Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1859500pxb; Mon, 22 Feb 2021 12:54:12 -0800 (PST) X-Google-Smtp-Source: ABdhPJw+mlLTvTTcZmpkaoiyjbNXhb74Qt/PR5MP0nuRx4yEsTNFpzZR5F5ZnLRGiGk927KV3Hgv X-Received: by 2002:a17:907:9da:: with SMTP id bx26mr19601641ejc.206.1614027252091; Mon, 22 Feb 2021 12:54:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614027252; cv=none; d=google.com; s=arc-20160816; b=xv4xf3nb2b7HtAg4dpozwTpPiiq/B+yhH5Owftns6igi+t9ozEJ9WnQvGCXgT6GWOH 09bHYCJCBO2HkSVAy/52E/cHUxds3w3RpxXInDKfCypkJe5sdlGELbpbI+mB4jiXNIVI TUagk3n6uiZCYhhokZuMogMLNFCJVz9jJtC8dJ/9HUjMgUq/HdLws+hStegEUma1Up1a IZTnaiD9qt59o2w0e9+Ff5jhAXdb8kpB1s9urhoduu2nnvt9TzFCIY0mCjBbT0Gbv7EL 0fyjOxbp9086lS/1ZV+iKxezHeRu2okllnijxx9kMmWdAC0yyzwhXpSWKj9Q2aPsz7W9 izVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=ddPqPKyZyxeGpVFpSdg8Z2nZPtT6RCQHUHBxgNIqMLw=; b=v6aAB8WmT+dp4DPcQHzA4L/IVvU9hS8+NC/SwymWreRHKQ4knjkVyjASgyBo8eJZKp +z2wUflUn3o/FtR6wlhiGj+kWqE+691HVRxJYTAB78TOq40+/CVS820mBRqAQ2BG6AHQ YVjZpsB/g4kkOvTw0KNRl4dAcOD9EYDdxUqbyfIjW2Q2aoFdM1wAGxHur4b/bM9DAfRw hebp2S/mpNF0RHpdP2+P1E0D9ohmypS8JngTdfQpNAg6jhQzreHqX8RKHRGecTGUf3VP XDtvR+X4e5tI3A2z4UyTmCfw0s4Z78cWa/pT2bs2Q2L63oKRhOcjTcDAHsnCdBWb867i c/DQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bt23si12759813edb.20.2021.02.22.12.53.48; Mon, 22 Feb 2021 12:54:12 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233166AbhBVTSU (ORCPT + 99 others); Mon, 22 Feb 2021 14:18:20 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35640 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232983AbhBVTNG (ORCPT ); Mon, 22 Feb 2021 14:13:06 -0500 Received: from zeniv-ca.linux.org.uk (zeniv-ca.linux.org.uk [IPv6:2607:5300:60:148a::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8376CC061794; Mon, 22 Feb 2021 11:12:26 -0800 (PST) Received: from viro by zeniv-ca.linux.org.uk with local (Exim 4.94 #2 (Red Hat Linux)) id 1lEGd4-00HAzt-HJ; Mon, 22 Feb 2021 19:12:22 +0000 From: Al Viro To: netdev@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Christoph Hellwig , Jakub Kicinski , Denis Kirjanov , linux-fsdevel , Cong Wang Subject: [PATCH 6/8] unix_bind_bsd(): move done_path_create() call after dealing with ->bindlock Date: Mon, 22 Feb 2021 19:12:20 +0000 Message-Id: <20210222191222.4093800-6-viro@zeniv.linux.org.uk> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20210222191222.4093800-1-viro@zeniv.linux.org.uk> References: <20210222191222.4093800-1-viro@zeniv.linux.org.uk> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Final preparations for doing unlink on failure past the successful mknod. We can't hold ->bindlock over ->mknod() or ->unlink(), since either might do sb_start_write() (e.g. on overlayfs). However, we can do it while holding filesystem and VFS locks - doing kern_path_create() vfs_mknod() grab ->bindlock if u->addr had been set drop ->bindlock done_path_create return -EINVAL else assign the address to socket drop ->bindlock done_path_create return 0 would be deadlock-free. Here we massage unix_bind_bsd() to that form. We are still doing equivalent transformations. Next commit will *not* be an equivalent transformation - it will add a call of vfs_unlink() before done_path_create() in "alread bound" case. Signed-off-by: Al Viro --- net/unix/af_unix.c | 26 +++++++++++--------------- 1 file changed, 11 insertions(+), 15 deletions(-) diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c index 5e04e16e6b88..368376621111 100644 --- a/net/unix/af_unix.c +++ b/net/unix/af_unix.c @@ -988,7 +988,7 @@ static int unix_bind_bsd(struct sock *sk, struct unix_address *addr) struct unix_sock *u = unix_sk(sk); umode_t mode = S_IFSOCK | (SOCK_INODE(sk->sk_socket)->i_mode & ~current_umask()); - struct path parent, path; + struct path parent; struct dentry *dentry; unsigned int hash; int err; @@ -1005,36 +1005,32 @@ static int unix_bind_bsd(struct sock *sk, struct unix_address *addr) * All right, let's create it. */ err = security_path_mknod(&parent, dentry, mode, 0); - if (!err) { + if (!err) err = vfs_mknod(d_inode(parent.dentry), dentry, mode, 0); - if (!err) { - path.mnt = mntget(parent.mnt); - path.dentry = dget(dentry); - } - } - done_path_create(&parent, dentry); - if (err) + if (err) { + done_path_create(&parent, dentry); return err; - + } err = mutex_lock_interruptible(&u->bindlock); if (err) { - path_put(&path); + done_path_create(&parent, dentry); return err; } - if (u->addr) { mutex_unlock(&u->bindlock); - path_put(&path); + done_path_create(&parent, dentry); return -EINVAL; } addr->hash = UNIX_HASH_SIZE; - hash = d_backing_inode(path.dentry)->i_ino & (UNIX_HASH_SIZE - 1); + hash = d_backing_inode(dentry)->i_ino & (UNIX_HASH_SIZE - 1); spin_lock(&unix_table_lock); - u->path = path; + u->path.mnt = mntget(parent.mnt); + u->path.dentry = dget(dentry); __unix_set_addr(sk, addr, hash); spin_unlock(&unix_table_lock); mutex_unlock(&u->bindlock); + done_path_create(&parent, dentry); return 0; } -- 2.11.0