Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0
  2
  3/*
  4 * Copyright 2020 Google LLC.
  5 */
  6
  7#include "vmlinux.h"
  8#include <errno.h>
  9#include <bpf/bpf_helpers.h>
 10#include <bpf/bpf_tracing.h>
 11
 12char _license[] SEC("license") = "GPL";
 13
 14#define DUMMY_STORAGE_VALUE 0xdeadbeef
 15
 16__u32 monitored_pid = 0;
 17int inode_storage_result = -1;
 18int sk_storage_result = -1;
 19int task_storage_result = -1;
 20
 21struct local_storage {
 22	struct inode *exec_inode;
 23	__u32 value;
 
 24};
 25
 26struct {
 27	__uint(type, BPF_MAP_TYPE_INODE_STORAGE);
 28	__uint(map_flags, BPF_F_NO_PREALLOC);
 29	__type(key, int);
 30	__type(value, struct local_storage);
 31} inode_storage_map SEC(".maps");
 32
 33struct {
 34	__uint(type, BPF_MAP_TYPE_SK_STORAGE);
 35	__uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE);
 36	__type(key, int);
 37	__type(value, struct local_storage);
 38} sk_storage_map SEC(".maps");
 39
 40struct {
 41	__uint(type, BPF_MAP_TYPE_SK_STORAGE);
 42	__uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE);
 43	__type(key, int);
 44	__type(value, struct local_storage);
 45} sk_storage_map2 SEC(".maps");
 46
 47struct {
 48	__uint(type, BPF_MAP_TYPE_TASK_STORAGE);
 49	__uint(map_flags, BPF_F_NO_PREALLOC);
 50	__type(key, int);
 51	__type(value, struct local_storage);
 52} task_storage_map SEC(".maps");
 53
 54struct {
 55	__uint(type, BPF_MAP_TYPE_TASK_STORAGE);
 56	__uint(map_flags, BPF_F_NO_PREALLOC);
 57	__type(key, int);
 58	__type(value, struct local_storage);
 59} task_storage_map2 SEC(".maps");
 60
 61SEC("lsm/inode_unlink")
 62int BPF_PROG(unlink_hook, struct inode *dir, struct dentry *victim)
 63{
 64	__u32 pid = bpf_get_current_pid_tgid() >> 32;
 65	struct bpf_local_storage *local_storage;
 66	struct local_storage *storage;
 67	struct task_struct *task;
 68	bool is_self_unlink;
 69
 70	if (pid != monitored_pid)
 71		return 0;
 72
 73	task = bpf_get_current_task_btf();
 74	if (!task)
 75		return 0;
 76
 77	task_storage_result = -1;
 78
 79	storage = bpf_task_storage_get(&task_storage_map, task, 0, 0);
 80	if (!storage)
 81		return 0;
 82
 83	/* Don't let an executable delete itself */
 84	is_self_unlink = storage->exec_inode == victim->d_inode;
 85
 86	storage = bpf_task_storage_get(&task_storage_map2, task, 0,
 87				       BPF_LOCAL_STORAGE_GET_F_CREATE);
 88	if (!storage || storage->value)
 89		return 0;
 90
 91	if (bpf_task_storage_delete(&task_storage_map, task))
 92		return 0;
 93
 94	/* Ensure that the task_storage_map is disconnected from the storage.
 95	 * The storage memory should not be freed back to the
 96	 * bpf_mem_alloc.
 97	 */
 98	local_storage = task->bpf_storage;
 99	if (!local_storage || local_storage->smap)
100		return 0;
101
102	task_storage_result = 0;
103
104	return is_self_unlink ? -EPERM : 0;
105}
106
107SEC("lsm.s/inode_rename")
108int BPF_PROG(inode_rename, struct inode *old_dir, struct dentry *old_dentry,
109	     struct inode *new_dir, struct dentry *new_dentry,
110	     unsigned int flags)
111{
 
112	struct local_storage *storage;
113	int err;
114
115	/* new_dentry->d_inode can be NULL when the inode is renamed to a file
116	 * that did not exist before. The helper should be able to handle this
117	 * NULL pointer.
118	 */
119	bpf_inode_storage_get(&inode_storage_map, new_dentry->d_inode, 0,
120			      BPF_LOCAL_STORAGE_GET_F_CREATE);
121
122	storage = bpf_inode_storage_get(&inode_storage_map, old_dentry->d_inode,
123					0, 0);
124	if (!storage)
125		return 0;
126
 
127	if (storage->value != DUMMY_STORAGE_VALUE)
128		inode_storage_result = -1;
 
