xref: /linux/tools/testing/selftests/bpf/progs/verifier_global_subprogs.c (revision 06a130e42a5bfc84795464bff023bff4c16f58c5)
1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2023 Meta Platforms, Inc. and affiliates. */
3 
4 #include <vmlinux.h>
5 #include <bpf/bpf_helpers.h>
6 #include <bpf/bpf_tracing.h>
7 #include "bpf_misc.h"
8 #include "xdp_metadata.h"
9 #include "bpf_kfuncs.h"
10 #include "err.h"
11 
12 /* The compiler may be able to detect the access to uninitialized
13    memory in the routines performing out of bound memory accesses and
14    emit warnings about it.  This is the case of GCC. */
15 #if !defined(__clang__)
16 #pragma GCC diagnostic ignored "-Wmaybe-uninitialized"
17 #endif
18 
19 int arr[1];
20 int unkn_idx;
21 const volatile bool call_dead_subprog = false;
22 
23 __noinline long global_bad(void)
24 {
25 	return arr[unkn_idx]; /* BOOM */
26 }
27 
28 __noinline long global_good(void)
29 {
30 	return arr[0];
31 }
32 
33 __noinline long global_calls_bad(void)
34 {
35 	return global_good() + global_bad() /* does BOOM indirectly */;
36 }
37 
38 __noinline long global_calls_good_only(void)
39 {
40 	return global_good();
41 }
42 
43 __noinline long global_dead(void)
44 {
45 	return arr[0] * 2;
46 }
47 
48 SEC("?raw_tp")
49 __success __log_level(2)
50 /* main prog is validated completely first */
51 __msg("('global_calls_good_only') is global and assumed valid.")
52 /* eventually global_good() is transitively validated as well */
53 __msg("Validating global_good() func")
54 __msg("('global_good') is safe for any args that match its prototype")
55 int chained_global_func_calls_success(void)
56 {
57 	int sum = 0;
58 
59 	if (call_dead_subprog)
60 		sum += global_dead();
61 	return global_calls_good_only() + sum;
62 }
63 
64 SEC("?raw_tp")
65 __failure __log_level(2)
66 /* main prog validated successfully first */
67 __msg("('global_calls_bad') is global and assumed valid.")
68 /* eventually we validate global_bad() and fail */
69 __msg("Validating global_bad() func")
70 __msg("math between map_value pointer and register") /* BOOM */
71 int chained_global_func_calls_bad(void)
72 {
73 	return global_calls_bad();
74 }
75 
76 /* do out of bounds access forcing verifier to fail verification if this
77  * global func is called
78  */
79 __noinline int global_unsupp(const int *mem)
80 {
81 	if (!mem)
82 		return 0;
83 	return mem[100]; /* BOOM */
84 }
85 
86 const volatile bool skip_unsupp_global = true;
87 
88 SEC("?raw_tp")
89 __success
90 int guarded_unsupp_global_called(void)
91 {
92 	if (!skip_unsupp_global)
93 		return global_unsupp(NULL);
94 	return 0;
95 }
96 
97 SEC("?raw_tp")
98 __failure __log_level(2)
99 __msg("Func#1 ('global_unsupp') is global and assumed valid.")
100 __msg("Validating global_unsupp() func#1...")
