net: filter: simplify socket charging
attaching bpf program to a socket involves multiple socket memory arithmetic, since size of 'sk_filter' is changing when classic BPF is converted to eBPF. Also common path of program creation has to deal with two ways of freeing the memory. Simplify the code by delaying socket charging until program is ready and its size is known Signed-off-by: Alexei Starovoitov <ast@plumgrid.com> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
Родитель
4330487acf
Коммит
278571baca
|
@ -366,7 +366,7 @@ int sk_chk_filter(const struct sock_filter *filter, unsigned int flen);
|
||||||
int sk_get_filter(struct sock *sk, struct sock_filter __user *filter,
|
int sk_get_filter(struct sock *sk, struct sock_filter __user *filter,
|
||||||
unsigned int len);
|
unsigned int len);
|
||||||
|
|
||||||
void sk_filter_charge(struct sock *sk, struct sk_filter *fp);
|
bool sk_filter_charge(struct sock *sk, struct sk_filter *fp);
|
||||||
void sk_filter_uncharge(struct sock *sk, struct sk_filter *fp);
|
void sk_filter_uncharge(struct sock *sk, struct sk_filter *fp);
|
||||||
|
|
||||||
u64 __bpf_call_base(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5);
|
u64 __bpf_call_base(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5);
|
||||||
|
|
|
@ -872,41 +872,30 @@ static void sk_filter_release(struct sk_filter *fp)
|
||||||
|
|
||||||
void sk_filter_uncharge(struct sock *sk, struct sk_filter *fp)
|
void sk_filter_uncharge(struct sock *sk, struct sk_filter *fp)
|
||||||
{
|
{
|
||||||
atomic_sub(sk_filter_size(fp->len), &sk->sk_omem_alloc);
|
u32 filter_size = sk_filter_size(fp->len);
|
||||||
|
|
||||||
|
atomic_sub(filter_size, &sk->sk_omem_alloc);
|
||||||
sk_filter_release(fp);
|
sk_filter_release(fp);
|
||||||
}
|
}
|
||||||
|
|
||||||
void sk_filter_charge(struct sock *sk, struct sk_filter *fp)
|
/* try to charge the socket memory if there is space available
|
||||||
|
* return true on success
|
||||||
|
*/
|
||||||
|
bool sk_filter_charge(struct sock *sk, struct sk_filter *fp)
|
||||||
{
|
{
|
||||||
atomic_inc(&fp->refcnt);
|
u32 filter_size = sk_filter_size(fp->len);
|
||||||
atomic_add(sk_filter_size(fp->len), &sk->sk_omem_alloc);
|
|
||||||
}
|
|
||||||
|
|
||||||
static struct sk_filter *__sk_migrate_realloc(struct sk_filter *fp,
|
/* same check as in sock_kmalloc() */
|
||||||
struct sock *sk,
|
if (filter_size <= sysctl_optmem_max &&
|
||||||
unsigned int len)
|
atomic_read(&sk->sk_omem_alloc) + filter_size < sysctl_optmem_max) {
|
||||||
{
|
atomic_inc(&fp->refcnt);
|
||||||
struct sk_filter *fp_new;
|
atomic_add(filter_size, &sk->sk_omem_alloc);
|
||||||
|
return true;
|
||||||
if (sk == NULL)
|
|
||||||
return krealloc(fp, len, GFP_KERNEL);
|
|
||||||
|
|
||||||
fp_new = sock_kmalloc(sk, len, GFP_KERNEL);
|
|
||||||
if (fp_new) {
|
|
||||||
*fp_new = *fp;
|
|
||||||
/* As we're keeping orig_prog in fp_new along,
|
|
||||||
* we need to make sure we're not evicting it
|
|
||||||
* from the old fp.
|
|
||||||
*/
|
|
||||||
fp->orig_prog = NULL;
|
|
||||||
sk_filter_uncharge(sk, fp);
|
|
||||||
}
|
}
|
||||||
|
return false;
|
||||||
return fp_new;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static struct sk_filter *__sk_migrate_filter(struct sk_filter *fp,
|
static struct sk_filter *__sk_migrate_filter(struct sk_filter *fp)
|
||||||
struct sock *sk)
|
|
||||||
{
|
{
|
||||||
struct sock_filter *old_prog;
|
struct sock_filter *old_prog;
|
||||||
struct sk_filter *old_fp;
|
struct sk_filter *old_fp;
|
||||||
|
@ -938,7 +927,7 @@ static struct sk_filter *__sk_migrate_filter(struct sk_filter *fp,
|
||||||
|
|
||||||
/* Expand fp for appending the new filter representation. */
|
/* Expand fp for appending the new filter representation. */
|
||||||
old_fp = fp;
|
old_fp = fp;
|
||||||
fp = __sk_migrate_realloc(old_fp, sk, sk_filter_size(new_len));
|
fp = krealloc(old_fp, sk_filter_size(new_len), GFP_KERNEL);
|
||||||
if (!fp) {
|
if (!fp) {
|
||||||
/* The old_fp is still around in case we couldn't
|
/* The old_fp is still around in case we couldn't
|
||||||
* allocate new memory, so uncharge on that one.
