forked from mirrors/linux
		
	bpf: introduce cgroup storage maps
This commit introduces BPF_MAP_TYPE_CGROUP_STORAGE maps: a special type of maps which are implementing the cgroup storage. >From the userspace point of view it's almost a generic hash map with the (cgroup inode id, attachment type) pair used as a key. The only difference is that some operations are restricted: 1) a user can't create new entries, 2) a user can't remove existing entries. The lookup from userspace is o(log(n)). Signed-off-by: Roman Gushchin <guro@fb.com> Cc: Alexei Starovoitov <ast@kernel.org> Cc: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Martin KaFai Lau <kafai@fb.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
This commit is contained in:
		
							parent
							
								
									0a4c58f570
								
							
						
					
					
						commit
						de9cbbaadb
					
				
					 8 changed files with 440 additions and 0 deletions
				
			
		|  | @ -4,19 +4,39 @@ | |||
| 
 | ||||
| #include <linux/errno.h> | ||||
| #include <linux/jump_label.h> | ||||
| #include <linux/rbtree.h> | ||||
| #include <uapi/linux/bpf.h> | ||||
| 
 | ||||
| struct sock; | ||||
| struct sockaddr; | ||||
| struct cgroup; | ||||
| struct sk_buff; | ||||
| struct bpf_map; | ||||
| struct bpf_prog; | ||||
| struct bpf_sock_ops_kern; | ||||
| struct bpf_cgroup_storage; | ||||
| 
 | ||||
| #ifdef CONFIG_CGROUP_BPF | ||||
| 
 | ||||
| extern struct static_key_false cgroup_bpf_enabled_key; | ||||
| #define cgroup_bpf_enabled static_branch_unlikely(&cgroup_bpf_enabled_key) | ||||
| 
 | ||||
| struct bpf_cgroup_storage_map; | ||||
| 
 | ||||
| struct bpf_storage_buffer { | ||||
| 	struct rcu_head rcu; | ||||
| 	char data[0]; | ||||
| }; | ||||
| 
 | ||||
| struct bpf_cgroup_storage { | ||||
| 	struct bpf_storage_buffer *buf; | ||||
| 	struct bpf_cgroup_storage_map *map; | ||||
| 	struct bpf_cgroup_storage_key key; | ||||
| 	struct list_head list; | ||||
| 	struct rb_node node; | ||||
| 	struct rcu_head rcu; | ||||
| }; | ||||
| 
 | ||||
| struct bpf_prog_list { | ||||
| 	struct list_head node; | ||||
| 	struct bpf_prog *prog; | ||||
|  | @ -77,6 +97,15 @@ int __cgroup_bpf_run_filter_sock_ops(struct sock *sk, | |||
| int __cgroup_bpf_check_dev_permission(short dev_type, u32 major, u32 minor, | ||||
| 				      short access, enum bpf_attach_type type); | ||||
| 
 | ||||
| struct bpf_cgroup_storage *bpf_cgroup_storage_alloc(struct bpf_prog *prog); | ||||
| void bpf_cgroup_storage_free(struct bpf_cgroup_storage *storage); | ||||
| void bpf_cgroup_storage_link(struct bpf_cgroup_storage *storage, | ||||
| 			     struct cgroup *cgroup, | ||||
| 			     enum bpf_attach_type type); | ||||
| void bpf_cgroup_storage_unlink(struct bpf_cgroup_storage *storage); | ||||
| int bpf_cgroup_storage_assign(struct bpf_prog *prog, struct bpf_map *map); | ||||
| void bpf_cgroup_storage_release(struct bpf_prog *prog, struct bpf_map *map); | ||||
| 
 | ||||
