Loading...
1// SPDX-License-Identifier: GPL-2.0
2
3/*
4 * Copyright 2020 Google LLC.
5 */
6
7#include "vmlinux.h"
8#include <errno.h>
9#include <bpf/bpf_helpers.h>
10#include <bpf/bpf_tracing.h>
11
12char _license[] SEC("license") = "GPL";
13
14#define DUMMY_STORAGE_VALUE 0xdeadbeef
15
16__u32 monitored_pid = 0;
17int inode_storage_result = -1;
18int sk_storage_result = -1;
19int task_storage_result = -1;
20
21struct local_storage {
22 struct inode *exec_inode;
23 __u32 value;
24};
25
26struct {
27 __uint(type, BPF_MAP_TYPE_INODE_STORAGE);
28 __uint(map_flags, BPF_F_NO_PREALLOC);
29 __type(key, int);
30 __type(value, struct local_storage);
31} inode_storage_map SEC(".maps");
32
33struct {
34 __uint(type, BPF_MAP_TYPE_SK_STORAGE);
35 __uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE);
36 __type(key, int);
37 __type(value, struct local_storage);
38} sk_storage_map SEC(".maps");
39
40struct {
41 __uint(type, BPF_MAP_TYPE_SK_STORAGE);
42 __uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE);
43 __type(key, int);
44 __type(value, struct local_storage);
45} sk_storage_map2 SEC(".maps");
46
47struct {
48 __uint(type, BPF_MAP_TYPE_TASK_STORAGE);
49 __uint(map_flags, BPF_F_NO_PREALLOC);
50 __type(key, int);
51 __type(value, struct local_storage);
52} task_storage_map SEC(".maps");
53
54struct {
55 __uint(type, BPF_MAP_TYPE_TASK_STORAGE);
56 __uint(map_flags, BPF_F_NO_PREALLOC);
57 __type(key, int);
58 __type(value, struct local_storage);
59} task_storage_map2 SEC(".maps");
60
61SEC("lsm/inode_unlink")
62int BPF_PROG(unlink_hook, struct inode *dir, struct dentry *victim)
63{
64 __u32 pid = bpf_get_current_pid_tgid() >> 32;
65 struct bpf_local_storage *local_storage;
66 struct local_storage *storage;
67 struct task_struct *task;
68 bool is_self_unlink;
69
70 if (pid != monitored_pid)
71 return 0;
72
73 task = bpf_get_current_task_btf();
74 if (!task)
75 return 0;
76
77 task_storage_result = -1;
78
79 storage = bpf_task_storage_get(&task_storage_map, task, 0, 0);
80 if (!storage)
81 return 0;
82
83 /* Don't let an executable delete itself */
84 is_self_unlink = storage->exec_inode == victim->d_inode;
85
86 storage = bpf_task_storage_get(&task_storage_map2, task, 0,
87 BPF_LOCAL_STORAGE_GET_F_CREATE);
88 if (!storage || storage->value)
89 return 0;
90
91 if (bpf_task_storage_delete(&task_storage_map, task))
92 return 0;
93
94 /* Ensure that the task_storage_map is disconnected from the storage.
95 * The storage memory should not be freed back to the
96 * bpf_mem_alloc.
97 */
98 local_storage = task->bpf_storage;
99 if (!local_storage || local_storage->smap)
100 return 0;
101
102 task_storage_result = 0;
103
104 return is_self_unlink ? -EPERM : 0;
105}
106
107SEC("lsm.s/inode_rename")
108int BPF_PROG(inode_rename, struct inode *old_dir, struct dentry *old_dentry,
109 struct inode *new_dir, struct dentry *new_dentry,
110 unsigned int flags)
111{
112 struct local_storage *storage;
113 int err;
114
115 /* new_dentry->d_inode can be NULL when the inode is renamed to a file
116 * that did not exist before. The helper should be able to handle this
117 * NULL pointer.
118 */
119 bpf_inode_storage_get(&inode_storage_map, new_dentry->d_inode, 0,
120 BPF_LOCAL_STORAGE_GET_F_CREATE);
121
122 storage = bpf_inode_storage_get(&inode_storage_map, old_dentry->d_inode,
123 0, 0);
124 if (!storage)
125 return 0;
126
127 if (storage->value != DUMMY_STORAGE_VALUE)
128 inode_storage_result = -1;
129
130 err = bpf_inode_storage_delete(&inode_storage_map, old_dentry->d_inode);
131 if (!err)
132 inode_storage_result = err;
133
134 return 0;
135}
136
137SEC("lsm.s/socket_bind")
138int BPF_PROG(socket_bind, struct socket *sock, struct sockaddr *address,
139 int addrlen)
140{
141 __u32 pid = bpf_get_current_pid_tgid() >> 32;
142 struct local_storage *storage;
143 struct sock *sk = sock->sk;
144
145 if (pid != monitored_pid || !sk)
146 return 0;
147
148 storage = bpf_sk_storage_get(&sk_storage_map, sk, 0, 0);
149 if (!storage)
150 return 0;
151
152 sk_storage_result = -1;
153 if (storage->value != DUMMY_STORAGE_VALUE)
154 return 0;
155
156 /* This tests that we can associate multiple elements
157 * with the local storage.
