@@ -105,7 +105,7 @@ static long bpf_fd_sk_storage_update_elem(struct bpf_map *map, void *key,
105105 if (sock ) {
106106 sdata = bpf_local_storage_update (
107107 sock -> sk , (struct bpf_local_storage_map * )map , value ,
108- map_flags , false, GFP_ATOMIC );
108+ map_flags , false);
109109 sockfd_put (sock );
110110 return PTR_ERR_OR_ZERO (sdata );
111111 }
@@ -136,7 +136,7 @@ bpf_sk_storage_clone_elem(struct sock *newsk,
136136{
137137 struct bpf_local_storage_elem * copy_selem ;
138138
139- copy_selem = bpf_selem_alloc (smap , newsk , NULL , false, GFP_ATOMIC );
139+ copy_selem = bpf_selem_alloc (smap , newsk , NULL , false);
140140 if (!copy_selem )
141141 return NULL ;
142142
@@ -194,7 +194,7 @@ int bpf_sk_storage_clone(const struct sock *sk, struct sock *newsk)
194194 bpf_selem_link_map (smap , copy_selem );
195195 bpf_selem_link_storage_nolock (new_sk_storage , copy_selem );
196196 } else {
197- ret = bpf_local_storage_alloc (newsk , smap , copy_selem , GFP_ATOMIC );
197+ ret = bpf_local_storage_alloc (newsk , smap , copy_selem );
198198 if (ret ) {
199199 bpf_selem_free (copy_selem , true);
200200 atomic_sub (smap -> elem_size ,
@@ -219,9 +219,8 @@ int bpf_sk_storage_clone(const struct sock *sk, struct sock *newsk)
219219 return ret ;
220220}
221221
222- /* *gfp_flags* is a hidden argument provided by the verifier */
223- BPF_CALL_5 (bpf_sk_storage_get , struct bpf_map * , map , struct sock * , sk ,
224- void * , value , u64 , flags , gfp_t , gfp_flags )
222+ BPF_CALL_4 (bpf_sk_storage_get , struct bpf_map * , map , struct sock * , sk ,
223+ void * , value , u64 , flags )
225224{
226225 struct bpf_local_storage_data * sdata ;
227226
@@ -242,7 +241,7 @@ BPF_CALL_5(bpf_sk_storage_get, struct bpf_map *, map, struct sock *, sk,
242241 refcount_inc_not_zero (& sk -> sk_refcnt )) {
243242 sdata = bpf_local_storage_update (
244243 sk , (struct bpf_local_storage_map * )map , value ,
245- BPF_NOEXIST , false, gfp_flags );
244+ BPF_NOEXIST , false);
246245 /* sk must be a fullsock (guaranteed by verifier),
247246 * so sock_gen_put() is unnecessary.
248247 */
@@ -374,16 +373,14 @@ static bool bpf_sk_storage_tracing_allowed(const struct bpf_prog *prog)
374373 return false;
375374}
376375
377- /* *gfp_flags* is a hidden argument provided by the verifier */
378- BPF_CALL_5 (bpf_sk_storage_get_tracing , struct bpf_map * , map , struct sock * , sk ,
379- void * , value , u64 , flags , gfp_t , gfp_flags )
376+ BPF_CALL_4 (bpf_sk_storage_get_tracing , struct bpf_map * , map , struct sock * , sk ,
377+ void * , value , u64 , flags )
380378{
381379 WARN_ON_ONCE (!bpf_rcu_lock_held ());
382380 if (in_hardirq () || in_nmi ())
383381 return (unsigned long )NULL ;
384382
385- return (unsigned long )____bpf_sk_storage_get (map , sk , value , flags ,
386- gfp_flags );
383+ return (unsigned long )____bpf_sk_storage_get (map , sk , value , flags );
387384}
388385
389386BPF_CALL_2 (bpf_sk_storage_delete_tracing , struct bpf_map * , map ,
0 commit comments