| /* Wrappers for __cgroup_bpf_run_filter_skb() guarded by cgroup_bpf_enabled. */ | ||||
| #define BPF_CGROUP_RUN_PROG_INET_INGRESS(sk, skb)			      \ | ||||
| ({									      \ | ||||
|  | @ -221,6 +250,15 @@ static inline int cgroup_bpf_prog_query(const union bpf_attr *attr, | |||
| 	return -EINVAL; | ||||
| } | ||||
| 
 | ||||
| static inline int bpf_cgroup_storage_assign(struct bpf_prog *prog, | ||||
| 					    struct bpf_map *map) { return 0; } | ||||
| static inline void bpf_cgroup_storage_release(struct bpf_prog *prog, | ||||
| 					      struct bpf_map *map) {} | ||||
| static inline struct bpf_cgroup_storage *bpf_cgroup_storage_alloc( | ||||
| 	struct bpf_prog *prog) { return 0; } | ||||
| static inline void bpf_cgroup_storage_free( | ||||
| 	struct bpf_cgroup_storage *storage) {} | ||||
| 
 | ||||
| #define cgroup_bpf_enabled (0) | ||||
| #define BPF_CGROUP_PRE_CONNECT_ENABLED(sk) (0) | ||||
| #define BPF_CGROUP_RUN_PROG_INET_INGRESS(sk,skb) ({ 0; }) | ||||
|  |  | |||
|  | @ -282,6 +282,7 @@ struct bpf_prog_aux { | |||
| 	struct bpf_prog *prog; | ||||
| 	struct user_struct *user; | ||||
| 	u64 load_time; /* ns since boottime */ | ||||
| 	struct bpf_map *cgroup_storage; | ||||
| 	char name[BPF_OBJ_NAME_LEN]; | ||||
| #ifdef CONFIG_SECURITY | ||||
| 	void *security; | ||||
|  |  | |||
|  | @ -37,6 +37,9 @@ BPF_MAP_TYPE(BPF_MAP_TYPE_PERF_EVENT_ARRAY, perf_event_array_map_ops) | |||
| #ifdef CONFIG_CGROUPS | ||||
| BPF_MAP_TYPE(BPF_MAP_TYPE_CGROUP_ARRAY, cgroup_array_map_ops) | ||||
| #endif | ||||
| #ifdef CONFIG_CGROUP_BPF | ||||
| BPF_MAP_TYPE(BPF_MAP_TYPE_CGROUP_STORAGE, cgroup_storage_map_ops) | ||||
| #endif | ||||
| BPF_MAP_TYPE(BPF_MAP_TYPE_HASH, htab_map_ops) | ||||
| BPF_MAP_TYPE(BPF_MAP_TYPE_PERCPU_HASH, htab_percpu_map_ops) | ||||
| BPF_MAP_TYPE(BPF_MAP_TYPE_LRU_HASH, htab_lru_map_ops) | ||||
|  |  | |||
|  | @ -75,6 +75,11 @@ struct bpf_lpm_trie_key { | |||
| 	__u8	data[0];	/* Arbitrary size */ | ||||
| }; | ||||
| 
 | ||||
| struct bpf_cgroup_storage_key { | ||||
| 	__u64	cgroup_inode_id;	/* cgroup inode id */ | ||||
| 	__u32	attach_type;		/* program attach type */ | ||||
| }; | ||||
| 
 | ||||
| /* BPF syscall commands, see bpf(2) man-page for details. */ | ||||
| enum bpf_cmd { | ||||
| 	BPF_MAP_CREATE, | ||||
|  | @ -120,6 +125,7 @@ enum bpf_map_type { | |||
| 	BPF_MAP_TYPE_CPUMAP, | ||||
| 	BPF_MAP_TYPE_XSKMAP, | ||||
| 	BPF_MAP_TYPE_SOCKHASH, | ||||
| 	BPF_MAP_TYPE_CGROUP_STORAGE, | ||||
| }; | ||||
| 
 | ||||
| enum bpf_prog_type { | ||||
|  |  | |||
|  | @ -3,6 +3,7 @@ obj-y := core.o | |||
| 
 | ||||
| obj-$(CONFIG_BPF_SYSCALL) += syscall.o verifier.o inode.o helpers.o tnum.o | ||||
| obj-$(CONFIG_BPF_SYSCALL) += hashtab.o arraymap.o percpu_freelist.o bpf_lru_list.o lpm_trie.o map_in_map.o | ||||
| obj-$(CONFIG_BPF_SYSCALL) += local_storage.o | ||||
| obj-$(CONFIG_BPF_SYSCALL) += disasm.o | ||||
| obj-$(CONFIG_BPF_SYSCALL) += btf.o | ||||
| ifeq ($(CONFIG_NET),y) | ||||
|  |  | |||
							
