|
Message-ID: <20190727014048.3czy3n2hi6hfdy3m@ast-mbp.dhcp.thefacebook.com> Date: Fri, 26 Jul 2019 18:40:50 -0700 From: Alexei Starovoitov <alexei.starovoitov@...il.com> To: Mickaël Salaün <mic@...ikod.net> Cc: linux-kernel@...r.kernel.org, Alexander Viro <viro@...iv.linux.org.uk>, Alexei Starovoitov <ast@...nel.org>, Andrew Morton <akpm@...ux-foundation.org>, Andy Lutomirski <luto@...capital.net>, Arnaldo Carvalho de Melo <acme@...nel.org>, Casey Schaufler <casey@...aufler-ca.com>, Daniel Borkmann <daniel@...earbox.net>, David Drysdale <drysdale@...gle.com>, "David S . Miller" <davem@...emloft.net>, "Eric W . Biederman" <ebiederm@...ssion.com>, James Morris <jmorris@...ei.org>, Jann Horn <jann@...jh.net>, John Johansen <john.johansen@...onical.com>, Jonathan Corbet <corbet@....net>, Kees Cook <keescook@...omium.org>, Michael Kerrisk <mtk.manpages@...il.com>, Mickaël Salaün <mickael.salaun@....gouv.fr>, Paul Moore <paul@...l-moore.com>, Sargun Dhillon <sargun@...gun.me>, "Serge E . Hallyn" <serge@...lyn.com>, Shuah Khan <shuah@...nel.org>, Stephen Smalley <sds@...ho.nsa.gov>, Tejun Heo <tj@...nel.org>, Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>, Thomas Graf <tgraf@...g.ch>, Tycho Andersen <tycho@...ho.ws>, Will Drewry <wad@...omium.org>, kernel-hardening@...ts.openwall.com, linux-api@...r.kernel.org, linux-fsdevel@...r.kernel.org, linux-security-module@...r.kernel.org, netdev@...r.kernel.org Subject: Re: [PATCH bpf-next v10 06/10] bpf,landlock: Add a new map type: inode On Sun, Jul 21, 2019 at 11:31:12PM +0200, Mickaël Salaün wrote: > FIXME: 64-bits in the doc > > This new map store arbitrary values referenced by inode keys. The map > can be updated from user space with file descriptor pointing to inodes > tied to a file system. From an eBPF (Landlock) program point of view, > such a map is read-only and can only be used to retrieved a value tied > to a given inode. This is useful to recognize an inode tagged by user > space, without access right to this inode (i.e. no need to have a write > access to this inode). > > Add dedicated BPF functions to handle this type of map: > * bpf_inode_htab_map_update_elem() > * bpf_inode_htab_map_lookup_elem() > * bpf_inode_htab_map_delete_elem() > > This new map require a dedicated helper inode_map_lookup_elem() because > of the key which is a pointer to an opaque data (only provided by the > kernel). This act like a (physical or cryptographic) key, which is why > it is also not allowed to get the next key. > > Signed-off-by: Mickaël Salaün <mic@...ikod.net> there are too many things to comment on. Let's do this patch. imo inode_map concept is interesting, but see below... > + > + /* > + * Limit number of entries in an inode map to the maximum number of > + * open files for the current process. The maximum number of file > + * references (including all inode maps) for a process is then > + * (RLIMIT_NOFILE - 1) * RLIMIT_NOFILE. If the process' RLIMIT_NOFILE > + * is 0, then any entry update is forbidden. > + * > + * An eBPF program can inherit all the inode map FD. The worse case is > + * to fill a bunch of arraymaps, create an eBPF program, close the > + * inode map FDs, and start again. The maximum number of inode map > + * entries can then be close to RLIMIT_NOFILE^3. > + */ > + if (attr->max_entries > rlimit(RLIMIT_NOFILE)) > + return -EMFILE; rlimit is checked, but no fd are consumed. Once created such inode map_fd can be passed to a different process. map_fd can be pinned into bpffs. etc. what the value of the check? > + > + /* decorelate UAPI from kernel API */ > + attr->key_size = sizeof(struct inode *); > + > + return htab_map_alloc_check(attr); > +} > + > +static void inode_htab_put_key(void *key) > +{ > + struct inode **inode = key; > + > + if ((*inode)->i_state & I_FREEING) > + return; checking the state without take a lock? isn't it racy? > + iput(*inode); > +} > + > +/* called from syscall or (never) from eBPF program */ > +static int map_get_next_no_key(struct bpf_map *map, void *key, void *next_key) > +{ > + /* do not leak a file descriptor */ what this comment suppose to mean? > + return -ENOTSUPP; > +} > + > +/* must call iput(inode) after this call */ > +static struct inode *inode_from_fd(int ufd, bool check_access) > +{ > + struct inode *ret; > + struct fd f; > + int deny; > + > + f = fdget(ufd); > + if (unlikely(!f.file)) > + return ERR_PTR(-EBADF); > + /* TODO?: add this check when called from an eBPF program too (already > + * checked by the LSM parent hooks anyway) */ > + if (unlikely(IS_PRIVATE(file_inode(f.file)))) { > + ret = ERR_PTR(-EINVAL); > + goto put_fd; > + } > + /* check if the FD is tied to a mount point */ > + /* TODO?: add this check when called from an eBPF program too */ > + if (unlikely(f.file->f_path.mnt->mnt_flags & MNT_INTERNAL)) { > + ret = ERR_PTR(-EINVAL); > + goto put_fd; > + } a bunch of TODOs do not inspire confidence. > + if (check_access) { > + /* > + * must be allowed to access attributes from this file to then > + * be able to compare an inode to its map entry > + */ > + deny = security_inode_getattr(&f.file->f_path); > + if (deny) { > + ret = ERR_PTR(deny); > + goto put_fd; > + } > + } > + ret = file_inode(f.file); > + ihold(ret); > + > +put_fd: > + fdput(f); > + return ret; > +} > + > +/* > + * The key is a FD when called from a syscall, but an inode address when called > + * from an eBPF program. > + */ > + > +/* called from syscall */ > +int bpf_inode_fd_htab_map_lookup_elem(struct bpf_map *map, int *key, void *value) > +{ > + void *ptr; > + struct inode *inode; > + int ret; > + > + /* check inode access */ > + inode = inode_from_fd(*key, true); > + if (IS_ERR(inode)) > + return PTR_ERR(inode); > + > + rcu_read_lock(); > + ptr = htab_map_lookup_elem(map, &inode); > + iput(inode); > + if (IS_ERR(ptr)) { > + ret = PTR_ERR(ptr); > + } else if (!ptr) { > + ret = -ENOENT; > + } else { > + ret = 0; > + copy_map_value(map, value, ptr); > + } > + rcu_read_unlock(); > + return ret; > +} > + > +/* called from kernel */ wrong comment? kernel side cannot call it, right? > +int bpf_inode_ptr_locked_htab_map_delete_elem(struct bpf_map *map, > + struct inode **key, bool remove_in_inode) > +{ > + if (remove_in_inode) > + landlock_inode_remove_map(*key, map); > + return htab_map_delete_elem(map, key); > +} > + > +/* called from syscall */ > +int bpf_inode_fd_htab_map_delete_elem(struct bpf_map *map, int *key) > +{ > + struct inode *inode; > + int ret; > + > + /* do not check inode access (similar to directory check) */ > + inode = inode_from_fd(*key, false); > + if (IS_ERR(inode)) > + return PTR_ERR(inode); > + ret = bpf_inode_ptr_locked_htab_map_delete_elem(map, &inode, true); > + iput(inode); > + return ret; > +} > + > +/* called from syscall */ > +int bpf_inode_fd_htab_map_update_elem(struct bpf_map *map, int *key, void *value, > + u64 map_flags) > +{ > + struct inode *inode; > + int ret; > + > + WARN_ON_ONCE(!rcu_read_lock_held()); > + > + /* check inode access */ > + inode = inode_from_fd(*key, true); > + if (IS_ERR(inode)) > + return PTR_ERR(inode); > + ret = htab_map_update_elem(map, &inode, value, map_flags); > + if (!ret) > + ret = landlock_inode_add_map(inode, map); > + iput(inode); > + return ret; > +} > + > +static void inode_htab_map_free(struct bpf_map *map) > +{ > + struct bpf_htab *htab = container_of(map, struct bpf_htab, map); > + struct hlist_nulls_node *n; > + struct hlist_nulls_head *head; > + struct htab_elem *l; > + int i; > + > + for (i = 0; i < htab->n_buckets; i++) { > + head = select_bucket(htab, i); > + hlist_nulls_for_each_entry_safe(l, n, head, hash_node) { > + landlock_inode_remove_map(*((struct