linux-next/net/core/skb_fault_injection.c
Breno Leitao 12079a59ce net: Implement fault injection forcing skb reallocation
Introduce a fault injection mechanism to force skb reallocation. The
primary goal is to catch bugs related to pointer invalidation after
potential skb reallocation.

The fault injection mechanism aims to identify scenarios where callers
retain pointers to various headers in the skb but fail to reload these
pointers after calling a function that may reallocate the data. This
type of bug can lead to memory corruption or crashes if the old,
now-invalid pointers are used.

By forcing reallocation through fault injection, we can stress-test code
paths and ensure proper pointer management after potential skb
reallocations.

Add a hook for fault injection in the following functions:

 * pskb_trim_rcsum()
 * pskb_may_pull_reason()
 * pskb_trim()

As the other fault injection mechanism, protect it under a debug Kconfig
called CONFIG_FAIL_SKB_REALLOC.

This patch was *heavily* inspired by Jakub's proposal from:
https://lore.kernel.org/all/20240719174140.47a868e6@kernel.org/

CC: Akinobu Mita <akinobu.mita@gmail.com>
Suggested-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Breno Leitao <leitao@debian.org>
Reviewed-by: Akinobu Mita <akinobu.mita@gmail.com>
Acked-by: Paolo Abeni <pabeni@redhat.com>
Acked-by: Guillaume Nault <gnault@redhat.com>
Link: https://patch.msgid.link/20241107-fault_v6-v6-1-1b82cb6ecacd@debian.org
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
2024-11-12 12:05:33 +01:00

107 lines
2.3 KiB
C

// SPDX-License-Identifier: GPL-2.0-only
#include <linux/debugfs.h>
#include <linux/fault-inject.h>
#include <linux/netdevice.h>
#include <linux/skbuff.h>
static struct {
struct fault_attr attr;
char devname[IFNAMSIZ];
bool filtered;
} skb_realloc = {
.attr = FAULT_ATTR_INITIALIZER,
.filtered = false,
};
static bool should_fail_net_realloc_skb(struct sk_buff *skb)
{
struct net_device *net = skb->dev;
if (skb_realloc.filtered &&
strncmp(net->name, skb_realloc.devname, IFNAMSIZ))
/* device name filter set, but names do not match */
return false;
if (!should_fail(&skb_realloc.attr, 1))
return false;
return true;
}
ALLOW_ERROR_INJECTION(should_fail_net_realloc_skb, TRUE);
void skb_might_realloc(struct sk_buff *skb)
{
if (!should_fail_net_realloc_skb(skb))
return;
pskb_expand_head(skb, 0, 0, GFP_ATOMIC);
}
EXPORT_SYMBOL(skb_might_realloc);
static int __init fail_skb_realloc_setup(char *str)
{
return setup_fault_attr(&skb_realloc.attr, str);
}
__setup("fail_skb_realloc=", fail_skb_realloc_setup);
static void reset_settings(void)
{
skb_realloc.filtered = false;
memset(&skb_realloc.devname, 0, IFNAMSIZ);
}
static ssize_t devname_write(struct file *file, const char __user *buffer,
size_t count, loff_t *ppos)
{
ssize_t ret;
reset_settings();
ret = simple_write_to_buffer(&skb_realloc.devname, IFNAMSIZ,
ppos, buffer, count);
if (ret < 0)
return ret;
skb_realloc.devname[IFNAMSIZ - 1] = '\0';
/* Remove a possible \n at the end of devname */
strim(skb_realloc.devname);
if (strnlen(skb_realloc.devname, IFNAMSIZ))
skb_realloc.filtered = true;
return count;
}
static ssize_t devname_read(struct file *file,
char __user *buffer,
size_t size, loff_t *ppos)
{
if (!skb_realloc.filtered)
return 0;
return simple_read_from_buffer(buffer, size, ppos, &skb_realloc.devname,
strlen(skb_realloc.devname));
}
static const struct file_operations devname_ops = {
.write = devname_write,
.read = devname_read,
};
static int __init fail_skb_realloc_debugfs(void)
{
umode_t mode = S_IFREG | 0600;
struct dentry *dir;
dir = fault_create_debugfs_attr("fail_skb_realloc", NULL,
&skb_realloc.attr);
if (IS_ERR(dir))
return PTR_ERR(dir);
debugfs_create_file("devname", mode, dir, NULL, &devname_ops);
return 0;
}
late_initcall(fail_skb_realloc_debugfs);