								
								
									
										376
									
								
								kernel/bpf/local_storage.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										376
									
								
								kernel/bpf/local_storage.c
									
									
									
									
									
										Normal file
									
								
							|  | @ -0,0 +1,376 @@ | |||
| //SPDX-License-Identifier: GPL-2.0
 | ||||
| #include <linux/bpf-cgroup.h> | ||||
| #include <linux/bpf.h> | ||||
| #include <linux/bug.h> | ||||
| #include <linux/filter.h> | ||||
| #include <linux/mm.h> | ||||
| #include <linux/rbtree.h> | ||||
| #include <linux/slab.h> | ||||
| 
 | ||||
| #ifdef CONFIG_CGROUP_BPF | ||||
| 
 | ||||
| #define LOCAL_STORAGE_CREATE_FLAG_MASK					\ | ||||
| 	(BPF_F_NUMA_NODE | BPF_F_RDONLY | BPF_F_WRONLY) | ||||
| 
 | ||||
| struct bpf_cgroup_storage_map { | ||||
| 	struct bpf_map map; | ||||
| 
 | ||||
| 	spinlock_t lock; | ||||
| 	struct bpf_prog *prog; | ||||
| 	struct rb_root root; | ||||
| 	struct list_head list; | ||||
| }; | ||||
| 
 | ||||
| static struct bpf_cgroup_storage_map *map_to_storage(struct bpf_map *map) | ||||
| { | ||||
| 	return container_of(map, struct bpf_cgroup_storage_map, map); | ||||
| } | ||||
| 
 | ||||
| static int bpf_cgroup_storage_key_cmp( | ||||
| 	const struct bpf_cgroup_storage_key *key1, | ||||
| 	const struct bpf_cgroup_storage_key *key2) | ||||
| { | ||||
| 	if (key1->cgroup_inode_id < key2->cgroup_inode_id) | ||||
| 		return -1; | ||||
| 	else if (key1->cgroup_inode_id > key2->cgroup_inode_id) | ||||
| 		return 1; | ||||
| 	else if (key1->attach_type < key2->attach_type) | ||||
| 		return -1; | ||||
| 	else if (key1->attach_type > key2->attach_type) | ||||
| 		return 1; | ||||
| 	return 0; | ||||
| } | ||||
| 
 | ||||
| static struct bpf_cgroup_storage *cgroup_storage_lookup( | ||||
| 	struct bpf_cgroup_storage_map *map, struct bpf_cgroup_storage_key *key, | ||||
| 	bool locked) | ||||
| { | ||||
| 	struct rb_root *root = &map->root; | ||||
| 	struct rb_node *node; | ||||
| 
 | ||||
| 	if (!locked) | ||||
| 		spin_lock_bh(&map->lock); | ||||
| 
 | ||||
| 	node = root->rb_node; | ||||
| 	while (node) { | ||||
| 		struct bpf_cgroup_storage *storage; | ||||
| 
 | ||||
| 		storage = container_of(node, struct bpf_cgroup_storage, node); | ||||
| 
 | ||||
| 		switch (bpf_cgroup_storage_key_cmp(key, &storage->key)) { | ||||
| 		case -1: | ||||
| 			node = node->rb_left; | ||||
| 			break; | ||||
| 		case 1: | ||||
| 			node = node->rb_right; | ||||
| 			break; | ||||
| 		default: | ||||
| 			if (!locked) | ||||
| 				spin_unlock_bh(&map->lock); | ||||
| 			return storage; | ||||
| 		} | ||||
| 	} | ||||
| 
 | ||||
| 	if (!locked) | ||||
| 		spin_unlock_bh(&map->lock); | ||||
| 
 | ||||
| 	return NULL; | ||||
| } | ||||