129
130	err = bpf_inode_storage_delete(&inode_storage_map, old_dentry->d_inode);
131	if (!err)
132		inode_storage_result = err;
133
134	return 0;
135}
136
137SEC("lsm.s/socket_bind")
138int BPF_PROG(socket_bind, struct socket *sock, struct sockaddr *address,
139	     int addrlen)
140{
141	__u32 pid = bpf_get_current_pid_tgid() >> 32;
142	struct local_storage *storage;
143	struct sock *sk = sock->sk;
144
145	if (pid != monitored_pid || !sk)
146		return 0;
147
148	storage = bpf_sk_storage_get(&sk_storage_map, sk, 0, 0);
149	if (!storage)
150		return 0;
151
152	sk_storage_result = -1;
153	if (storage->value != DUMMY_STORAGE_VALUE)
154		return 0;
155
156	/* This tests that we can associate multiple elements
157	 * with the local storage.
158	 */
159	storage = bpf_sk_storage_get(&sk_storage_map2, sk, 0,
160				     BPF_LOCAL_STORAGE_GET_F_CREATE);
161	if (!storage)
162		return 0;
163
164	if (bpf_sk_storage_delete(&sk_storage_map2, sk))
165		return 0;
166
167	storage = bpf_sk_storage_get(&sk_storage_map2, sk, 0,
168				     BPF_LOCAL_STORAGE_GET_F_CREATE);
169	if (!storage)
170		return 0;
171
172	if (bpf_sk_storage_delete(&sk_storage_map, sk))
173		return 0;
 
 
174
175	/* Ensure that the sk_storage_map is disconnected from the storage. */
176	if (!sk->sk_bpf_storage || sk->sk_bpf_storage->smap)
177		return 0;
178
179	sk_storage_result = 0;
180	return 0;
181}
182
183SEC("lsm.s/socket_post_create")
184int BPF_PROG(socket_post_create, struct socket *sock, int family, int type,
185	     int protocol, int kern)
186{
187	__u32 pid = bpf_get_current_pid_tgid() >> 32;
188	struct local_storage *storage;
189	struct sock *sk = sock->sk;
190
191	if (pid != monitored_pid || !sk)
192		return 0;
193
194	storage = bpf_sk_storage_get(&sk_storage_map, sk, 0,
195				     BPF_LOCAL_STORAGE_GET_F_CREATE);
196	if (!storage)
197		return 0;
198
 
199	storage->value = DUMMY_STORAGE_VALUE;
 
200
201	return 0;
202}
203
204/* This uses the local storage to remember the inode of the binary that a
205 * process was originally executing.
206 */
207SEC("lsm.s/bprm_committed_creds")
208void BPF_PROG(exec, struct linux_binprm *bprm)
209{
210	__u32 pid = bpf_get_current_pid_tgid() >> 32;
211	struct local_storage *storage;
212
213	if (pid != monitored_pid)
214		return;
215
216	storage = bpf_task_storage_get(&task_storage_map,
217				       bpf_get_current_task_btf(), 0,
218				       BPF_LOCAL_STORAGE_GET_F_CREATE);
219	if (storage)
 
220		storage->exec_inode = bprm->file->f_inode;
 
 
221
222	storage = bpf_inode_storage_get(&inode_storage_map, bprm->file->f_inode,
223					0, BPF_LOCAL_STORAGE_GET_F_CREATE);
224	if (!storage)
225		return;
226
 
227	storage->value = DUMMY_STORAGE_VALUE;
 
228}
v5.14.15
  1// SPDX-License-Identifier: GPL-2.0
  2
  3/*
  4 * Copyright 2020 Google LLC.
  5 */
  6
  7#include "vmlinux.h"
  8#include <errno.h>
  9#include <bpf/bpf_helpers.h>
 10#include <bpf/bpf_tracing.h>
 11
 12char _license[] SEC("license") = "GPL";
 13
 14#define DUMMY_STORAGE_VALUE 0xdeadbeef
 15
 16int monitored_pid = 0;
 17int inode_storage_result = -1;
 18int sk_storage_result = -1;
 
 19
 20struct local_storage {
 21	struct inode *exec_inode;
 22	__u32 value;
 23	struct bpf_spin_lock lock;
 24};
 25
 26struct {
 27	__uint(type, BPF_MAP_TYPE_INODE_STORAGE);
 28	__uint(map_flags, BPF_F_NO_PREALLOC);
 29	__type(key, int);
 30	__type(value, struct local_storage);
 31} inode_storage_map SEC(".maps");
 32
 33struct {
 34	__uint(type, BPF_MAP_TYPE_SK_STORAGE);
 35	__uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE);
 36	__type(key, int);
 37	__type(value, struct local_storage);
 38} sk_storage_map SEC(".maps");
 39
 40struct {
 
 
 
 
 
 
 
 41	__uint(type, BPF_MAP_TYPE_TASK_STORAGE);
 42	__uint(map_flags, BPF_F_NO_PREALLOC);
 43	__type(key, int);
 44	__type(value, struct local_storage);
 45} task_storage_map SEC(".maps");
 46
 
 
 
 
 
 
 
 47SEC("lsm/inode_unlink")
 48int BPF_PROG(unlink_hook, struct inode *dir, struct dentry *victim)
 49{
 50	__u32 pid = bpf_get_current_pid_tgid() >> 32;
 
