bpf: Use kvmalloc for map keys in syscalls
Bugzilla: http://bugzilla.redhat.com/2041365 commit 44779a4b85abd1d1dab9e5b90bd5e6adcfc8143a Author: Stanislav Fomichev <sdf@google.com> Date: Wed Aug 18 16:52:16 2021 -0700 bpf: Use kvmalloc for map keys in syscalls Same as previous patch but for the keys. memdup_bpfptr is renamed to kvmemdup_bpfptr (and converted to kvmalloc). Signed-off-by: Stanislav Fomichev <sdf@google.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Song Liu <songliubraving@fb.com> Link: https://lore.kernel.org/bpf/20210818235216.1159202-2-sdf@google.com Signed-off-by: Jerome Marchand <jmarchan@redhat.com>
This commit is contained in:
parent
353752951e
commit
4cbbc10481
|
@ -62,9 +62,17 @@ static inline int copy_to_bpfptr_offset(bpfptr_t dst, size_t offset,
|
|||
return copy_to_sockptr_offset((sockptr_t) dst, offset, src, size);
|
||||
}
|
||||
|
||||
static inline void *memdup_bpfptr(bpfptr_t src, size_t len)
|
||||
static inline void *kvmemdup_bpfptr(bpfptr_t src, size_t len)
|
||||
{
|
||||
return memdup_sockptr((sockptr_t) src, len);
|
||||
void *p = kvmalloc(len, GFP_USER | __GFP_NOWARN);
|
||||
|
||||
if (!p)
|
||||
return ERR_PTR(-ENOMEM);
|
||||
if (copy_from_bpfptr(p, src, len)) {
|
||||
kvfree(p);
|
||||
return ERR_PTR(-EFAULT);
|
||||
}
|
||||
return p;
|
||||
}
|
||||
|
||||
static inline long strncpy_from_bpfptr(char *dst, bpfptr_t src, size_t count)
|
||||
|
|
|
@ -1040,7 +1040,7 @@ int __weak bpf_stackmap_copy(struct bpf_map *map, void *key, void *value)
|
|||
static void *__bpf_copy_key(void __user *ukey, u64 key_size)
|
||||
{
|
||||
if (key_size)
|
||||
return memdup_user(ukey, key_size);
|
||||
return vmemdup_user(ukey, key_size);
|
||||
|
||||
if (ukey)
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
@ -1051,7 +1051,7 @@ static void *__bpf_copy_key(void __user *ukey, u64 key_size)
|
|||
static void *___bpf_copy_key(bpfptr_t ukey, u64 key_size)
|
||||
{
|
||||
if (key_size)
|
||||
return memdup_bpfptr(ukey, key_size);
|
||||
return kvmemdup_bpfptr(ukey, key_size);
|
||||
|
||||
if (!bpfptr_is_null(ukey))
|
||||
return ERR_PTR(-EINVAL);
|
||||
|
@ -1120,7 +1120,7 @@ static int map_lookup_elem(union bpf_attr *attr)
|
|||
free_value:
|
||||
kvfree(value);
|
||||
free_key:
|
||||
kfree(key);
|
||||
kvfree(key);
|
||||
err_put:
|
||||
fdput(f);
|
||||
return err;
|
||||
|
@ -1181,7 +1181,7 @@ static int map_update_elem(union bpf_attr *attr, bpfptr_t uattr)
|
|||
free_value:
|
||||
kvfree(value);
|
||||
free_key:
|
||||
kfree(key);
|
||||
kvfree(key);
|
||||
err_put:
|
||||
bpf_map_write_active_dec(map);
|
||||
fdput(f);
|
||||
|
@ -1235,7 +1235,7 @@ static int map_delete_elem(union bpf_attr *attr)
|
|||
bpf_enable_instrumentation();
|
||||
maybe_wait_bpf_programs(map);
|
||||
out:
|
||||
kfree(key);
|
||||
kvfree(key);
|
||||
err_put:
|
||||
