On 06/02, Andrii Nakryiko wrote: > Add new kind of BPF kernel object, BPF token. BPF token is meant to to > allow delegating privileged BPF functionality, like loading a BPF > program or creating a BPF map, from privileged process to a *trusted* > unprivileged process, all while have a good amount of control over which > privileged operation could be done using provided BPF token. > > This patch adds new BPF_TOKEN_CREATE command to bpf() syscall, which > allows to create a new BPF token object along with a set of allowed > commands. Currently only BPF_TOKEN_CREATE command itself can be > delegated, but other patches gradually add ability to delegate > BPF_MAP_CREATE, BPF_BTF_LOAD, and BPF_PROG_LOAD commands. > > The above means that BPF token creation can be allowed by another > existing BPF token, if original privileged creator allowed that. New > derived BPF token cannot be more powerful than the original BPF token. > > BPF_F_TOKEN_IGNORE_UNKNOWN_CMDS flag is added to allow application to do > express "all supported BPF commands should be allowed" without worrying > about which subset of desired commands is actually supported by > potentially outdated kernel. Allowing this semantics doesn't seem to > introduce any backwards compatibility issues and doesn't introduce any > risk of abusing or misusing bit set field, but makes backwards > compatibility story for various applications and tools much more > straightforward, making it unnecessary to probe support for each > individual possible bit. This is especially useful in follow up patches > where we add BPF map types and prog types bit sets. > > Lastly, BPF token can be pinned in and retrieved from BPF FS, just like > progs, maps, BTFs, and links. This allows applications (like container > managers) to share BPF token with other applications through file system > just like any other BPF object, and further control access to it using > file system permissions, if desired. > > Signed-off-by: Andrii Nakryiko <andrii@xxxxxxxxxx> > --- > include/linux/bpf.h | 34 +++++++++ > include/uapi/linux/bpf.h | 42 ++++++++++++ > kernel/bpf/Makefile | 2 +- > kernel/bpf/inode.c | 26 +++++++ > kernel/bpf/syscall.c | 74 ++++++++++++++++++++ > kernel/bpf/token.c | 122 +++++++++++++++++++++++++++++++++ > tools/include/uapi/linux/bpf.h | 40 +++++++++++ > 7 files changed, 339 insertions(+), 1 deletion(-) > create mode 100644 kernel/bpf/token.c > > diff --git a/include/linux/bpf.h b/include/linux/bpf.h > index f58895830ada..fe6d51c3a5b1 100644 > --- a/include/linux/bpf.h > +++ b/include/linux/bpf.h > @@ -51,6 +51,7 @@ struct module; > struct bpf_func_state; > struct ftrace_ops; > struct cgroup; > +struct bpf_token; > > extern struct idr btf_idr; > extern spinlock_t btf_idr_lock; > @@ -1533,6 +1534,12 @@ struct bpf_link_primer { > u32 id; > }; > > +struct bpf_token { > + struct work_struct work; > + atomic64_t refcnt; > + u64 allowed_cmds; > +}; > + > struct bpf_struct_ops_value; > struct btf_member; > > @@ -2077,6 +2084,15 @@ struct file *bpf_link_new_file(struct bpf_link *link, int *reserved_fd); > struct bpf_link *bpf_link_get_from_fd(u32 ufd); > struct bpf_link *bpf_link_get_curr_or_next(u32 *id); > > +void bpf_token_inc(struct bpf_token *token); > +void bpf_token_put(struct bpf_token *token); > +struct bpf_token *bpf_token_alloc(void); > +int bpf_token_new_fd(struct bpf_token *token); > +struct bpf_token *bpf_token_get_from_fd(u32 ufd); > + > +bool bpf_token_capable(const struct bpf_token *token, int cap); > +bool bpf_token_allow_cmd(const struct bpf_token *token, enum bpf_cmd cmd); > + > int bpf_obj_pin_user(u32 ufd, int path_fd, const char __user *pathname); > int bpf_obj_get_user(int path_fd, const char __user *pathname, int flags); > > @@ -2436,6 +2452,24 @@ static inline int bpf_obj_get_user(const char __user *pathname, int flags) > return -EOPNOTSUPP; > } > > +static inline void bpf_token_inc(struct bpf_token *token) > +{ > +} > + > +static inline void bpf_token_put(struct bpf_token *token) > +{ > +} > + > +static inline struct bpf_token *bpf_token_new_fd(struct bpf_token *token) > +{ > + return -EOPNOTSUPP; > +} > + > +static inline struct bpf_token *bpf_token_get_from_fd(u32 ufd) > +{ > + return ERR_PTR(-EOPNOTSUPP); > +} > + > static inline void __dev_flush(void) > { > } > diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h > index 9273c654743c..01ab79f2ad9f 100644 > --- a/include/uapi/linux/bpf.h > +++ b/include/uapi/linux/bpf.h > @@ -846,6 +846,16 @@ union bpf_iter_link_info { > * Returns zero on success. On error, -1 is returned and *errno* > * is set appropriately. > * > + * BPF_TOKEN_CREATE > + * Description > + * Create BPF token with embedded information about what > + * BPF-related functionality is allowed. This BPF token can be > + * passed as an extra parameter to various bpf() syscall command. > + * > + * Return > + * A new file descriptor (a nonnegative integer), or -1 if an > + * error occurred (in which case, *errno* is set appropriately). > + * > * NOTES > * eBPF objects (maps and programs) can be shared between processes. > * > @@ -900,6 +910,7 @@ enum bpf_cmd { > BPF_ITER_CREATE, > BPF_LINK_DETACH, > BPF_PROG_BIND_MAP, > + BPF_TOKEN_CREATE, > }; > > enum bpf_map_type { > @@ -1169,6 +1180,24 @@ enum bpf_link_type { > */ > #define BPF_F_KPROBE_MULTI_RETURN (1U << 0) > > +/* BPF_TOKEN_CREATE command flags > + */ > +enum { > + /* Ignore unrecognized bits in token_create.allowed_cmds bit set. If > + * this flag is set, kernel won't return -EINVAL for a bit > + * corresponding to a non-existing command or the one that doesn't > + * support BPF token passing. This flags allows application to request > + * BPF token creation for a desired set of commands without worrying > + * about older kernels not supporting some of the commands. > + * Presumably, deployed applications will do separate feature > + * detection and will avoid calling not-yet-supported bpf() commands, > + * so this BPF token will work equally well both on older and newer > + * kernels, even if some of the requested commands won't be BPF > + * token-enabled. > + */ > + BPF_F_TOKEN_IGNORE_UNKNOWN_CMDS = 1U << 0, > +}; > + > /* When BPF ldimm64's insn[0].src_reg != 0 then this can have > * the following extensions: > * > @@ -1621,6 +1650,19 @@ union bpf_attr { > __u32 flags; /* extra flags */ > } prog_bind_map; > > + struct { /* struct used by BPF_TOKEN_CREATE command */ > + __u32 flags; > + __u32 token_fd; > + /* a bit set of allowed bpf() syscall commands, > + * e.g., (1ULL << BPF_TOKEN_CREATE) | (1ULL << BPF_PROG_LOAD) > + * will allow creating derived BPF tokens and loading new BPF > + * programs; > + * see also BPF_F_TOKEN_IGNORE_UNKNOWN_CMDS for its effect on > + * validity checking of this set > + */ > + __u64 allowed_cmds; > + } token_create; Do you think this might eventually grow into something like "allow only lookup operation for this specific map"? If yes, maybe it makes sense to separate token-create vs token-add-capability operations? BPF_TOKEN_CREATE would create a token that can't do anything. Then you would call a bunch of BPF_TOKEN_ALLOW with maybe op=SYSCALL_CMD value=BPF_TOKEN_CREATE. This will be more future-proof plus won't really depend on having a bitmask in the uapi. Then the users will be able to handle BPF_TOKEN_ALLOW{op=SYSCALL_CMD value=SOME_VALUE_NOT_SUPPORTED_ON_THIS_KERNEL} themselves (IOW, BPF_F_TOKEN_IGNORE_UNKNOWN_CMDS won't be needed).