101 __msg("value is outside of the allowed memory range")
102 int unguarded_unsupp_global_called(void)
103 {
104 	int x = 0;
105 
106 	return global_unsupp(&x);
107 }
108 
109 long stack[128];
110 
111 __weak int subprog_nullable_ptr_bad(int *p)
112 {
113 	return (*p) * 2; /* bad, missing null check */
114 }
115 
116 SEC("?raw_tp")
117 __failure __log_level(2)
118 __msg("invalid mem access 'mem_or_null'")
119 int arg_tag_nullable_ptr_fail(void *ctx)
120 {
121 	int x = 42;
122 
123 	return subprog_nullable_ptr_bad(&x);
124 }
125 
126 typedef struct {
127 	int x;
128 } user_struct_t;
129 
130 __noinline __weak int subprog_user_anon_mem(user_struct_t *t)
131 {
132 	return t ? t->x : 0;
133 }
134 
135 SEC("?tracepoint")
136 __failure __log_level(2)
137 __msg("invalid bpf_context access")
138 __msg("Caller passes invalid args into func#1 ('subprog_user_anon_mem')")
139 int anon_user_mem_invalid(void *ctx)
140 {
141 	/* can't pass PTR_TO_CTX as user memory */
142 	return subprog_user_anon_mem(ctx);
143 }
144 
145 SEC("?tracepoint")
146 __success __log_level(2)
147 __msg("Func#1 ('subprog_user_anon_mem') is safe for any args that match its prototype")
148 int anon_user_mem_valid(void *ctx)
149 {
150 	user_struct_t t = { .x = 42 };
151 
152 	return subprog_user_anon_mem(&t);
153 }
154 
155 __noinline __weak int subprog_nonnull_ptr_good(int *p1 __arg_nonnull, int *p2 __arg_nonnull)
156 {
157 	return (*p1) * (*p2); /* good, no need for NULL checks */
158 }
159 
160 int x = 47;
161 
162 SEC("?raw_tp")
163 __success __log_level(2)
164 int arg_tag_nonnull_ptr_good(void *ctx)
165 {
166 	int y = 74;
167 
168 	return subprog_nonnull_ptr_good(&x, &y);
169 }
170 
171 /* this global subprog can be now called from many types of entry progs, each
172  * with different context type
173  */
174 __weak int subprog_ctx_tag(void *ctx __arg_ctx)
175 {
176 	return bpf_get_stack(ctx, stack, sizeof(stack), 0);
177 }
178 
179 __weak int raw_tp_canonical(struct bpf_raw_tracepoint_args *ctx __arg_ctx)
180 {
181 	return 0;
182 }
183 
184 __weak int raw_tp_u64_array(u64 *ctx __arg_ctx)
185 {
186 	return 0;
187 }
188 
189 SEC("?raw_tp")
190 __success __log_level(2)
191 int arg_tag_ctx_raw_tp(void *ctx)
192 {
193 	return subprog_ctx_tag(ctx) + raw_tp_canonical(ctx) + raw_tp_u64_array(ctx);
194 }
195 
196 SEC("?raw_tp.w")
197 __success __log_level(2)
198 int arg_tag_ctx_raw_tp_writable(void *ctx)
199 {
200 	return subprog_ctx_tag(ctx) + raw_tp_canonical(ctx) + raw_tp_u64_array(ctx);
201 }
202 
203 SEC("?tp_btf/sys_enter")
204 __success __log_level(2)
205 int arg_tag_ctx_raw_tp_btf(void *ctx)
206 {
207 	return subprog_ctx_tag(ctx) + raw_tp_canonical(ctx) + raw_tp_u64_array(ctx);
208 }
209 
210 struct whatever { };
211 
212 __weak int tp_whatever(struct whatever *ctx __arg_ctx)
213 {
214 	return 0;
215 }
216 
217 SEC("?tp")
218 __success __log_level(2)
219 int arg_tag_ctx_tp(void *ctx)
220 {
221 	return subprog_ctx_tag(ctx) + tp_whatever(ctx);
222 }
223 
224 __weak int kprobe_subprog_pt_regs(struct pt_regs *ctx __arg_ctx)
225 {
226 	return 0;
227 }
228 
229 __weak int kprobe_subprog_typedef(bpf_user_pt_regs_t *ctx __arg_ctx)
230 {
231 	return 0;
232 }
233 
234 SEC("?kprobe")
235 __success __log_level(2)
236 int arg_tag_ctx_kprobe(void *ctx)
237 {
238 	return subprog_ctx_tag(ctx) +
239 	       kprobe_subprog_pt_regs(ctx) +
240 	       kprobe_subprog_typedef(ctx);
241 }
242 
243 __weak int perf_subprog_regs(
