Skip to content

Commit

Permalink
cifs: avoid extra allocation for small cifs.idmap keys
Browse files Browse the repository at this point in the history
The cifs.idmap keytype always allocates memory to hold the payload from
userspace. In the common case where we're translating a SID to a UID or
GID, we're allocating memory to hold something that's less than or equal
to the size of a pointer.

When the payload is the same size as a pointer or smaller, just store
it in the payload.value union member instead. That saves us an extra
allocation on the sid_to_id upcall.

Note that we have to take extra care to check the datalen when we
go to dereference the .data pointer in the union, but the callers
now check that as a matter of course anyway.

Reviewed-by: Shirish Pargaonkar <[email protected]>
Signed-off-by: Jeff Layton <[email protected]>
Signed-off-by: Steve French <[email protected]>
  • Loading branch information
jtlayton authored and smfrench committed Dec 9, 2012
1 parent faa65f0 commit 41a9f1f
Showing 1 changed file with 19 additions and 4 deletions.
23 changes: 19 additions & 4 deletions fs/cifs/cifsacl.c
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,20 @@ cifs_idmap_key_instantiate(struct key *key, struct key_preparsed_payload *prep)
{
char *payload;

/*
* If the payload is less than or equal to the size of a pointer, then
* an allocation here is wasteful. Just copy the data directly to the
* payload.value union member instead.
*
* With this however, you must check the datalen before trying to
* dereference payload.data!
*/
if (prep->datalen <= sizeof(void *)) {
key->payload.value = 0;
memcpy(&key->payload.value, prep->data, prep->datalen);
key->datalen = prep->datalen;
return 0;
}
payload = kmalloc(prep->datalen, GFP_KERNEL);
if (!payload)
return -ENOMEM;
Expand All @@ -62,7 +76,8 @@ cifs_idmap_key_instantiate(struct key *key, struct key_preparsed_payload *prep)
static inline void
cifs_idmap_key_destroy(struct key *key)
{
kfree(key->payload.data);
if (key->datalen > sizeof(void *))
kfree(key->payload.data);
}

static struct key_type cifs_idmap_key_type = {
Expand Down Expand Up @@ -245,17 +260,17 @@ sid_to_id(struct cifs_sb_info *cifs_sb, struct cifs_sid *psid,
* probably a safe assumption but might be better to check based on
* sidtype.
*/
if (sidkey->datalen < sizeof(uid_t)) {
if (sidkey->datalen != sizeof(uid_t)) {
rc = -EIO;
cFYI(1, "%s: Downcall contained malformed key "
"(datalen=%hu)", __func__, sidkey->datalen);
goto out_key_put;
}

if (sidtype == SIDOWNER)
fuid = *(uid_t *)sidkey->payload.value;
memcpy(&fuid, &sidkey->payload.value, sizeof(uid_t));
else
fgid = *(gid_t *)sidkey->payload.value;
memcpy(&fgid, &sidkey->payload.value, sizeof(gid_t));

out_key_put:
key_put(sidkey);
Expand Down

0 comments on commit 41a9f1f

Please sign in to comment.