|
* allocate new memory, so uncharge on that one.
|
||||||
|
@ -956,7 +945,7 @@ static struct sk_filter *__sk_migrate_filter(struct sk_filter *fp,
|
||||||
/* 2nd sk_convert_filter() can fail only if it fails
|
/* 2nd sk_convert_filter() can fail only if it fails
|
||||||
* to allocate memory, remapping must succeed. Note,
|
* to allocate memory, remapping must succeed. Note,
|
||||||
* that at this time old_fp has already been released
|
* that at this time old_fp has already been released
|
||||||
* by __sk_migrate_realloc().
|
* by krealloc().
|
||||||
*/
|
*/
|
||||||
goto out_err_free;
|
goto out_err_free;
|
||||||
|
|
||||||
|
@ -968,16 +957,11 @@ static struct sk_filter *__sk_migrate_filter(struct sk_filter *fp,
|
||||||
out_err_free:
|
out_err_free:
|
||||||
kfree(old_prog);
|
kfree(old_prog);
|
||||||
out_err:
|
out_err:
|
||||||
/* Rollback filter setup. */
|
__sk_filter_release(fp);
|
||||||
if (sk != NULL)
|
|
||||||
sk_filter_uncharge(sk, fp);
|
|
||||||
else
|
|
||||||
kfree(fp);
|
|
||||||
return ERR_PTR(err);
|
return ERR_PTR(err);
|
||||||
}
|
}
|
||||||
|
|
||||||
static struct sk_filter *__sk_prepare_filter(struct sk_filter *fp,
|
static struct sk_filter *__sk_prepare_filter(struct sk_filter *fp)
|
||||||
struct sock *sk)
|
|
||||||
{
|
{
|
||||||
int err;
|
int err;
|
||||||
|
|
||||||
|
@ -986,10 +970,7 @@ static struct sk_filter *__sk_prepare_filter(struct sk_filter *fp,
|
||||||
|
|
||||||
err = sk_chk_filter(fp->insns, fp->len);
|
err = sk_chk_filter(fp->insns, fp->len);
|
||||||
if (err) {
|
if (err) {
|
||||||
if (sk != NULL)
|
__sk_filter_release(fp);
|
||||||
sk_filter_uncharge(sk, fp);
|
|
||||||
else
|
|
||||||
kfree(fp);
|
|
||||||
return ERR_PTR(err);
|
return ERR_PTR(err);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1002,7 +983,7 @@ static struct sk_filter *__sk_prepare_filter(struct sk_filter *fp,
|
||||||
* internal BPF translation for the optimized interpreter.
|
* internal BPF translation for the optimized interpreter.
|
||||||
*/
|
*/
|
||||||
if (!fp->jited)
|
if (!fp->jited)
|
||||||
fp = __sk_migrate_filter(fp, sk);
|
fp = __sk_migrate_filter(fp);
|
||||||
|
|
||||||
return fp;
|
return fp;
|
||||||
}
|
}
|
||||||
|
@ -1041,10 +1022,10 @@ int sk_unattached_filter_create(struct sk_filter **pfp,
|
||||||
*/
|
*/
|
||||||
fp->orig_prog = NULL;
|
fp->orig_prog = NULL;
|
||||||
|
|
||||||
/* __sk_prepare_filter() already takes care of uncharging
|
/* __sk_prepare_filter() already takes care of freeing
|
||||||
* memory in case something goes wrong.
|
* memory in case something goes wrong.