| 
 | ||||
| static int cgroup_storage_insert(struct bpf_cgroup_storage_map *map, | ||||
| 				 struct bpf_cgroup_storage *storage) | ||||
| { | ||||
| 	struct rb_root *root = &map->root; | ||||
| 	struct rb_node **new = &(root->rb_node), *parent = NULL; | ||||
| 
 | ||||
| 	while (*new) { | ||||
| 		struct bpf_cgroup_storage *this; | ||||
| 
 | ||||
| 		this = container_of(*new, struct bpf_cgroup_storage, node); | ||||
| 
 | ||||
| 		parent = *new; | ||||
| 		switch (bpf_cgroup_storage_key_cmp(&storage->key, &this->key)) { | ||||
| 		case -1: | ||||
| 			new = &((*new)->rb_left); | ||||
| 			break; | ||||
| 		case 1: | ||||
| 			new = &((*new)->rb_right); | ||||
| 			break; | ||||
| 		default: | ||||
| 			return -EEXIST; | ||||
| 		} | ||||
| 	} | ||||
| 
 | ||||
| 	rb_link_node(&storage->node, parent, new); | ||||
| 	rb_insert_color(&storage->node, root); | ||||
| 
 | ||||
| 	return 0; | ||||
| } | ||||
| 
 | ||||
| static void *cgroup_storage_lookup_elem(struct bpf_map *_map, void *_key) | ||||
| { | ||||
| 	struct bpf_cgroup_storage_map *map = map_to_storage(_map); | ||||
| 	struct bpf_cgroup_storage_key *key = _key; | ||||
| 	struct bpf_cgroup_storage *storage; | ||||
| 
 | ||||
| 	storage = cgroup_storage_lookup(map, key, false); | ||||
| 	if (!storage) | ||||
| 		return NULL; | ||||
| 
 | ||||
| 	return &READ_ONCE(storage->buf)->data[0]; | ||||
| } | ||||
| 
 | ||||
| static int cgroup_storage_update_elem(struct bpf_map *map, void *_key, | ||||
| 				      void *value, u64 flags) | ||||
| { | ||||
| 	struct bpf_cgroup_storage_key *key = _key; | ||||
| 	struct bpf_cgroup_storage *storage; | ||||
| 	struct bpf_storage_buffer *new; | ||||
| 
 | ||||
| 	if (flags & BPF_NOEXIST) | ||||
| 		return -EINVAL; | ||||
| 
 | ||||
| 	storage = cgroup_storage_lookup((struct bpf_cgroup_storage_map *)map, | ||||
| 					key, false); | ||||
| 	if (!storage) | ||||
| 		return -ENOENT; | ||||
| 
 | ||||
| 	new = kmalloc_node(sizeof(struct bpf_storage_buffer) + | ||||
| 			   map->value_size, __GFP_ZERO | GFP_USER, | ||||
| 			   map->numa_node); | ||||
| 	if (!new) | ||||
| 		return -ENOMEM; | ||||
| 
 | ||||
| 	memcpy(&new->data[0], value, map->value_size); | ||||
| 
 | ||||
| 	new = xchg(&storage->buf, new); | ||||
| 	kfree_rcu(new, rcu); | ||||
| 
 | ||||
| 	return 0; | ||||
| } | ||||
| 
 | ||||
| static int cgroup_storage_get_next_key(struct bpf_map *_map, void *_key, | ||||
| 				       void *_next_key) | ||||
| { | ||||
| 	struct bpf_cgroup_storage_map *map = map_to_storage(_map); | ||||
| 	struct bpf_cgroup_storage_key *key = _key; | ||||
| 	struct bpf_cgroup_storage_key *next = _next_key; | ||||
| 	struct bpf_cgroup_storage *storage; | ||||
| 
 | ||||
| 	spin_lock_bh(&map->lock); | ||||
| 
 | ||||
| 	if (list_empty(&map->list)) | ||||
