Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp751055pxb; Mon, 25 Oct 2021 18:07:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx4zECv3ODlMxICz1EwfGwGlJiKonAp8t7EjxnGcjrpWGcdFgwK0QHt6alJY2rsvdCZLrit X-Received: by 2002:a17:90a:1784:: with SMTP id q4mr2514766pja.182.1635210462176; Mon, 25 Oct 2021 18:07:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1635210462; cv=none; d=google.com; s=arc-20160816; b=DEuiq3ruOCH7aUkxGdlOAk+gFUtVVwh95wwzecl/5+S/BOZKWhI3sXlZ888J30Taad xALk95S2fl0EGs9UgxbHzRZP55DyiVF7VnN/5yfov3uscfH5D9cAdz+IHHwqXcEXgTCH wYZIdi/pl8BtWwYHJPl98zSMdY4q526s2lhByt3uBCu0wkixZQnY3NvqG6zzmGZz0/a9 +SbnsWPO5jwm4QR1gdYL+DkzNYmAa5Gm7T1iR8zqrHTHO/whMiUqKiY7f+yo25pKKs8H IstUCt2S+BGAQ4ak70u2+yKERQ1QPoZ048SSsdd7BU9+vYUcmZLbH0o7kNIytcsThDSc /y8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=d/HFB0BNkPxp+zA2zhsc/eTXOujnRC12BUr0RiXoP9E=; b=cWg05yWWNyav/nGtzqQUI2aOBCGZFFVLciR+wslHNbKVTJ+N9UwwpTGeT04xPBGgdo ryLL5XHvy/hPaKjuDGwNpcYqDb50ar+0KO6zTp2sYRpV0rbbDPykqGG6S4wBruNXjTZ1 fXmyWAX6L+tQsOQF+hvtKnTBK7MJ5rW7GWQJ45S5tx7OZjPrUVf2FvKyrciR5HvQWwAY 0eH1Ws+Tz2Ri6G9L7nbF94dJWFZJAqrQsuy6qvzLr0R6R8Rw0mJc2sJQlp99Kpj1DbpD NxGx04mI8to46UJh89Y0yCH4KKn/CiIO02oZ6/uzr5Ac3ZIR9bnWLqMAayPGFKJ3J5Rt t87w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=gag1Su67; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z124si26098747pfb.163.2021.10.25.18.07.27; Mon, 25 Oct 2021 18:07:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=gag1Su67; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236871AbhJYUBA (ORCPT + 99 others); Mon, 25 Oct 2021 16:01:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:42070 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236340AbhJYTz7 (ORCPT ); Mon, 25 Oct 2021 15:55:59 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 908F561154; Mon, 25 Oct 2021 19:46:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1635191177; bh=BrMfSb4oguQKv0cWu704/q31xYjkrS5j1HXFfF6d6+M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gag1Su67fMk4XhchWVvbOjkaOrJ18LPottmo4Ke4wcMY6dBv2armwD+M4YOi1uWsU nOZ1RTT7IoIVlaphbM7lXbHEV3fUVNKB0vUusRdeDyQpa0hdHn/5v2CXium+krufu8 SYZT/ov70vgAMolTIRLYL3EinTUfYLm0m2E/s0Uc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+664b58e9a40fbb2cec71@syzkaller.appspotmail.com, syzbot+33f36d0754d4c5c0e102@syzkaller.appspotmail.com, Daniel Borkmann , Alexei Starovoitov Subject: [PATCH 5.14 164/169] bpf, test, cgroup: Use sk_{alloc,free} for test cases Date: Mon, 25 Oct 2021 21:15:45 +0200 Message-Id: <20211025191038.221197672@linuxfoundation.org> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211025191017.756020307@linuxfoundation.org> References: <20211025191017.756020307@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Daniel Borkmann commit 435b08ec0094ac1e128afe6cfd0d9311a8c617a7 upstream. BPF test infra has some hacks in place which kzalloc() a socket and perform minimum init via sock_net_set() and sock_init_data(). As a result, the sk's skcd->cgroup is NULL since it didn't go through proper initialization as it would have been the case from sk_alloc(). Rather than re-adding a NULL test in sock_cgroup_ptr() just for this, use sk_{alloc,free}() pair for the test socket. The latter also allows to get rid of the bpf_sk_storage_free() special case. Fixes: 8520e224f547 ("bpf, cgroups: Fix cgroup v2 fallback on v1/v2 mixed mode") Fixes: b7a1848e8398 ("bpf: add BPF_PROG_TEST_RUN support for flow dissector") Fixes: 2cb494a36c98 ("bpf: add tests for direct packet access from CGROUP_SKB") Reported-by: syzbot+664b58e9a40fbb2cec71@syzkaller.appspotmail.com Reported-by: syzbot+33f36d0754d4c5c0e102@syzkaller.appspotmail.com Signed-off-by: Daniel Borkmann Signed-off-by: Alexei Starovoitov Tested-by: syzbot+664b58e9a40fbb2cec71@syzkaller.appspotmail.com Tested-by: syzbot+33f36d0754d4c5c0e102@syzkaller.appspotmail.com Link: https://lore.kernel.org/bpf/20210927123921.21535-2-daniel@iogearbox.net Signed-off-by: Greg Kroah-Hartman --- net/bpf/test_run.c | 14 +++++++++----- 1 file changed, 9 insertions(+), 5 deletions(-) --- a/net/bpf/test_run.c +++ b/net/bpf/test_run.c @@ -552,6 +552,12 @@ static void convert_skb_to___skb(struct __skb->gso_segs = skb_shinfo(skb)->gso_segs; } +static struct proto bpf_dummy_proto = { + .name = "bpf_dummy", + .owner = THIS_MODULE, + .obj_size = sizeof(struct sock), +}; + int bpf_prog_test_run_skb(struct bpf_prog *prog, const union bpf_attr *kattr, union bpf_attr __user *uattr) { @@ -596,20 +602,19 @@ int bpf_prog_test_run_skb(struct bpf_pro break; } - sk = kzalloc(sizeof(struct sock), GFP_USER); + sk = sk_alloc(net, AF_UNSPEC, GFP_USER, &bpf_dummy_proto, 1); if (!sk) { kfree(data); kfree(ctx); return -ENOMEM; } - sock_net_set(sk, net); sock_init_data(NULL, sk); skb = build_skb(data, 0); if (!skb) { kfree(data); kfree(ctx); - kfree(sk); + sk_free(sk); return -ENOMEM; } skb->sk = sk; @@ -682,8 +687,7 @@ out: if (dev && dev != net->loopback_dev) dev_put(dev); kfree_skb(skb); - bpf_sk_storage_free(sk); - kfree(sk); + sk_free(sk); kfree(ctx); return ret; }