|
||||||
*/
|
*/
|
||||||
fp = __sk_prepare_filter(fp, NULL);
|
fp = __sk_prepare_filter(fp);
|
||||||
if (IS_ERR(fp))
|
if (IS_ERR(fp))
|
||||||
return PTR_ERR(fp);
|
return PTR_ERR(fp);
|
||||||
|
|
||||||
|
@ -1083,31 +1064,37 @@ int sk_attach_filter(struct sock_fprog *fprog, struct sock *sk)
|
||||||
if (fprog->filter == NULL)
|
if (fprog->filter == NULL)
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
fp = sock_kmalloc(sk, sk_fsize, GFP_KERNEL);
|
fp = kmalloc(sk_fsize, GFP_KERNEL);
|
||||||
if (!fp)
|
if (!fp)
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
|
|
||||||
if (copy_from_user(fp->insns, fprog->filter, fsize)) {
|
if (copy_from_user(fp->insns, fprog->filter, fsize)) {
|
||||||
sock_kfree_s(sk, fp, sk_fsize);
|
kfree(fp);
|
||||||
return -EFAULT;
|
return -EFAULT;
|
||||||
}
|
}
|
||||||
|
|
||||||
atomic_set(&fp->refcnt, 1);
|
|
||||||
fp->len = fprog->len;
|
fp->len = fprog->len;
|
||||||
|
|
||||||
err = sk_store_orig_filter(fp, fprog);
|
err = sk_store_orig_filter(fp, fprog);
|
||||||
if (err) {
|
if (err) {
|
||||||
sk_filter_uncharge(sk, fp);
|
kfree(fp);
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* __sk_prepare_filter() already takes care of uncharging
|
/* __sk_prepare_filter() already takes care of freeing
|
||||||
* memory in case something goes wrong.
|
* memory in case something goes wrong.
|
||||||
*/
|
*/
|
||||||
fp = __sk_prepare_filter(fp, sk);
|
fp = __sk_prepare_filter(fp);
|
||||||
if (IS_ERR(fp))
|
if (IS_ERR(fp))
|
||||||
return PTR_ERR(fp);
|
return PTR_ERR(fp);
|
||||||
|
|
||||||
|
atomic_set(&fp->refcnt, 0);
|
||||||
|
|
||||||
|
if (!sk_filter_charge(sk, fp)) {
|
||||||
|
__sk_filter_release(fp);
|
||||||
|
return -ENOMEM;
|
||||||
|
}
|
||||||
|
|
||||||
old_fp = rcu_dereference_protected(sk->sk_filter,
|
old_fp = rcu_dereference_protected(sk->sk_filter,
|
||||||
sock_owned_by_user(sk));
|
sock_owned_by_user(sk));
|
||||||
rcu_assign_pointer(sk->sk_filter, fp);
|
rcu_assign_pointer(sk->sk_filter, fp);
|
||||||
|
|
|
@ -1474,6 +1474,7 @@ static void sk_update_clone(const struct sock *sk, struct sock *newsk)
|
||||||
struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority)
|
struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority)
|
||||||
{
|
{
|
||||||
struct sock *newsk;
|
struct sock *newsk;
|
||||||
|
bool is_charged = true;
|
||||||
|
|
||||||
newsk = sk_prot_alloc(sk->sk_prot, priority, sk->sk_family);
|
newsk = sk_prot_alloc(sk->sk_prot, priority, sk->sk_family);
|
||||||
if (newsk != NULL) {
|
if (newsk != NULL) {
|
||||||
|
@ -1518,9 +1519,13 @@ struct sock *sk_clone_lock(const struct sock *sk, const gfp_t priority)
|
||||||
|
|
||||||
filter = rcu_dereference_protected(newsk->sk_filter, 1);
|
filter = rcu_dereference_protected(newsk->sk_filter, 1);
|
||||||
if (filter != NULL)
|
if (filter != NULL)
|
||||||
sk_filter_charge(newsk, filter);
|
/* though it's an empty new sock, the charging may fail
|
||||||
|
* if sysctl_optmem_max was changed between creation of
|
||||||
|
* original socket and cloning
|
||||||
|
*/
|
||||||
|
is_charged = sk_filter_charge(newsk, filter);
|
||||||
|
|
||||||
if (unlikely(xfrm_sk_clone_policy(newsk))) {
|
if (unlikely(!is_charged || xfrm_sk_clone_policy(newsk))) {
|
||||||
/* It is still raw copy of parent, so invalidate
|
/* It is still raw copy of parent, so invalidate
|
||||||
* destructor and make plain sk_free() */
|
* destructor and make plain sk_free() */
|
||||||
newsk->sk_destruct = NULL;
|
newsk->sk_destruct = NULL;
|
||||||
|
|
Загрузка…
Ссылка в новой задаче