Re: [PATCH] bpf: KUnit-based soundness tests for tnums

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, May 2, 2022 at 1:15 AM Langston Barrett
<langston.barrett@xxxxxxxxx> wrote:
>
> Add tests that check that each binary operation on tnums is a valid
> abstraction of the corresponding operation on u64s. This soundness
> condition is an important part of the security of eBPF.
>
> Signed-off-by: Langston Barrett <langston.barrett@xxxxxxxxx>
> ---
>
> I also made sure that these tests are meaningful by changing the tnum
> operations or test conditions and ensuring that they fail when such
> erroneous modifications are made.
>
> This is my first time submitting a kernel patch. I've read through the
> documentation on doing so, but apologies in advance if I've missed
> something. Thank you very much for your time.
>
>  kernel/bpf/Kconfig     |   7 ++
>  kernel/bpf/Makefile    |   2 +
>  kernel/bpf/tnum_test.c | 208 +++++++++++++++++++++++++++++++++++++++++
>  3 files changed, 217 insertions(+)
>  create mode 100644 kernel/bpf/tnum_test.c
>
> diff --git a/kernel/bpf/Kconfig b/kernel/bpf/Kconfig
> index d56ee177d5f8..c1a726f33193 100644
> --- a/kernel/bpf/Kconfig
> +++ b/kernel/bpf/Kconfig
> @@ -36,6 +36,13 @@ config BPF_SYSCALL
>           Enable the bpf() system call that allows to manipulate BPF programs
>           and maps via file descriptors.
>
> +config BPF_TNUM_TEST
> +       tristate "Enable soundness tests for BPF tnums" if !KUNIT_ALL_TESTS
> +       depends on BPF_SYSCALL && KUNIT=y
> +       default KUNIT_ALL_TESTS
> +       help
> +         Enable KUnit-based soundness tests for BPF tnums.
> +
>  config BPF_JIT
>         bool "Enable BPF Just In Time compiler"
>         depends on BPF
> diff --git a/kernel/bpf/Makefile b/kernel/bpf/Makefile
> index c1a9be6a4b9f..11d88798a538 100644
> --- a/kernel/bpf/Makefile
> +++ b/kernel/bpf/Makefile
> @@ -40,3 +40,5 @@ obj-$(CONFIG_BPF_PRELOAD) += preload/
>  obj-$(CONFIG_BPF_SYSCALL) += relo_core.o
>  $(obj)/relo_core.o: $(srctree)/tools/lib/bpf/relo_core.c FORCE
>         $(call if_changed_rule,cc_o_c)
> +
> +obj-$(CONFIG_BPF_TNUM_TEST) += tnum_test.o
> diff --git a/kernel/bpf/tnum_test.c b/kernel/bpf/tnum_test.c
> new file mode 100644
> index 000000000000..168780b648ac
> --- /dev/null
> +++ b/kernel/bpf/tnum_test.c
> @@ -0,0 +1,208 @@
> +// SPDX-License-Identifier: GPL-2.0-or-later
> +/* Soundness tests for tnums.
> + *
> + * Its important that tnums (and other BPF verifier analyses) soundly
> + * overapproximate the runtime values of registers. If they fail to do so, then
> + * kernel memory corruption may result (see e.g., CVE-2020-8835 and
> + * CVE-2021-3490 for examples where unsound bounds tracking led to exploitable
> + * bugs).
> + *
> + * The implementations of some tnum arithmetic operations have been proven
> + * sound, see "Sound, Precise, and Fast Abstract Interpretation with Tristate
> + * Numbers" (https://arxiv.org/abs/2105.05398). These tests corroborate these
> + * results on actual machine hardware, protect against regressions if the
> + * implementations change, and provide a template for testing new abstract
> + * operations.
> + */
> +
> +#include <kunit/test.h>
> +#include <linux/tnum.h>
> +
> +/* Some number of test cases, particular values not super important but chosen
> + * to be most likely to trigger edge cases.
> + */
> +static u64 interesting_ints[] = { S64_MIN, S32_MIN, -1,             0,
> +                                 1,       2,       U32_MAX, U64_MAX };

Frankly I don't see how running the same test over and over
again will help us discover bugs or catch a regression.
Sorry not applying this.



[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux