Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7749660pxb; Thu, 18 Feb 2021 20:25:13 -0800 (PST) X-Google-Smtp-Source: ABdhPJyrHjoqJ0FzEoIjycBCFGa99wie0/58IbWIOPpVw/Uhnc6b1I+BDx8izUHpLVXRFhVzLKS8 X-Received: by 2002:a05:6402:a49:: with SMTP id bt9mr7274513edb.127.1613708713585; Thu, 18 Feb 2021 20:25:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613708713; cv=none; d=google.com; s=arc-20160816; b=TWpYmWTUwtIUKaTk5GOXKSPer0zG2vhFlgKsLUd/kWD7oH5gdLFLvhZt6qpRxR2ASc mGjYRavg7Oc/vFJzc9Tiw1nwkv4lGTLe6o9zj2JjO7ahn6nwUrBjPUAd1syfcHYiTX3f gLUZdlI5I9ZRO1Ap8OWGcH7Azt8gqNjvZaxygZU3al2pK+RkuN/If96jgzCFtq60I4hY SXe4EdBouFJi2bKZN4hqqf7kCVQQPVKnJSB8EO+KmrCtItGjZQVWsGcOqVdNR3dZn56X NCwgzGsdcHvT8zHkqv4ztUXIonVrD4EQdDrBxgrpX/9klHxxTH2F85kfValwdhqQx0DW fcVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=EWld9ImCc3v0QoBcZHhnGqqu1KPJY5iUGV+G4PT0MB8=; b=AAXpJ7txR/d3HEX7TA1J0yHzAQ0wUMx+RKjcawSwZKzkIbLfJ98ReQa0WWitZI2gTF 7UGL7pbcmDwYOPrKSpGte/0s5xUed552X06+fr8+jnXmaHVdQbSucl+/dU9VVikYEz3D ZfICC4R168c91G0JJ6KVSfcbfA9wsb3TYNy5aDjYo9T5mWOFCoF2fmCeIa2PdRsf84Uj tYr5xv9Kblp+uqegOUE5F45E6geI0PRZ9Cz7nmrLCrk3wd7CESxTWsNt3OwPxdvt0nFx wFzWTM2bpcElX5YJ42RWHB2z92WwRy2f6K7+/uiTskHR83rXAgt1vQHO2onwFHYUsxPK j7CA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dk7si5980850ejb.570.2021.02.18.20.24.50; Thu, 18 Feb 2021 20:25:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229594AbhBSEWe (ORCPT + 99 others); Thu, 18 Feb 2021 23:22:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54792 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229649AbhBSEWb (ORCPT ); Thu, 18 Feb 2021 23:22:31 -0500 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 180ECC061574; Thu, 18 Feb 2021 20:21:51 -0800 (PST) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94 #2 (Red Hat Linux)) id 1lCxIb-00FgWr-9M; Fri, 19 Feb 2021 04:21:49 +0000 Date: Fri, 19 Feb 2021 04:21:49 +0000 From: Al Viro To: Denis Kirjanov Cc: Christoph Hellwig , linux-kernel@vger.kernel.org, Jakub Kicinski , linux-fsdevel@vger.kernel.org Subject: [PATCH 4/8] unix_bind(): take BSD and abstract address cases into new helpers Message-ID: References: <20210125154937.26479-1-kda@linux-powerpc.org> <20210127175742.GA1744861@infradead.org> <20210129082524.GA2282796@infradead.org> <20210129131855.GA2346744@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org unix_bind_bsd() and unix_bind_abstract() respectively. Signed-off-by: Al Viro --- net/unix/af_unix.c | 144 +++++++++++++++++++++++++++-------------------------- 1 file changed, 74 insertions(+), 70 deletions(-) diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c index 11e18b0efbc6..d7aeb4827747 100644 --- a/net/unix/af_unix.c +++ b/net/unix/af_unix.c @@ -1013,101 +1013,105 @@ static int unix_mknod(const char *sun_path, umode_t mode, struct path *res) return err; } +static int unix_bind_bsd(struct sock *sk, struct unix_address *addr) +{ + struct unix_sock *u = unix_sk(sk); + struct path path = { }; + umode_t mode = S_IFSOCK | + (SOCK_INODE(sk->sk_socket)->i_mode & ~current_umask()); + unsigned int hash; + int err; + + err = unix_mknod(addr->name->sun_path, mode, &path); + if (err) { + if (err == -EEXIST) + err = -EADDRINUSE; + return err; + } + + err = mutex_lock_interruptible(&u->bindlock); + if (err) { + path_put(&path); + return err; + } + + if (u->addr) { + mutex_unlock(&u->bindlock); + path_put(&path); + return -EINVAL; + } + + addr->hash = UNIX_HASH_SIZE; + hash = d_backing_inode(path.dentry)->i_ino & (UNIX_HASH_SIZE - 1); + spin_lock(&unix_table_lock); + u->path = path; + __unix_set_addr(sk, addr, hash); + mutex_unlock(&u->bindlock); + return 0; +} + +static int unix_bind_abstract(struct sock *sk, unsigned hash, + struct unix_address *addr) +{ + struct unix_sock *u = unix_sk(sk); + int err; + + err = mutex_lock_interruptible(&u->bindlock); + if (err) + return err; + + if (u->addr) { + mutex_unlock(&u->bindlock); + return -EINVAL; + } + + spin_lock(&unix_table_lock); + if (__unix_find_socket_byname(sock_net(sk), addr->name, addr->len, + sk->sk_type, hash)) { + spin_unlock(&unix_table_lock); + mutex_unlock(&u->bindlock); + return -EADDRINUSE; + } + __unix_set_addr(sk, addr, addr->hash); + mutex_unlock(&u->bindlock); + return 0; +} + static int unix_bind(struct socket *sock, struct sockaddr *uaddr, int addr_len) { struct sock *sk = sock->sk; - struct net *net = sock_net(sk); - struct unix_sock *u = unix_sk(sk); struct sockaddr_un *sunaddr = (struct sockaddr_un *)uaddr; char *sun_path = sunaddr->sun_path; int err; unsigned int hash; struct unix_address *addr; - err = -EINVAL; if (addr_len < offsetofend(struct sockaddr_un, sun_family) || sunaddr->sun_family != AF_UNIX) - goto out; + return -EINVAL; - if (addr_len == sizeof(short)) { - err = unix_autobind(sock); - goto out; - } + if (addr_len == sizeof(short)) + return unix_autobind(sock); err = unix_mkname(sunaddr, addr_len, &hash); if (err < 0) - goto out; + return err; addr_len = err; - err = -ENOMEM; addr = kmalloc(sizeof(*addr)+addr_len, GFP_KERNEL); if (!addr) - goto out; + return -ENOMEM; memcpy(addr->name, sunaddr, addr_len); addr->len = addr_len; addr->hash = hash ^ sk->sk_type; refcount_set(&addr->refcnt, 1); - if (sun_path[0]) { - struct path path = { }; - umode_t mode = S_IFSOCK | - (SOCK_INODE(sock)->i_mode & ~current_umask()); - err = unix_mknod(sun_path, mode, &path); - if (err) { - if (err == -EEXIST) - err = -EADDRINUSE; - goto out_addr; - } - - err = mutex_lock_interruptible(&u->bindlock); - if (err) { - path_put(&path); - goto out_addr; - } - - err = -EINVAL; - if (u->addr) { - mutex_unlock(&u->bindlock); - path_put(&path); - goto out_addr; - } - - addr->hash = UNIX_HASH_SIZE; - hash = d_backing_inode(path.dentry)->i_ino & (UNIX_HASH_SIZE - 1); - spin_lock(&unix_table_lock); - u->path = path; - __unix_set_addr(sk, addr, hash); - mutex_unlock(&u->bindlock); - addr = NULL; - err = 0; - } else { - err = mutex_lock_interruptible(&u->bindlock); - if (err) - goto out_addr; - - err = -EINVAL; - if (u->addr) { - mutex_unlock(&u->bindlock); - goto out_addr; - } - - spin_lock(&unix_table_lock); - err = -EADDRINUSE; - if (__unix_find_socket_byname(net, sunaddr, addr_len, - sk->sk_type, hash)) { - spin_unlock(&unix_table_lock); - mutex_unlock(&u->bindlock); - goto out_addr; - } - __unix_set_addr(sk, addr, addr->hash); - mutex_unlock(&u->bindlock); - addr = NULL; - err = 0; - } -out_addr: - if (addr) + if (sun_path[0]) + err = unix_bind_bsd(sk, addr); + else + err = unix_bind_abstract(sk, hash, addr); + if (err) unix_release_addr(addr); -out: return err; } -- 2.11.0