Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp7749745pxb; Thu, 18 Feb 2021 20:25:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJxRpGKOgW6dz/oxF1fXTN0HlG35HQksaG1OvnmurXFjND7h+cAHUCGxthMmLHaktbfq9qLc X-Received: by 2002:aa7:c704:: with SMTP id i4mr2570688edq.95.1613708727413; Thu, 18 Feb 2021 20:25:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613708727; cv=none; d=google.com; s=arc-20160816; b=u7gidE8RMZI9U4MD5p7BX8yYVaeVxcbqYo1IRfZUfoTVLI01/TIFOIra53NZtvQOa+ dkDr19GoIqLobZGOgTwCgGlNoFU8/DO5mx18aS4dEPSXXlGxwv4ZRw2qfn4Yu0jAD/w2 yzcIGoSRX44h1/w87bLU+TuYr+WZnsI16J7QElbWXp3YubY2SrABxexQUFan5ygNQTIq Ck8LkYECnkeCd7lZiWrRwVeJj9wxcU0Z+tdnJ7whdbIxkgNBb409qKVxTVKjcH0ZxvF2 jbRoINVbQy+YHPNzbTEO3UstoUpduM1nx8yR/cIHO6sHgJ67I/l1/C0HDoTcPCVbc8qJ /68w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=I9xsOLkkbuVihVmllhlgXqS4YqbzJ1rHBI8MUc7GtPg=; b=H2P8EuA7GL+VC0K1l5LJChGmmYK9+339mmvB+w3v+nFn1mMMuwvOlZbxHDcniZxJgm YkRMizT/8BtcaIuSr4BlYgVBN4h0AgzUgZjlapYdIddKI5S1r9NpWt8ICmFjoGCLHqAO 3O50+fBl3B/YmM4DX2MTYxaM4+Uw/rsDigOYyAoGKJ6+a8L2OJ5z7HEpLGlzlueEDmEf ONcjbxDpmDjKDxLfMgX6usVuH+91MYW+kHSj0MRmEo3gYri2Iq7G8W0U/XTbr8QKcvWR 1eHjwYFAnQU9ab6bA1AVRrRGgW1KakdHQVhZppE+H1WxLoiyJVYH7z13WJ3q4SVdfiYJ BYQg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u6si5113828ejc.55.2021.02.18.20.25.04; Thu, 18 Feb 2021 20:25:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229873AbhBSEXr (ORCPT + 99 others); Thu, 18 Feb 2021 23:23:47 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55060 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229598AbhBSEXq (ORCPT ); Thu, 18 Feb 2021 23:23:46 -0500 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E90B2C061574; Thu, 18 Feb 2021 20:23:05 -0800 (PST) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94 #2 (Red Hat Linux)) id 1lCxJf-00FgXz-GY; Fri, 19 Feb 2021 04:22:55 +0000 Date: Fri, 19 Feb 2021 04:22:55 +0000 From: Al Viro To: Denis Kirjanov Cc: Christoph Hellwig , linux-kernel@vger.kernel.org, Jakub Kicinski , linux-fsdevel@vger.kernel.org Subject: [PATCH 6/8] unix_bind_bsd(): move done_path_create() call after dealing with ->bindlock Message-ID: References: <20210125154937.26479-1-kda@linux-powerpc.org> <20210127175742.GA1744861@infradead.org> <20210129082524.GA2282796@infradead.org> <20210129131855.GA2346744@infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Final preparations for doing unlink on failure past the successful mknod. We can't hold ->bindlock over ->mknod() or ->unlink(), since either might do sb_start_write() (e.g. on overlayfs). However, we can do it while holding filesystem and VFS locks - doing kern_path_create() vfs_mknod() grab ->bindlock if u->addr had been set drop ->bindlock done_path_create return -EINVAL else assign the address to socket drop ->bindlock done_path_create return 0 would be deadlock-free. Here we massage unix_bind_bsd() to that form. We are still doing equivalent transformations. Next commit will *not* be an equivalent transformation - it will add a call of vfs_unlink() before done_path_create() in "alread bound" case. Signed-off-by: Al Viro --- net/unix/af_unix.c | 24 ++++++++++-------------- 1 file changed, 10 insertions(+), 14 deletions(-) diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c index 36b88c8c438b..d55035a9695f 100644 --- a/net/unix/af_unix.c +++ b/net/unix/af_unix.c @@ -989,7 +989,7 @@ static int unix_bind_bsd(struct sock *sk, struct unix_address *addr) struct unix_sock *u = unix_sk(sk); umode_t mode = S_IFSOCK | (SOCK_INODE(sk->sk_socket)->i_mode & ~current_umask()); - struct path parent, path; + struct path parent; struct dentry *dentry; unsigned int hash; int err; @@ -1006,38 +1006,34 @@ static int unix_bind_bsd(struct sock *sk, struct unix_address *addr) * All right, let's create it. */ err = security_path_mknod(&parent, dentry, mode, 0); - if (!err) { + if (!err) err = vfs_mknod(d_inode(parent.dentry), dentry, mode, 0); - if (!err) { - path.mnt = mntget(parent.mnt); - path.dentry = dget(dentry); - } - } - done_path_create(&parent, dentry); + if (err) { if (err == -EEXIST) err = -EADDRINUSE; + done_path_create(&parent, dentry); return err; } - err = mutex_lock_interruptible(&u->bindlock); if (err) { - path_put(&path); + done_path_create(&parent, dentry); return err; } - if (u->addr) { mutex_unlock(&u->bindlock); - path_put(&path); + done_path_create(&parent, dentry); return -EINVAL; } addr->hash = UNIX_HASH_SIZE; - hash = d_backing_inode(path.dentry)->i_ino & (UNIX_HASH_SIZE - 1); + hash = d_backing_inode(dentry)->i_ino & (UNIX_HASH_SIZE - 1); spin_lock(&unix_table_lock); - u->path = path; + u->path.mnt = mntget(parent.mnt); + u->path.dentry = dget(dentry); __unix_set_addr(sk, addr, hash); mutex_unlock(&u->bindlock); + done_path_create(&parent, dentry); return 0; } -- 2.11.0