| // SPDX-License-Identifier: GPL-2.0 |
| |
| /* |
| * Copyright 2020 Google LLC. |
| */ |
| |
| #include "vmlinux.h" |
| #include <errno.h> |
| #include <bpf/bpf_helpers.h> |
| #include <bpf/bpf_tracing.h> |
| |
| char _license[] SEC("license") = "GPL"; |
| |
| #define DUMMY_STORAGE_VALUE 0xdeadbeef |
| |
| __u32 monitored_pid = 0; |
| int inode_storage_result = -1; |
| int sk_storage_result = -1; |
| int task_storage_result = -1; |
| |
| struct local_storage { |
| struct inode *exec_inode; |
| __u32 value; |
| }; |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_INODE_STORAGE); |
| __uint(map_flags, BPF_F_NO_PREALLOC); |
| __type(key, int); |
| __type(value, struct local_storage); |
| } inode_storage_map SEC(".maps"); |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_SK_STORAGE); |
| __uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE); |
| __type(key, int); |
| __type(value, struct local_storage); |
| } sk_storage_map SEC(".maps"); |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_SK_STORAGE); |
| __uint(map_flags, BPF_F_NO_PREALLOC | BPF_F_CLONE); |
| __type(key, int); |
| __type(value, struct local_storage); |
| } sk_storage_map2 SEC(".maps"); |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_TASK_STORAGE); |
| __uint(map_flags, BPF_F_NO_PREALLOC); |
| __type(key, int); |
| __type(value, struct local_storage); |
| } task_storage_map SEC(".maps"); |
| |
| struct { |
| __uint(type, BPF_MAP_TYPE_TASK_STORAGE); |
| __uint(map_flags, BPF_F_NO_PREALLOC); |
| __type(key, int); |
| __type(value, struct local_storage); |
| } task_storage_map2 SEC(".maps"); |
| |
| SEC("lsm/inode_unlink") |
| int BPF_PROG(unlink_hook, struct inode *dir, struct dentry *victim) |
| { |
| __u32 pid = bpf_get_current_pid_tgid() >> 32; |
| struct bpf_local_storage *local_storage; |
| struct local_storage *storage; |
| struct task_struct *task; |
| bool is_self_unlink; |
| |
| if (pid != monitored_pid) |
| return 0; |
| |
| task = bpf_get_current_task_btf(); |
| if (!task) |
| return 0; |
| |
| task_storage_result = -1; |
| |
| storage = bpf_task_storage_get(&task_storage_map, task, 0, 0); |
| if (!storage) |
| return 0; |
| |
| /* Don't let an executable delete itself */ |
| is_self_unlink = storage->exec_inode == victim->d_inode; |
| |
| storage = bpf_task_storage_get(&task_storage_map2, task, 0, |
| BPF_LOCAL_STORAGE_GET_F_CREATE); |
| if (!storage || storage->value) |
| return 0; |
| |
| if (bpf_task_storage_delete(&task_storage_map, task)) |
| return 0; |
| |
| /* Ensure that the task_storage_map is disconnected from the storage. |
| * The storage memory should not be freed back to the |
| * bpf_mem_alloc. |
| */ |
| local_storage = task->bpf_storage; |
| if (!local_storage || local_storage->smap) |
| return 0; |
| |
| task_storage_result = 0; |
| |
| return is_self_unlink ? -EPERM : 0; |
| } |
| |
| SEC("lsm.s/inode_rename") |
| int BPF_PROG(inode_rename, struct inode *old_dir, struct dentry *old_dentry, |
| struct inode *new_dir, struct dentry *new_dentry, |
| unsigned int flags) |
| { |
| struct local_storage *storage; |
| int err; |
| |
