + {"task_kfunc_acquire_untrusted", "arg#0 pointer type STRUCT task_struct m= ust point"}, + {"task_kfunc_acquire_null", "arg#0 pointer type STRUCT task_struct must p= oint"}, + {"task_kfunc_acquire_unreleased", "Unreleased reference"}, + {"task_kfunc_get_non_kptr_param", "arg#0 expected pointer to map value"}, + {"task_kfunc_get_non_kptr_acquired", "arg#0 expected pointer to map value= "}, + {"task_kfunc_get_null", "arg#0 expected pointer to map value"}, + {"task_kfunc_xchg_unreleased", "Unreleased reference"}, + {"task_kfunc_get_unreleased", "Unreleased reference"}, + {"task_kfunc_release_untrusted", "arg#0 pointer type STRUCT task_struct m= ust point"}, + {"task_kfunc_release_null", "arg#0 pointer type STRUCT task_struct must p= oint"}, + {"task_kfunc_release_unacquired", "R1 must be referenced"}, +}; + +static void verify_fail(const char *prog_name, const char *expected_err_ms= g) +{ + LIBBPF_OPTS(bpf_object_open_opts, opts); + struct task_kfunc_failure *skel; + int err, i; + + opts.kernel_log_buf =3D obj_log_buf; + opts.kernel_log_size =3D log_buf_sz; + opts.kernel_log_level =3D 1; + + skel =3D task_kfunc_failure__open_opts(&opts); + if (!ASSERT_OK_PTR(skel, "task_kfunc_failure__open_opts")) + goto cleanup; + + skel->bss->pid =3D getpid(); + + for (i =3D 0; i < ARRAY_SIZE(failure_tests); i++) { + struct bpf_program *prog; + const char *curr_name =3D failure_tests[i].prog_name; + + prog =3D bpf_object__find_program_by_name(skel->obj, curr_name); + if (!ASSERT_OK_PTR(prog, "bpf_object__find_program_by_name")) + goto cleanup; + + bpf_program__set_autoload(prog, !strcmp(curr_name, prog_name)); + } + + err =3D task_kfunc_failure__load(skel); + if (!ASSERT_ERR(err, "unexpected load success")) + goto cleanup; + + if (!ASSERT_OK_PTR(strstr(obj_log_buf, expected_err_msg), "expected_err_m= sg")) { + fprintf(stderr, "Expected err_msg: %s\n", expected_err_msg); + fprintf(stderr, "Verifier output: %s\n", obj_log_buf); + } + +cleanup: + task_kfunc_failure__destroy(skel); +} + +void test_task_kfunc(void) +{ + int i; + + for (i =3D 0; i < ARRAY_SIZE(success_tests); i++) { + if (!test__start_subtest(success_tests[i])) + continue; + + run_success_test(success_tests[i]); + } + + for (i =3D 0; i < ARRAY_SIZE(failure_tests); i++) { + if (!test__start_subtest(failure_tests[i].prog_name)) + continue; + + verify_fail(failure_tests[i].prog_name, failure_tests[i].expected_err_ms= g); + } +} diff --git a/tools/testing/selftests/bpf/progs/task_kfunc_common.h b/tools/= testing/selftests/bpf/progs/task_kfunc_common.h new file mode 100644 index 000000000000..bbb0a40572fd --- /dev/null +++ b/tools/testing/selftests/bpf/progs/task_kfunc_common.h @@ -0,0 +1,83 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */ + +#ifndef _TASK_KFUNC_COMMON_H +#define _TASK_KFUNC_COMMON_H + +#include +#include +#include +#include + +struct __tasks_kfunc_map_value { + struct task_struct __kptr_ref * task; +}; + +struct hash_map { + __uint(type, BPF_MAP_TYPE_HASH); + __type(key, int); + __type(value, struct __tasks_kfunc_map_value); + __uint(max_entries, 1); +} __tasks_kfunc_map SEC(".maps"); + +struct task_struct *bpf_task_acquire(struct task_struct *p) __ksym; +struct task_struct *bpf_task_kptr_get(struct task_struct **pp) __ksym; +void bpf_task_release(struct task_struct *p) __ksym; + +#define TEST_NAME_SZ 128 + +/* The pid of the test process used to determine if a newly created task i= s the test task. */ +int pid; + +static inline struct __tasks_kfunc_map_value *tasks_kfunc_map_value_lookup= (struct task_struct *p) +{ + s32 pid; + long status; + + status =3D bpf_probe_read_kernel(&pid, sizeof(pid), &p->pid); + if (status) + return NULL; + + return bpf_map_lookup_elem(&__tasks_kfunc_map, &pid); +} + +static inline int tasks_kfunc_map_insert(struct task_struct *p) +{ + struct __tasks_kfunc_map_value local, *v; + long status; + struct task_struct *acquired, *old; + s32 pid; + + status =3D bpf_probe_read_kernel(&pid, sizeof(pid), &p->pid); + if (status) + return