From: Jiayuan Chen <[email protected]>

Add a selftest that verifies xdp_master_redirect() does not crash when
the bond master device has never been brought up. The test reproduces
the null-ptr-deref in bond_rr_gen_slave_id() by:

1. Creating bond0 (active-backup, UP) with native XDP attached to
   enable the global bpf_master_redirect_enabled_key
2. Creating bond1 (round-robin, never UP) with veth1 enslaved
3. Attaching generic XDP (XDP_TX) to veth1
4. Running BPF_PROG_TEST_RUN with live frames and XDP_PASS on veth1
   to inject packets into the generic XDP path

Without the fix in xdp_master_redirect(), step 4 causes a kernel crash.

Signed-off-by: Jiayuan Chen <[email protected]>
---
 .../selftests/bpf/prog_tests/xdp_bonding.c    | 101 +++++++++++++++++-
 1 file changed, 99 insertions(+), 2 deletions(-)

diff --git a/tools/testing/selftests/bpf/prog_tests/xdp_bonding.c 
b/tools/testing/selftests/bpf/prog_tests/xdp_bonding.c
index fb952703653e..a5b15e464018 100644
--- a/tools/testing/selftests/bpf/prog_tests/xdp_bonding.c
+++ b/tools/testing/selftests/bpf/prog_tests/xdp_bonding.c
@@ -191,13 +191,18 @@ static int bonding_setup(struct skeletons *skeletons, int 
mode, int xmit_policy,
        return -1;
 }
 
-static void bonding_cleanup(struct skeletons *skeletons)
+static void link_cleanup(struct skeletons *skeletons)
 {
-       restore_root_netns();
        while (skeletons->nlinks) {
                skeletons->nlinks--;
                bpf_link__destroy(skeletons->links[skeletons->nlinks]);
        }
+}
+
+static void bonding_cleanup(struct skeletons *skeletons)
+{
+       restore_root_netns();
+       link_cleanup(skeletons);
        ASSERT_OK(system("ip link delete bond1"), "delete bond1");
        ASSERT_OK(system("ip link delete veth1_1"), "delete veth1_1");
        ASSERT_OK(system("ip link delete veth1_2"), "delete veth1_2");
@@ -493,6 +498,95 @@ static void test_xdp_bonding_nested(struct skeletons 
*skeletons)
        system("ip link del bond_nest2");
 }
 
+/*
+ * Test that XDP redirect via xdp_master_redirect() does not crash when
+ * the bond master device is not up. When bond is in round-robin mode but
+ * never opened, rr_tx_counter is NULL.
+ */
+static void test_xdp_bonding_redirect_no_up(struct skeletons *skeletons)
+{
+       struct nstoken *nstoken = NULL;
+       int xdp_pass_fd, xdp_tx_fd;
+       int veth1_ifindex;
+       int err;
+       char pkt[ETH_HLEN + 1];
+       struct xdp_md ctx_in = {};
+
+       DECLARE_LIBBPF_OPTS(bpf_test_run_opts, opts,
+                           .data_in = &pkt,
+                           .data_size_in = sizeof(pkt),
+                           .ctx_in = &ctx_in,
+                           .ctx_size_in = sizeof(ctx_in),
+                           .flags = BPF_F_TEST_XDP_LIVE_FRAMES,
+                           .repeat = 1,
+                           .batch_size = 1,
+               );
+
+       /* We can't use bonding_setup() because bond will be active */
+       SYS(out, "ip netns add ns_rr_no_up");
+       nstoken = open_netns("ns_rr_no_up");
+       if (!ASSERT_OK_PTR(nstoken, "open ns_rr_no_up"))
+               goto out;
+
+       /* bond0: active-backup, UP with slave veth0.
+        * Attaching native XDP to bond0 enables bpf_master_redirect_enabled_key
+        * globally.
+        */
+       SYS(out, "ip link add bond0 type bond mode active-backup");
+       SYS(out, "ip link add veth0 type veth peer name veth0p");
+       SYS(out, "ip link set veth0 master bond0");
+       SYS(out, "ip link set bond0 up");
+       SYS(out, "ip link set veth0p up");
+
+       /* bond1: round-robin, never UP -> rr_tx_counter stays NULL */
+       SYS(out, "ip link add bond1 type bond mode balance-rr");
+       SYS(out, "ip link add veth1 type veth peer name veth1p");
+       SYS(out, "ip link set veth1 master bond1");
+
+       veth1_ifindex = if_nametoindex("veth1");
+       if (!ASSERT_GT(veth1_ifindex, 0, "veth1_ifindex"))
+               goto out;
+
+       /* Attach native XDP to bond0 -> enables global redirect key */
+       if (xdp_attach(skeletons, skeletons->xdp_tx->progs.xdp_tx, "bond0"))
+               goto out;
+
+       /* Attach generic XDP (XDP_TX) to veth1.
+        * When packets arrive at veth1 via netif_receive_skb, do_xdp_generic()
+        * runs this program. XDP_TX + bond slave triggers 
xdp_master_redirect().
+        */
+       xdp_tx_fd = bpf_program__fd(skeletons->xdp_tx->progs.xdp_tx);
+       if (!ASSERT_GE(xdp_tx_fd, 0, "xdp_tx prog_fd"))
+               goto out;
+
+       err = bpf_xdp_attach(veth1_ifindex, xdp_tx_fd,
+                            XDP_FLAGS_SKB_MODE, NULL);
+       if (!ASSERT_OK(err, "attach generic XDP to veth1"))
+               goto out;
+
+       /* Run BPF_PROG_TEST_RUN with XDP_PASS live frames on veth1.
+        * XDP_PASS frames become SKBs with skb->dev = veth1, entering
+        * netif_receive_skb -> do_xdp_generic -> xdp_master_redirect.
+        * Without the fix, bond_rr_gen_slave_id() dereferences NULL
+        * rr_tx_counter and crashes.
+        */
+       xdp_pass_fd = 
bpf_program__fd(skeletons->xdp_dummy->progs.xdp_dummy_prog);
+       if (!ASSERT_GE(xdp_pass_fd, 0, "xdp_pass prog_fd"))
+               goto out;
+
+       memset(pkt, 0, sizeof(pkt));
+       ctx_in.data_end = sizeof(pkt);
+       ctx_in.ingress_ifindex = veth1_ifindex;
+
+       err = bpf_prog_test_run_opts(xdp_pass_fd, &opts);
+       ASSERT_OK(err, "xdp_pass test_run should not crash");
+
+out:
+       link_cleanup(skeletons);
+       close_netns(nstoken);
+       SYS_NOFAIL("ip netns del ns_rr_no_up");
+}
+
 static void test_xdp_bonding_features(struct skeletons *skeletons)
 {
        LIBBPF_OPTS(bpf_xdp_query_opts, query_opts);
@@ -680,6 +774,9 @@ void serial_test_xdp_bonding(void)
        if (test__start_subtest("xdp_bonding_redirect_multi"))
                test_xdp_bonding_redirect_multi(&skeletons);
 
+       if (test__start_subtest("xdp_bonding_redirect_no_up"))
+               test_xdp_bonding_redirect_no_up(&skeletons);
+
 out:
        xdp_dummy__destroy(skeletons.xdp_dummy);
        xdp_tx__destroy(skeletons.xdp_tx);
-- 
2.43.0


Reply via email to