| 		goto enoent; | ||||
| 
 | ||||
| 	if (key) { | ||||
| 		storage = cgroup_storage_lookup(map, key, true); | ||||
| 		if (!storage) | ||||
| 			goto enoent; | ||||
| 
 | ||||
| 		storage = list_next_entry(storage, list); | ||||
| 		if (!storage) | ||||
| 			goto enoent; | ||||
| 	} else { | ||||
| 		storage = list_first_entry(&map->list, | ||||
| 					 struct bpf_cgroup_storage, list); | ||||
| 	} | ||||
| 
 | ||||
| 	spin_unlock_bh(&map->lock); | ||||
| 	next->attach_type = storage->key.attach_type; | ||||
| 	next->cgroup_inode_id = storage->key.cgroup_inode_id; | ||||
| 	return 0; | ||||
| 
 | ||||
| enoent: | ||||
| 	spin_unlock_bh(&map->lock); | ||||
| 	return -ENOENT; | ||||
| } | ||||
| 
 | ||||
| static struct bpf_map *cgroup_storage_map_alloc(union bpf_attr *attr) | ||||
| { | ||||
| 	int numa_node = bpf_map_attr_numa_node(attr); | ||||
| 	struct bpf_cgroup_storage_map *map; | ||||
| 
 | ||||
| 	if (attr->key_size != sizeof(struct bpf_cgroup_storage_key)) | ||||
| 		return ERR_PTR(-EINVAL); | ||||
| 
 | ||||
| 	if (attr->value_size > PAGE_SIZE) | ||||
| 		return ERR_PTR(-E2BIG); | ||||
| 
 | ||||
| 	if (attr->map_flags & ~LOCAL_STORAGE_CREATE_FLAG_MASK) | ||||
| 		/* reserved bits should not be used */ | ||||
| 		return ERR_PTR(-EINVAL); | ||||
| 
 | ||||
| 	if (attr->max_entries) | ||||
| 		/* max_entries is not used and enforced to be 0 */ | ||||
| 		return ERR_PTR(-EINVAL); | ||||
| 
 | ||||
| 	map = kmalloc_node(sizeof(struct bpf_cgroup_storage_map), | ||||
| 			   __GFP_ZERO | GFP_USER, numa_node); | ||||
| 	if (!map) | ||||
| 		return ERR_PTR(-ENOMEM); | ||||
| 
 | ||||
| 	map->map.pages = round_up(sizeof(struct bpf_cgroup_storage_map), | ||||
| 				  PAGE_SIZE) >> PAGE_SHIFT; | ||||
| 
 | ||||
| 	/* copy mandatory map attributes */ | ||||
| 	bpf_map_init_from_attr(&map->map, attr); | ||||
| 
 | ||||
| 	spin_lock_init(&map->lock); | ||||
| 	map->root = RB_ROOT; | ||||
| 	INIT_LIST_HEAD(&map->list); | ||||
| 
 | ||||
| 	return &map->map; | ||||
| } | ||||
| 
 | ||||
| static void cgroup_storage_map_free(struct bpf_map *_map) | ||||
| { | ||||
| 	struct bpf_cgroup_storage_map *map = map_to_storage(_map); | ||||
| 
 | ||||
| 	WARN_ON(!RB_EMPTY_ROOT(&map->root)); | ||||
| 	WARN_ON(!list_empty(&map->list)); | ||||
| 
 | ||||
| 	kfree(map); | ||||
| } | ||||
| 
 | ||||
| static int cgroup_storage_delete_elem(struct bpf_map *map, void *key) | ||||
| { | ||||
| 	return -EINVAL; | ||||
| } | ||||
| 
 | ||||
| const struct bpf_map_ops cgroup_storage_map_ops = { | ||||
| 	.map_alloc = cgroup_storage_map_alloc, | ||||
| 	.map_free = cgroup_storage_map_free, | ||||
| 	.map_get_next_key = cgroup_storage_get_next_key, | ||||
| 	.map_lookup_elem = cgroup_storage_lookup_elem, | ||||