status; + + local.task =3D NULL; + status =3D bpf_map_update_elem(&__tasks_kfunc_map, &pid, &local, BPF_NOEX= IST); + if (status) + return status; + + v =3D bpf_map_lookup_elem(&__tasks_kfunc_map, &pid); + if (!v) { + bpf_map_delete_elem(&__tasks_kfunc_map, &pid); + return status; + } + + acquired =3D bpf_task_acquire(p); + old =3D bpf_kptr_xchg(&v->task, acquired); + if (old) { + bpf_task_release(old); + return -EEXIST; + } + + return 0; +} + +static inline bool is_test_kfunc_task(struct task_struct *task) +{ + int cur_pid =3D bpf_get_current_pid_tgid() >> 32; + + return pid =3D=3D cur_pid; +} + +#endif /* _TASK_KFUNC_COMMON_H */ diff --git a/tools/testing/selftests/bpf/progs/task_kfunc_failure.c b/tools= /testing/selftests/bpf/progs/task_kfunc_failure.c new file mode 100644 index 000000000000..9bac1522499a --- /dev/null +++ b/tools/testing/selftests/bpf/progs/task_kfunc_failure.c @@ -0,0 +1,225 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */ + +#include +#include +#include + +#include "task_kfunc_common.h" + +char _license[] SEC("license") =3D "GPL"; + +/* Prototype for all of the program trace events below: + * + * TRACE_EVENT(task_newtask, + * TP_PROTO(struct task_struct *p, u64 clone_flags) + */ + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_acquire_untrusted, struct task_struct *task, u64 c= lone_flags) +{ + struct task_struct *acquired, *stack_ptr; + + if (!is_test_kfunc_task(task)) + return 0; + + /* Can't invoke bpf_task_acquire() on an untrusted, random pointer. */ + stack_ptr =3D (struct task_struct *)0xcafef00d; + acquired =3D bpf_task_acquire(stack_ptr); + bpf_task_release(acquired); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_acquire_null, struct task_struct *task, u64 clone_= flags) +{ + struct task_struct *acquired; + + if (!is_test_kfunc_task(task)) + return 0; + + /* Can't invoke bpf_task_acquire() on a NULL pointer. */ + acquired =3D bpf_task_acquire(NULL); + bpf_task_release(acquired); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_acquire_unreleased, struct task_struct *task, u64 = clone_flags) +{ + struct task_struct *acquired; + + if (!is_test_kfunc_task(task)) + return 0; + + acquired =3D bpf_task_acquire(task); + + /* Acquired task is never released. */ + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_get_non_kptr_param, struct task_struct *task, u64 = clone_flags) +{ + struct task_struct *kptr; + + /* Cannot use bpf_task_kptr_get() on a non-kptr, even on a valid task. */ + kptr =3D bpf_task_kptr_get(&task); + if (!kptr) + return 0; + + bpf_task_release(kptr); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_get_non_kptr_acquired, struct task_struct *task, u= 64 clone_flags) +{ + struct task_struct *kptr, *acquired; + + acquired =3D bpf_task_acquire(task); + + /* Cannot use bpf_task_kptr_get() on a non-kptr, even if it was acquired.= */ + kptr =3D bpf_task_kptr_get(&acquired); + if (!kptr) + return 0; + + bpf_task_release(kptr); + bpf_task_release(acquired); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_get_null, struct task_struct *task, u64 clone_flag= s) +{ + struct task_struct *kptr; + + /* Cannot use bpf_task_kptr_get() on a NULL pointer. */ + kptr =3D bpf_task_kptr_get(NULL); + if (!kptr) + return 0; + + bpf_task_release(kptr); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_xchg_unreleased, struct task_struct *task, u64 clo= ne_flags) +{ + struct task_struct *kptr; + struct __tasks_kfunc_map_value *v; + int status; + + if (!is_test_kfunc_task(task)) + return 0; + + status =3D tasks_kfunc_map_insert(task); + if (status) + return 0; + + v =3D tasks_kfunc_map_value_lookup(task); + if (!v) + return 0; + + kptr =3D bpf_kptr_xchg(&v->task, NULL); + if (!kptr) + return 0; + + + /* Kptr retrieved from map is never released. */ + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_get_unreleased, struct task_struct *task, u64 clon= e_flags) +{ + struct task_struct *kptr; + struct __tasks_kfunc_map_value *v; + int status; + + if (!is_test_kfunc_task(task)) + return 0; + + status =3D tasks_kfunc_map_insert(task); + if (status) + return 0; + + v =3D tasks_kfunc_map_value_lookup(task); + if (!v) + return 0; + + kptr =3D bpf_task_kptr_get(&v->task); + if (!kptr) + return 0; + + + /* Kptr acquired above is never released. */ + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_release_untrusted, struct task_struct *task, u64 c= lone_flags) +{ + struct task_struct *acquired =3D (struct task_struct *)0xcafef00d; + + if (!is_test_kfunc_task(task)) + return 0; + + /* Cannot release random on-stack pointer. */ + bpf_task_release(acquired); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_release_null, struct task_struct *task, u64 clone_= flags) +{ + struct __tasks_kfunc_map_value local, *v; + long status; + struct task_struct *acquired, *old; + s32 pid; + + if (!is_test_kfunc_task(task)) + return 0; + + status =3D bpf_probe_read_kernel(&pid, sizeof(pid), &task->pid); + if (status) + return 0; + + local.task =3D NULL; + status =3D bpf_map_update_elem(&__tasks_kfunc_map, &pid, &local, BPF_NOEX= IST); + if (status) + return status; + + v =3D bpf_map_lookup_elem(&__tasks_kfunc_map, &pid); + if (!v) + return status; + + acquired =3D bpf_task_acquire(task); + old =3D bpf_kptr_xchg(&v->task, acquired); + + /* old cannot be passed to bpf_task_release() without a NULL check. */ + bpf_task_release(old); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(task_kfunc_release_unacquired, struct task_struct *task, u64 = clone_flags) +{ + if (!is_test_kfunc_task(task)) + return 0; + + /* Cannot release trusted task pointer which was not acquired. */ + bpf_task_release(task); + + return 0; +} diff --git a/tools/testing/selftests/bpf/progs/task_kfunc_success.c b/tools= /testing/selftests/bpf/progs/task_kfunc_success.c new file mode 100644 index 000000000000..b7427f1f15ef --- /dev/null +++ b/tools/testing/selftests/bpf/progs/task_kfunc_success.c @@ -0,0 +1,113 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* Copyright (c) 2022 Meta Platforms, Inc. and affiliates. */ + +#include +#include +#include + +#include "task_kfunc_common.h" + +char _license[] SEC("license") =3D "GPL"; + +int err; + +/* Prototype for all of the program trace events below: + * + * TRACE_EVENT(task_newtask, + * TP_PROTO(struct task_struct *p, u64 clone_flags) + */ + +SEC("tp_btf/task_newtask") +int BPF_PROG(test_task_acquire_release, struct task_struct *task, u64 clon= e_flags) +{ + struct task_struct *acquired; + + if (!is_test_kfunc_task(task)) + return 0; + + acquired =3D bpf_task_acquire(task); + bpf_task_release(acquired); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(test_task_acquire_leave_in_map, struct task_struct *task, u64= clone_flags) +{ + long status; + + if (!is_test_kfunc_task(task)) + return 0; + + status =3D tasks_kfunc_map_insert(task); + if (status) + err =3D 1; + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(test_task_xchg_release, struct task_struct *task, u64 clone_f= lags) +{ + struct task_struct *kptr; + struct __tasks_kfunc_map_value *v; + long status; + + if (!is_test_kfunc_task(task)) + return 0; + + status =3D tasks_kfunc_map_insert(task); + if (status) { + err =3D 1; + return 0; + } + + v =3D tasks_kfunc_map_value_lookup(task); + if (!v) { + err =3D 2; + return 0; + } + + kptr =3D bpf_kptr_xchg(&v->task, NULL); + if (!kptr) { + err =3D 3; + return 0; + } + + bpf_task_release(kptr); + + return 0; +} + +SEC("tp_btf/task_newtask") +int BPF_PROG(test_task_get_release, struct task_struct *task, u64 clone_fl= ags) +{ + struct task_struct *kptr; + struct __tasks_kfunc_map_value *v; + long status; + + if (!is_test_kfunc_task(task)) + return 0; + + status =3D tasks_kfunc_map_insert(task); + if (status) { + err =3D 1; + return 0; + } + + v =3D tasks_kfunc_map_value_lookup(task); + if (!v) { + err =3D 2; + return 0; + } + + kptr =3D bpf_task_kptr_get(&v->task); + if (!kptr) { + err =3D 3; + return 0; + } + + bpf_task_release(kptr); + + return 0; +} --=20 2.37.3