244 #if defined(bpf_target_riscv)
245 	struct user_regs_struct *ctx __arg_ctx
246 #elif defined(bpf_target_s390)
247 	/* user_pt_regs typedef is anonymous struct, so only `void *` works */
248 	void *ctx __arg_ctx
249 #elif defined(bpf_target_loongarch) || defined(bpf_target_arm64) || defined(bpf_target_powerpc)
250 	struct user_pt_regs *ctx __arg_ctx
251 #else
252 	struct pt_regs *ctx __arg_ctx
253 #endif
254 )
255 {
256 	return 0;
257 }
258 
259 __weak int perf_subprog_typedef(bpf_user_pt_regs_t *ctx __arg_ctx)
260 {
261 	return 0;
262 }
263 
264 __weak int perf_subprog_canonical(struct bpf_perf_event_data *ctx __arg_ctx)
265 {
266 	return 0;
267 }
268 
269 SEC("?perf_event")
270 __success __log_level(2)
271 int arg_tag_ctx_perf(void *ctx)
272 {
273 	return subprog_ctx_tag(ctx) +
274 	       perf_subprog_regs(ctx) +
275 	       perf_subprog_typedef(ctx) +
276 	       perf_subprog_canonical(ctx);
277 }
278 
279 __weak int iter_subprog_void(void *ctx __arg_ctx)
280 {
281 	return 0;
282 }
283 
284 __weak int iter_subprog_typed(struct bpf_iter__task *ctx __arg_ctx)
285 {
286 	return 0;
287 }
288 
289 SEC("?iter/task")
290 __success __log_level(2)
291 int arg_tag_ctx_iter_task(struct bpf_iter__task *ctx)
292 {
293 	return (iter_subprog_void(ctx) + iter_subprog_typed(ctx)) & 1;
294 }
295 
296 __weak int tracing_subprog_void(void *ctx __arg_ctx)
297 {
298 	return 0;
299 }
300 
301 __weak int tracing_subprog_u64(u64 *ctx __arg_ctx)
302 {
303 	return 0;
304 }
305 
306 int acc;
307 
308 SEC("?fentry/" SYS_PREFIX "sys_nanosleep")
309 __success __log_level(2)
310 int BPF_PROG(arg_tag_ctx_fentry)
311 {
312 	acc += tracing_subprog_void(ctx) + tracing_subprog_u64(ctx);
313 	return 0;
314 }
315 
316 SEC("?fexit/" SYS_PREFIX "sys_nanosleep")
317 __success __log_level(2)
318 int BPF_PROG(arg_tag_ctx_fexit)
319 {
320 	acc += tracing_subprog_void(ctx) + tracing_subprog_u64(ctx);
321 	return 0;
322 }
323 
324 SEC("?fmod_ret/" SYS_PREFIX "sys_nanosleep")
325 __success __log_level(2)
326 int BPF_PROG(arg_tag_ctx_fmod_ret)
327 {
328 	return tracing_subprog_void(ctx) + tracing_subprog_u64(ctx);
329 }
330 
331 SEC("?lsm/bpf")
332 __success __log_level(2)
333 int BPF_PROG(arg_tag_ctx_lsm)
334 {
335 	int ret;
336 
337 	ret = tracing_subprog_void(ctx) + tracing_subprog_u64(ctx);
338 	set_if_not_errno_or_zero(ret, -1);
339 	return ret;
340 }
341 
342 SEC("?struct_ops/test_1")
343 __success __log_level(2)
344 int BPF_PROG(arg_tag_ctx_struct_ops)
345 {
346 	return tracing_subprog_void(ctx) + tracing_subprog_u64(ctx);
347 }
348 
349 SEC(".struct_ops")
350 struct bpf_dummy_ops dummy_1 = {
351 	.test_1 = (void *)arg_tag_ctx_struct_ops,
352 };
353 
354 SEC("?syscall")
355 __success __log_level(2)
356 int arg_tag_ctx_syscall(void *ctx)
357 {
358 	return tracing_subprog_void(ctx) + tracing_subprog_u64(ctx) + tp_whatever(ctx);
359 }
360 
361 __weak int subprog_dynptr(struct bpf_dynptr *dptr)
362 {
363 	long *d, t, buf[1] = {};
364 
365 	d = bpf_dynptr_data(dptr, 0, sizeof(long));
366 	if (!d)
367 		return 0;
368 
369 	t = *d + 1;
370 
371 	d = bpf_dynptr_slice(dptr, 0, &buf, sizeof(long));
372 	if (!d)
373 		return t;
374 
375 	t = *d + 2;
376 
377 	return t;
378 }
379 
380 SEC("?xdp")
381 __success __log_level(2)
382 int arg_tag_dynptr(struct xdp_md *ctx)
383 {
384 	struct bpf_dynptr dptr;
385 
386 	bpf_dynptr_from_xdp(ctx, 0, &dptr);
387 
388 	return subprog_dynptr(&dptr);
389 }
390 
391 char _license[] SEC("license") = "GPL";
392