| 	.map_update_elem = cgroup_storage_update_elem, | ||||
| 	.map_delete_elem = cgroup_storage_delete_elem, | ||||
| }; | ||||
| 
 | ||||
| int bpf_cgroup_storage_assign(struct bpf_prog *prog, struct bpf_map *_map) | ||||
| { | ||||
| 	struct bpf_cgroup_storage_map *map = map_to_storage(_map); | ||||
| 	int ret = -EBUSY; | ||||
| 
 | ||||
| 	spin_lock_bh(&map->lock); | ||||
| 
 | ||||
| 	if (map->prog && map->prog != prog) | ||||
| 		goto unlock; | ||||
| 	if (prog->aux->cgroup_storage && prog->aux->cgroup_storage != _map) | ||||
| 		goto unlock; | ||||
| 
 | ||||
| 	map->prog = prog; | ||||
| 	prog->aux->cgroup_storage = _map; | ||||
| 	ret = 0; | ||||
| unlock: | ||||
| 	spin_unlock_bh(&map->lock); | ||||
| 
 | ||||
| 	return ret; | ||||
| } | ||||
| 
 | ||||
| void bpf_cgroup_storage_release(struct bpf_prog *prog, struct bpf_map *_map) | ||||
| { | ||||
| 	struct bpf_cgroup_storage_map *map = map_to_storage(_map); | ||||
| 
 | ||||
| 	spin_lock_bh(&map->lock); | ||||
| 	if (map->prog == prog) { | ||||
| 		WARN_ON(prog->aux->cgroup_storage != _map); | ||||
| 		map->prog = NULL; | ||||
| 		prog->aux->cgroup_storage = NULL; | ||||
| 	} | ||||
| 	spin_unlock_bh(&map->lock); | ||||
| } | ||||
| 
 | ||||
| struct bpf_cgroup_storage *bpf_cgroup_storage_alloc(struct bpf_prog *prog) | ||||
| { | ||||
| 	struct bpf_cgroup_storage *storage; | ||||
| 	struct bpf_map *map; | ||||
| 	u32 pages; | ||||
| 
 | ||||
| 	map = prog->aux->cgroup_storage; | ||||
| 	if (!map) | ||||
| 		return NULL; | ||||
| 
 | ||||
| 	pages = round_up(sizeof(struct bpf_cgroup_storage) + | ||||
| 			 sizeof(struct bpf_storage_buffer) + | ||||
| 			 map->value_size, PAGE_SIZE) >> PAGE_SHIFT; | ||||
| 	if (bpf_map_charge_memlock(map, pages)) | ||||
| 		return ERR_PTR(-EPERM); | ||||
| 
 | ||||
| 	storage = kmalloc_node(sizeof(struct bpf_cgroup_storage), | ||||
| 			       __GFP_ZERO | GFP_USER, map->numa_node); | ||||
| 	if (!storage) { | ||||
| 		bpf_map_uncharge_memlock(map, pages); | ||||
| 		return ERR_PTR(-ENOMEM); | ||||
| 	} | ||||
| 
 | ||||
| 	storage->buf = kmalloc_node(sizeof(struct bpf_storage_buffer) + | ||||
| 				    map->value_size, __GFP_ZERO | GFP_USER, | ||||
| 				    map->numa_node); | ||||
| 	if (!storage->buf) { | ||||
| 		bpf_map_uncharge_memlock(map, pages); | ||||
| 		kfree(storage); | ||||
| 		return ERR_PTR(-ENOMEM); | ||||
| 	} | ||||
| 
 | ||||
| 	storage->map = (struct bpf_cgroup_storage_map *)map; | ||||
| 
 | ||||
| 	return storage; | ||||
| } | ||||
| 
 | ||||
| void bpf_cgroup_storage_free(struct bpf_cgroup_storage *storage) | ||||
| { | ||||
| 	u32 pages; | ||||
| 	struct bpf_map *map; | ||||
| 
 | ||||
| 	if (!storage) | ||||
| 		return; | ||||
| 
 | ||||
| 	map = &storage->map->map; | ||||
| 	pages = round_up(sizeof(struct bpf_cgroup_storage) + | ||||