158 */
159 storage = bpf_sk_storage_get(&sk_storage_map2, sk, 0,
160 BPF_LOCAL_STORAGE_GET_F_CREATE);
161 if (!storage)
162 return 0;
163
164 if (bpf_sk_storage_delete(&sk_storage_map2, sk))
165 return 0;
166
167 storage = bpf_sk_storage_get(&sk_storage_map2, sk, 0,
168 BPF_LOCAL_STORAGE_GET_F_CREATE);
169 if (!storage)
170 return 0;
171
172 if (bpf_sk_storage_delete(&sk_storage_map, sk))
173 return 0;
174
175 /* Ensure that the sk_storage_map is disconnected from the storage. */
176 if (!sk->sk_bpf_storage || sk->sk_bpf_storage->smap)
177 return 0;
178
179 sk_storage_result = 0;
180 return 0;
181}
182
183SEC("lsm.s/socket_post_create")
184int BPF_PROG(socket_post_create, struct socket *sock, int family, int type,
185 int protocol, int kern)
186{
187 __u32 pid = bpf_get_current_pid_tgid() >> 32;
188 struct local_storage *storage;
189 struct sock *sk = sock->sk;
190
191 if (pid != monitored_pid || !sk)
192 return 0;
193
194 storage = bpf_sk_storage_get(&sk_storage_map, sk, 0,
195 BPF_LOCAL_STORAGE_GET_F_CREATE);
196 if (!storage)
197 return 0;
198
199 storage->value = DUMMY_STORAGE_VALUE;
200
201 return 0;
202}
203
204/* This uses the local storage to remember the inode of the binary that a
205 * process was originally executing.
206 */
207SEC("lsm.s/bprm_committed_creds")
208void BPF_PROG(exec, struct linux_binprm *bprm)
209{
210 __u32 pid = bpf_get_current_pid_tgid() >> 32;
211 struct local_storage *storage;
212
213 if (pid != monitored_pid)
214 return;
215
216 storage = bpf_task_storage_get(&task_storage_map,
217 bpf_get_current_task_btf(), 0,
218 BPF_LOCAL_STORAGE_GET_F_CREATE);
219 if (storage)
220 storage->exec_inode = bprm->file->f_inode;
221
222 storage = bpf_inode_storage_get(&inode_storage_map, bprm->file->f_inode,
223 0, BPF_LOCAL_STORAGE_GET_F_CREATE);
224 if (!storage)
225 return;
226
227 storage->value = DUMMY_STORAGE_VALUE;
228}
1// SPDX-License-Identifier: GPL-2.0
2
3/*
4 * Copyright 2020 Google LLC.
5 */
6
7#include "vmlinux.h"
8#include <errno.h>
9#include <bpf/bpf_helpers.h>
10#include <bpf/bpf_tracing.h>
11
12char _license[] SEC("license") = "GPL";
13
14#define DUMMY_STORAGE_VALUE 0xdeadbeef
15
16int monitored_pid = 0;
17int inode_storage_result = -1;
18int sk_storage_result = -1;
19
20struct local_storage {
21 struct inode *exec_inode;
22 __u32 value;
23};
24
25struct {
26 __uint(type, BPF_MAP_TYPE_INODE_STORAGE);
27 __uint(map_flags, BPF_F_NO_PREALLOC);
28 __type(key, int);
29 __type(value, struct local_storage);
30} inode_storage_map SEC(".maps");
31
32struct {
33 __uint(type, BPF_MAP_TYPE_SK_STORAGE);
34 __uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE);
35 __type(key, int);
36 __type(value, struct local_storage);
37} sk_storage_map SEC(".maps");
38
39struct {
40 __uint(type, BPF_MAP_TYPE_SK_STORAGE);
41 __uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE);
42 __type(key, int);
43 __type(value, struct local_storage);
44} sk_storage_map2 SEC(".maps");
45
46struct {
47 __uint(type, BPF_MAP_TYPE_TASK_STORAGE);
48 __uint(map_flags, BPF_F_NO_PREALLOC);
49 __type(key, int);
50 __type(value, struct local_storage);
51} task_storage_map SEC(".maps");
52
53SEC("lsm/inode_unlink")
54int BPF_PROG(unlink_hook, struct inode *dir, struct dentry *victim)
55{
56 __u32 pid = bpf_get_current_pid_tgid() >> 32;
57 struct local_storage *storage;
58 bool is_self_unlink;
59
60 if (pid != monitored_pid)
61 return 0;
62
63 storage = bpf_task_storage_get(&task_storage_map,
64 bpf_get_current_task_btf(), 0, 0);
65 if (storage) {
66 /* Don't let an executable delete itself */
67 is_self_unlink = storage->exec_inode == victim->d_inode;
68 if (is_self_unlink)
69 return -EPERM;
70 }
71
72 return 0;
73}
74
75SEC("lsm.s/inode_rename")
76int BPF_PROG(inode_rename, struct inode *old_dir, struct dentry *old_dentry,
77 struct inode *new_dir, struct dentry *new_dentry,
78 unsigned int flags)
79{
80 __u32 pid = bpf_get_current_pid_tgid() >> 32;
81 struct local_storage *storage;
82 int err;
83
84 /* new_dentry->d_inode can be NULL when the inode is renamed to a file
85 * that did not exist before. The helper should be able to handle this
86 * NULL pointer.