inode **)l->key), map); > + } > + } > + htab_map_free(map); > +} user space can delete the map. that will trigger inode_htab_map_free() which will call landlock_inode_remove_map(). which will simply itereate the list and delete from the list. While in parallel inode can be destoyed and hook_inode_free_security() will be called. I think nothing that protects from this race. > + > +/* > + * We need a dedicated helper to deal with inode maps because the key is a > + * pointer to an opaque data, only provided by the kernel. This really act > + * like a (physical or cryptographic) key, which is why it is also not allowed > + * to get the next key with map_get_next_key(). inode pointer is like cryptographic key? :) > + */ > +BPF_CALL_2(bpf_inode_map_lookup_elem, struct bpf_map *, map, void *, key) > +{ > + WARN_ON_ONCE(!rcu_read_lock_held()); > + return (unsigned long)htab_map_lookup_elem(map, &key); > +} > + > +const struct bpf_func_proto bpf_inode_map_lookup_elem_proto = { > + .func = bpf_inode_map_lookup_elem, > + .gpl_only = false, > + .pkt_access = true, pkt_access ? :) > + .ret_type = RET_PTR_TO_MAP_VALUE_OR_NULL, > + .arg1_type = ARG_CONST_MAP_PTR, > + .arg2_type = ARG_PTR_TO_INODE, > +}; > diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c > index b2a8cb14f28e..e46441c42b68 100644 > --- a/kernel/bpf/syscall.c > +++ b/kernel/bpf/syscall.c > @@ -801,6 +801,8 @@ static int map_lookup_elem(union bpf_attr *attr) > } else if (map->map_type == BPF_MAP_TYPE_QUEUE || > map->map_type == BPF_MAP_TYPE_STACK) { > err = map->ops->map_peek_elem(map, value); > + } else if (map->map_type == BPF_MAP_TYPE_INODE) { > + err = bpf_inode_fd_htab_map_lookup_elem(map, key, value); > } else { > rcu_read_lock(); > if (map->ops->map_lookup_elem_sys_only) > @@ -951,6 +953,10 @@ static int map_update_elem(union bpf_attr *attr) > } else if (map->map_type == BPF_MAP_TYPE_QUEUE || > map->map_type == BPF_MAP_TYPE_STACK) { > err = map->ops->map_push_elem(map, value, attr->flags); > + } else if (map->map_type == BPF_MAP_TYPE_INODE) { > + rcu_read_lock(); > + err = bpf_inode_fd_htab_map_update_elem(map, key, value, attr->flags); > + rcu_read_unlock(); > } else { > rcu_read_lock(); > err = map->ops->map_update_elem(map, key, value, attr->flags); > @@ -1006,7 +1012,10 @@ static int map_delete_elem(union bpf_attr *attr) > preempt_disable(); > __this_cpu_inc(bpf_prog_active); > rcu_read_lock(); > - err = map->ops->map_delete_elem(map, key); > + if (map->map_type == BPF_MAP_TYPE_INODE) > + err = bpf_inode_fd_htab_map_delete_elem(map, key); > + else > + err = map->ops->map_delete_elem(map, key); > rcu_read_unlock(); > __this_cpu_dec(bpf_prog_active); > preempt_enable(); > @@ -1018,6 +1027,22 @@ static int map_delete_elem(union bpf_attr *attr) > return err; > } > > +int bpf_inode_ptr_unlocked_htab_map_delete_elem(struct bpf_map *map, > + struct inode **key, bool remove_in_inode) > +{ > + int err; > + > + preempt_disable(); > + __this_cpu_inc(bpf_prog_active); > + rcu_read_lock(); > + err = bpf_inode_ptr_locked_htab_map_delete_elem(map, key, remove_in_inode); > + rcu_read_unlock(); > + __this_cpu_dec(bpf_prog_active); > + preempt_enable(); > + maybe_wait_bpf_programs(map); if that function was actually doing synchronize_rcu() the consequences would have been unpleasant. Fortunately it's a nop in this case. Please read the code carefully before copy-paste. Also what do you think the reason of bpf_prog_active above? What is the reason of rcu_read_lock above? I think the patch set needs to shrink at least in half to be reviewable. The way you tie seccomp and lsm is probably the biggest obstacle than any of the bugs above. Can you drop seccomp ? and do it as normal lsm ?
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.