| 			 sizeof(struct bpf_storage_buffer) + | ||||
| 			 map->value_size, PAGE_SIZE) >> PAGE_SHIFT; | ||||
| 	bpf_map_uncharge_memlock(map, pages); | ||||
| 
 | ||||
| 	kfree_rcu(storage->buf, rcu); | ||||
| 	kfree_rcu(storage, rcu); | ||||
| } | ||||
| 
 | ||||
| void bpf_cgroup_storage_link(struct bpf_cgroup_storage *storage, | ||||
| 			     struct cgroup *cgroup, | ||||
| 			     enum bpf_attach_type type) | ||||
| { | ||||
| 	struct bpf_cgroup_storage_map *map; | ||||
| 
 | ||||
| 	if (!storage) | ||||
| 		return; | ||||
| 
 | ||||
| 	storage->key.attach_type = type; | ||||
| 	storage->key.cgroup_inode_id = cgroup->kn->id.id; | ||||
| 
 | ||||
| 	map = storage->map; | ||||
| 
 | ||||
| 	spin_lock_bh(&map->lock); | ||||
| 	WARN_ON(cgroup_storage_insert(map, storage)); | ||||
| 	list_add(&storage->list, &map->list); | ||||
| 	spin_unlock_bh(&map->lock); | ||||
| } | ||||
| 
 | ||||
| void bpf_cgroup_storage_unlink(struct bpf_cgroup_storage *storage) | ||||
| { | ||||
| 	struct bpf_cgroup_storage_map *map; | ||||
| 	struct rb_root *root; | ||||
| 
 | ||||
| 	if (!storage) | ||||
| 		return; | ||||
| 
 | ||||
| 	map = storage->map; | ||||
| 
 | ||||
| 	spin_lock_bh(&map->lock); | ||||
| 	root = &map->root; | ||||
| 	rb_erase(&storage->node, root); | ||||
| 
 | ||||
| 	list_del(&storage->list); | ||||
| 	spin_unlock_bh(&map->lock); | ||||
| } | ||||
| 
 | ||||
| #endif | ||||
|  | @ -957,6 +957,9 @@ static void free_used_maps(struct bpf_prog_aux *aux) | |||
| { | ||||
| 	int i; | ||||
| 
 | ||||
| 	if (aux->cgroup_storage) | ||||
| 		bpf_cgroup_storage_release(aux->prog, aux->cgroup_storage); | ||||
| 
 | ||||
| 	for (i = 0; i < aux->used_map_cnt; i++) | ||||
| 		bpf_map_put(aux->used_maps[i]); | ||||
| 
 | ||||
|  |  | |||
|  | @ -5154,6 +5154,14 @@ static int replace_map_fd_with_map_ptr(struct bpf_verifier_env *env) | |||
| 			} | ||||
| 			env->used_maps[env->used_map_cnt++] = map; | ||||
| 
 | ||||
| 			if (map->map_type == BPF_MAP_TYPE_CGROUP_STORAGE && | ||||
| 			    bpf_cgroup_storage_assign(env->prog, map)) { | ||||
| 				verbose(env, | ||||
| 					"only one cgroup storage is allowed\n"); | ||||
| 				fdput(f); | ||||
| 				return -EBUSY; | ||||
| 			} | ||||
| 
 | ||||
| 			fdput(f); | ||||
| next_insn: | ||||
| 			insn++; | ||||
|  | @ -5180,6 +5188,10 @@ static void release_maps(struct bpf_verifier_env *env) | |||
| { | ||||
| 	int i; | ||||
| 
 | ||||
| 	if (env->prog->aux->cgroup_storage) | ||||
| 		bpf_cgroup_storage_release(env->prog, | ||||
| 					   env->prog->aux->cgroup_storage); | ||||
| 
 | ||||
| 	for (i = 0; i < env->used_map_cnt; i++) | ||||
| 		bpf_map_put(env->used_maps[i]); | ||||
| } | ||||
|  |  | |||
		Loading…
	
		Reference in a new issue
	
	 Roman Gushchin
						Roman Gushchin