bpf_map_write_active_dec(map);
|
||||
fdput(f);
|
||||
|
@ -1278,7 +1278,7 @@ static int map_get_next_key(union bpf_attr *attr)
|
|||
}
|
||||
|
||||
err = -ENOMEM;
|
||||
next_key = kmalloc(map->key_size, GFP_USER);
|
||||
next_key = kvmalloc(map->key_size, GFP_USER);
|
||||
if (!next_key)
|
||||
goto free_key;
|
||||
|
||||
|
@ -1301,9 +1301,9 @@ out:
|
|||
err = 0;
|
||||
|
||||
free_next_key:
|
||||
kfree(next_key);
|
||||
kvfree(next_key);
|
||||
free_key:
|
||||
kfree(key);
|
||||
kvfree(key);
|
||||
err_put:
|
||||
fdput(f);
|
||||
return err;
|
||||
|
@ -1330,7 +1330,7 @@ int generic_map_delete_batch(struct bpf_map *map,
|
|||
if (!max_count)
|
||||
return 0;
|
||||
|
||||
key = kmalloc(map->key_size, GFP_USER | __GFP_NOWARN);
|
||||
key = kvmalloc(map->key_size, GFP_USER | __GFP_NOWARN);
|
||||
if (!key)
|
||||
return -ENOMEM;
|
||||
|
||||
|
@ -1357,7 +1357,7 @@ int generic_map_delete_batch(struct bpf_map *map,
|
|||
if (copy_to_user(&uattr->batch.count, &cp, sizeof(cp)))
|
||||
err = -EFAULT;
|
||||
|
||||
kfree(key);
|
||||
kvfree(key);
|
||||
return err;
|
||||
}
|
||||
|
||||
|
@ -1388,13 +1388,13 @@ int generic_map_update_batch(struct bpf_map *map,
|
|||
if (!max_count)
|
||||
return 0;
|
||||
|
||||
key = kmalloc(map->key_size, GFP_USER | __GFP_NOWARN);
|
||||
key = kvmalloc(map->key_size, GFP_USER | __GFP_NOWARN);
|
||||
if (!key)
|
||||
return -ENOMEM;
|
||||
|
||||
value = kvmalloc(value_size, GFP_USER | __GFP_NOWARN);
|
||||
if (!value) {
|
||||
kfree(key);
|
||||
kvfree(key);
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
|
@ -1416,7 +1416,7 @@ int generic_map_update_batch(struct bpf_map *map,
|
|||
err = -EFAULT;
|
||||
|
||||
kvfree(value);
|
||||
kfree(key);
|
||||
kvfree(key);
|
||||
return err;
|
||||
}
|
||||
|
||||
|
@ -1450,13 +1450,13 @@ int generic_map_lookup_batch(struct bpf_map *map,
|
|||
if (put_user(0, &uattr->batch.count))
|
||||
return -EFAULT;
|
||||
|
||||
buf_prevkey = kmalloc(map->key_size, GFP_USER | __GFP_NOWARN);
|
||||
buf_prevkey = kvmalloc(map->key_size, GFP_USER | __GFP_NOWARN);
|
||||
if (!buf_prevkey)
|
||||
return -ENOMEM;
|
||||
|
||||
buf = kvmalloc(map->key_size + value_size, GFP_USER | __GFP_NOWARN);
|
||||
if (!buf) {
|
||||
kfree(buf_prevkey);
|
||||
kvfree(buf_prevkey);
|
||||
return -ENOMEM;
|
||||
}
|
||||
|
||||
|
@ -1516,7 +1516,7 @@ int generic_map_lookup_batch(struct bpf_map *map,
|
|||
err = -EFAULT;
|
||||
|
||||
free_buf:
|
||||
kfree(buf_prevkey);
|
||||
kvfree(buf_prevkey);
|
||||
kvfree(buf);
|
||||
return err;
|
||||
}
|
||||
|
@ -1607,7 +1607,7 @@ static int map_lookup_and_delete_elem(union bpf_attr *attr)
|
|||
free_value:
|
||||
kvfree(value);
|
||||
free_key:
|
||||
kfree(key);
|
||||
kvfree(key);
|
||||
err_put:
|
||||
bpf_map_write_active_dec(map);
|
||||
fdput(f);
|
||||
|
|
Loading…
Reference in New Issue