 51	struct local_storage *storage;
 
 52	bool is_self_unlink;
 53
 54	if (pid != monitored_pid)
 55		return 0;
 56
 57	storage = bpf_task_storage_get(&task_storage_map,
 58				       bpf_get_current_task_btf(), 0, 0);
 59	if (storage) {
 60		/* Don't let an executable delete itself */
 61		bpf_spin_lock(&storage->lock);
 62		is_self_unlink = storage->exec_inode == victim->d_inode;
 63		bpf_spin_unlock(&storage->lock);
 64		if (is_self_unlink)
 65			return -EPERM;
 66	}
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 67
 68	return 0;
 69}
 70
 71SEC("lsm/inode_rename")
 72int BPF_PROG(inode_rename, struct inode *old_dir, struct dentry *old_dentry,
 73	     struct inode *new_dir, struct dentry *new_dentry,
 74	     unsigned int flags)
 75{
 76	__u32 pid = bpf_get_current_pid_tgid() >> 32;
 77	struct local_storage *storage;
 78	int err;
 79
 80	/* new_dentry->d_inode can be NULL when the inode is renamed to a file
 81	 * that did not exist before. The helper should be able to handle this
 82	 * NULL pointer.
 83	 */
 84	bpf_inode_storage_get(&inode_storage_map, new_dentry->d_inode, 0,
 85			      BPF_LOCAL_STORAGE_GET_F_CREATE);
 86
 87	storage = bpf_inode_storage_get(&inode_storage_map, old_dentry->d_inode,
 88					0, 0);
 89	if (!storage)
 90		return 0;
 91
 92	bpf_spin_lock(&storage->lock);
 93	if (storage->value != DUMMY_STORAGE_VALUE)
 94		inode_storage_result = -1;
 95	bpf_spin_unlock(&storage->lock);
 96
 97	err = bpf_inode_storage_delete(&inode_storage_map, old_dentry->d_inode);
 98	if (!err)
 99		inode_storage_result = err;
100
101	return 0;
102}
103
104SEC("lsm/socket_bind")
105int BPF_PROG(socket_bind, struct socket *sock, struct sockaddr *address,
106	     int addrlen)
107{
108	__u32 pid = bpf_get_current_pid_tgid() >> 32;
109	struct local_storage *storage;
110	int err;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
111
112	if (pid != monitored_pid)
113		return 0;
114
115	storage = bpf_sk_storage_get(&sk_storage_map, sock->sk, 0,
116				     BPF_LOCAL_STORAGE_GET_F_CREATE);
117	if (!storage)
118		return 0;
119
120	bpf_spin_lock(&storage->lock);
121	if (storage->value != DUMMY_STORAGE_VALUE)
122		sk_storage_result = -1;
123	bpf_spin_unlock(&storage->lock);
124
125	err = bpf_sk_storage_delete(&sk_storage_map, sock->sk);
126	if (!err)
127		sk_storage_result = err;
128
 
129	return 0;
130}
131
132SEC("lsm/socket_post_create")
133int BPF_PROG(socket_post_create, struct socket *sock, int family, int type,
134	     int protocol, int kern)
135{
136	__u32 pid = bpf_get_current_pid_tgid() >> 32;
137	struct local_storage *storage;
 
138
139	if (pid != monitored_pid)
140		return 0;
141
142	storage = bpf_sk_storage_get(&sk_storage_map, sock->sk, 0,
143				     BPF_LOCAL_STORAGE_GET_F_CREATE);
144	if (!storage)
145		return 0;
146
147	bpf_spin_lock(&storage->lock);
148	storage->value = DUMMY_STORAGE_VALUE;
149	bpf_spin_unlock(&storage->lock);
150
151	return 0;
152}
153
154/* This uses the local storage to remember the inode of the binary that a
155 * process was originally executing.
156 */
157SEC("lsm/bprm_committed_creds")
158void BPF_PROG(exec, struct linux_binprm *bprm)
159{
160	__u32 pid = bpf_get_current_pid_tgid() >> 32;
161	struct local_storage *storage;
162
163	if (pid != monitored_pid)
164		return;
165
166	storage = bpf_task_storage_get(&task_storage_map,
167				       bpf_get_current_task_btf(), 0,
168				       BPF_LOCAL_STORAGE_GET_F_CREATE);
169	if (storage) {
170		bpf_spin_lock(&storage->lock);
171		storage->exec_inode = bprm->file->f_inode;
172		bpf_spin_unlock(&storage->lock);
173	}
174
175	storage = bpf_inode_storage_get(&inode_storage_map, bprm->file->f_inode,
176					0, BPF_LOCAL_STORAGE_GET_F_CREATE);
177	if (!storage)
178		return;
179
180	bpf_spin_lock(&storage->lock);
181	storage->value = DUMMY_STORAGE_VALUE;
182	bpf_spin_unlock(&storage->lock);
183}