| /* new_dentry->d_inode can be NULL when the inode is renamed to a file |
| * that did not exist before. The helper should be able to handle this |
| * NULL pointer. |
| */ |
| bpf_inode_storage_get(&inode_storage_map, new_dentry->d_inode, 0, |
| BPF_LOCAL_STORAGE_GET_F_CREATE); |
| |
| storage = bpf_inode_storage_get(&inode_storage_map, old_dentry->d_inode, |
| 0, 0); |
| if (!storage) |
| return 0; |
| |
| if (storage->value != DUMMY_STORAGE_VALUE) |
| inode_storage_result = -1; |
| |
| err = bpf_inode_storage_delete(&inode_storage_map, old_dentry->d_inode); |
| if (!err) |
| inode_storage_result = err; |
| |
| return 0; |
| } |
| |
| SEC("lsm.s/socket_bind") |
| int BPF_PROG(socket_bind, struct socket *sock, struct sockaddr *address, |
| int addrlen) |
| { |
| __u32 pid = bpf_get_current_pid_tgid() >> 32; |
| struct local_storage *storage; |
| struct sock *sk = sock->sk; |
| |
| if (pid != monitored_pid || !sk) |
| return 0; |
| |
| storage = bpf_sk_storage_get(&sk_storage_map, sk, 0, 0); |
| if (!storage) |
| return 0; |
| |
| sk_storage_result = -1; |
| if (storage->value != DUMMY_STORAGE_VALUE) |
| return 0; |
| |
| /* This tests that we can associate multiple elements |
| * with the local storage. |
| */ |
| storage = bpf_sk_storage_get(&sk_storage_map2, sk, 0, |
| BPF_LOCAL_STORAGE_GET_F_CREATE); |
| if (!storage) |
| return 0; |
| |
| if (bpf_sk_storage_delete(&sk_storage_map2, sk)) |
| return 0; |
| |
| storage = bpf_sk_storage_get(&sk_storage_map2, sk, 0, |
| BPF_LOCAL_STORAGE_GET_F_CREATE); |
| if (!storage) |
| return 0; |
| |
| if (bpf_sk_storage_delete(&sk_storage_map, sk)) |
| return 0; |
| |
| /* Ensure that the sk_storage_map is disconnected from the storage. */ |
| if (!sk->sk_bpf_storage || sk->sk_bpf_storage->smap) |
| return 0; |
| |
| sk_storage_result = 0; |
| return 0; |
| } |
| |
| SEC("lsm.s/socket_post_create") |
| int BPF_PROG(socket_post_create, struct socket *sock, int family, int type, |
| int protocol, int kern) |
| { |
| __u32 pid = bpf_get_current_pid_tgid() >> 32; |
| struct local_storage *storage; |
| struct sock *sk = sock->sk; |
| |
| if (pid != monitored_pid || !sk) |
| return 0; |
| |
| storage = bpf_sk_storage_get(&sk_storage_map, sk, 0, |
| BPF_LOCAL_STORAGE_GET_F_CREATE); |
| if (!storage) |
| return 0; |
| |
| storage->value = DUMMY_STORAGE_VALUE; |
| |
| return 0; |
| } |
| |
| /* This uses the local storage to remember the inode of the binary that a |
| * process was originally executing. |
| */ |
| SEC("lsm.s/bprm_committed_creds") |
| void BPF_PROG(exec, struct linux_binprm *bprm) |
| { |
| __u32 pid = bpf_get_current_pid_tgid() >> 32; |
| struct local_storage *storage; |
| |
| if (pid != monitored_pid) |
| return; |
| |
| storage = bpf_task_storage_get(&task_storage_map, |
| bpf_get_current_task_btf(), 0, |
| BPF_LOCAL_STORAGE_GET_F_CREATE); |
| if (storage) |
| storage->exec_inode = bprm->file->f_inode; |
| |
| storage = bpf_inode_storage_get(&inode_storage_map, bprm->file->f_inode, |
| 0, BPF_LOCAL_STORAGE_GET_F_CREATE); |
| if (!storage) |
| return; |
| |
| storage->value = DUMMY_STORAGE_VALUE; |
| } |