ksmbd: fix potential circular locking issue in smb2_set_ea()
authorNamjae Jeon <linkinjeon@kernel.org>
Thu, 14 Dec 2023 23:33:57 +0000 (08:33 +0900)
committerSteve French <stfrench@microsoft.com>
Tue, 9 Jan 2024 18:52:33 +0000 (12:52 -0600)
smb2_set_ea() can be called in parent inode lock range.
So add get_write argument to smb2_set_ea() not to call nested
mnt_want_write().

Signed-off-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
fs/smb/server/smb2pdu.c

index 652ab429bf2e9cd945a772c6cddac46012fadf00..a2f72967518354aa072011961151f2ed0f5e5ef7 100644 (file)
@@ -2311,11 +2311,12 @@ out:
  * @eabuf:     set info command buffer
  * @buf_len:   set info command buffer length
  * @path:      dentry path for get ea
+ * @get_write: get write access to a mount
  *
  * Return:     0 on success, otherwise error
  */
 static int smb2_set_ea(struct smb2_ea_info *eabuf, unsigned int buf_len,
-                      const struct path *path)
+                      const struct path *path, bool get_write)
 {
        struct mnt_idmap *idmap = mnt_idmap(path->mnt);
        char *attr_name = NULL, *value;
@@ -3003,7 +3004,7 @@ int smb2_open(struct ksmbd_work *work)
 
                        rc = smb2_set_ea(&ea_buf->ea,
                                         le32_to_cpu(ea_buf->ccontext.DataLength),
-                                        &path);
+                                        &path, false);
                        if (rc == -EOPNOTSUPP)
                                rc = 0;
                        else if (rc)
@@ -5992,7 +5993,7 @@ static int smb2_set_info_file(struct ksmbd_work *work, struct ksmbd_file *fp,
                        return -EINVAL;
 
                return smb2_set_ea((struct smb2_ea_info *)req->Buffer,
-                                  buf_len, &fp->filp->f_path);
+                                  buf_len, &fp->filp->f_path, true);
        }
        case FILE_POSITION_INFORMATION:
        {