87 */
88 bpf_inode_storage_get(&inode_storage_map, new_dentry->d_inode, 0,
89 BPF_LOCAL_STORAGE_GET_F_CREATE);
90
91 storage = bpf_inode_storage_get(&inode_storage_map, old_dentry->d_inode,
92 0, 0);
93 if (!storage)
94 return 0;
95
96 if (storage->value != DUMMY_STORAGE_VALUE)
97 inode_storage_result = -1;
98
99 err = bpf_inode_storage_delete(&inode_storage_map, old_dentry->d_inode);
100 if (!err)
101 inode_storage_result = err;
102
103 return 0;
104}
105
106SEC("lsm.s/socket_bind")
107int BPF_PROG(socket_bind, struct socket *sock, struct sockaddr *address,
108 int addrlen)
109{
110 __u32 pid = bpf_get_current_pid_tgid() >> 32;
111 struct local_storage *storage;
112 int err;
113
114 if (pid != monitored_pid)
115 return 0;
116
117 storage = bpf_sk_storage_get(&sk_storage_map, sock->sk, 0,
118 BPF_LOCAL_STORAGE_GET_F_CREATE);
119 if (!storage)
120 return 0;
121
122 if (storage->value != DUMMY_STORAGE_VALUE)
123 sk_storage_result = -1;
124
125 /* This tests that we can associate multiple elements
126 * with the local storage.
127 */
128 storage = bpf_sk_storage_get(&sk_storage_map2, sock->sk, 0,
129 BPF_LOCAL_STORAGE_GET_F_CREATE);
130 if (!storage)
131 return 0;
132
133 err = bpf_sk_storage_delete(&sk_storage_map, sock->sk);
134 if (err)
135 return 0;
136
137 err = bpf_sk_storage_delete(&sk_storage_map2, sock->sk);
138 if (!err)
139 sk_storage_result = err;
140
141 return 0;
142}
143
144SEC("lsm.s/socket_post_create")
145int BPF_PROG(socket_post_create, struct socket *sock, int family, int type,
146 int protocol, int kern)
147{
148 __u32 pid = bpf_get_current_pid_tgid() >> 32;
149 struct local_storage *storage;
150
151 if (pid != monitored_pid)
152 return 0;
153
154 storage = bpf_sk_storage_get(&sk_storage_map, sock->sk, 0,
155 BPF_LOCAL_STORAGE_GET_F_CREATE);
156 if (!storage)
157 return 0;
158
159 storage->value = DUMMY_STORAGE_VALUE;
160
161 return 0;
162}
163
164/* This uses the local storage to remember the inode of the binary that a
165 * process was originally executing.
166 */
167SEC("lsm.s/bprm_committed_creds")
168void BPF_PROG(exec, struct linux_binprm *bprm)
169{
170 __u32 pid = bpf_get_current_pid_tgid() >> 32;
171 struct local_storage *storage;
172
173 if (pid != monitored_pid)
174 return;
175
176 storage = bpf_task_storage_get(&task_storage_map,
177 bpf_get_current_task_btf(), 0,
178 BPF_LOCAL_STORAGE_GET_F_CREATE);
179 if (storage)
180 storage->exec_inode = bprm->file->f_inode;
181
182 storage = bpf_inode_storage_get(&inode_storage_map, bprm->file->f_inode,
183 0, BPF_LOCAL_STORAGE_GET_F_CREATE);
184 if (!storage)
185 return;
186
187 storage->value = DUMMY_STORAGE_VALUE;
188}