Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2432093imm; Thu, 7 Jun 2018 10:27:52 -0700 (PDT) X-Google-Smtp-Source: ADUXVKImAoutqTkd5oGoCfz/XFSHX/+UAYtYwKQwuzXQS1hyznE9JXHNIM0r88vzp9R2gb6uxt4z X-Received: by 2002:a62:df89:: with SMTP id d9-v6mr2592388pfl.147.1528392472908; Thu, 07 Jun 2018 10:27:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528392472; cv=none; d=google.com; s=arc-20160816; b=R/mqHtxHj9YkqlQFE0XMpTkb1P1/MqW+EK1wyoaTJCf9hAuOSxHvfBK16yeCLzXQmA sXHvvgaMyVyNwjEkxhV0Sczu/PL5favu/IXPYU/z7pFwxShyzyruszqJKnpd/AkYUsOv OGXGIQvoSQHeRapjiviUFFE/fErYIECQJDkq8gTYGqk2m2FJKbG0MrO4iyEQe2OstAtD oDd+JaG6TO9L0Z+kGOQCkhKAtpAs/kdLLG20m0R3VtnCE3WB2OhOpGm/q9ejYq0WfqAb b3r6kAJB6+3tDMMZLTJuSUFcZ2INCENDcgHuwKMlnzHcCr08/dcIYgVvFTLHgK1KQwVD acjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition :arc-authentication-results; bh=I2OiuJ44YaawuuMM+pgWzNGX9P1eOuMcUgjvMoH6+PM=; b=j4wpzEDC3j0imEWiOl/8Mnjkmt0Au7pEHlxdndGiM0NZHdAFXPp6UHoQ8V2Gae0aoO cy9eXe29EWuC4pCxrtjtGniO5FJJvJwRAAFcEHQgkXXrDkEQMwiZoNznk8uXyj82goDd PWyglZeA4BHOlIy+KHdEAlxwRVWF/L5gu+9sppvO4odXwOO/S4EO+MNFQ60E+56PGjgA 57Aj49mYzGWdIdCza038OO8DczEFKWLS814Fh+Ch5wKIlnBq329XWCz5glUnUZE9k9gU t7ZMKu1WFNjKNf7B1VEQtLcs5xot4j7uIyGJtifDm05gfzvx5eicOP5ef7i76osAwg7E SlNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r59-v6si53992608plb.187.2018.06.07.10.27.38; Thu, 07 Jun 2018 10:27:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933753AbeFGOdk (ORCPT + 99 others); Thu, 7 Jun 2018 10:33:40 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:40321 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933910AbeFGOdf (ORCPT ); Thu, 7 Jun 2018 10:33:35 -0400 Received: from [148.252.241.226] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1fQvbh-0005hL-79; Thu, 07 Jun 2018 15:09:41 +0100 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1fQvb5-0002zT-TJ; Thu, 07 Jun 2018 15:09:03 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Linus Torvalds" , "Vegard Nossum" , "Tetsuo Handa" , "Michael Kerrisk (man-pages)" , "" , "Al Viro" , "Willy Tarreau" , "Jens Axboe" Date: Thu, 07 Jun 2018 15:05:21 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) Subject: [PATCH 3.16 200/410] pipe: move limit checking logic into pipe_set_size() In-Reply-To: X-SA-Exim-Connect-IP: 148.252.241.226 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.57-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: "Michael Kerrisk (man-pages)" commit d37d41666408102bf0ac8e48d8efdce7b809e5f6 upstream. This is a preparatory patch for following work. Move the F_SETPIPE_SZ limit-checking logic from pipe_fcntl() into pipe_set_size(). This simplifies the code a little, and allows for reworking required in a later patch that fixes the limit checking in pipe_set_size() Link: http://lkml.kernel.org/r/3701b2c5-2c52-2c3e-226d-29b9deb29b50@gmail.com Signed-off-by: Michael Kerrisk Reviewed-by: Vegard Nossum Cc: Willy Tarreau Cc: Cc: Tetsuo Handa Cc: Jens Axboe Cc: Al Viro Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Ben Hutchings --- fs/pipe.c | 41 ++++++++++++++++++----------------------- 1 file changed, 18 insertions(+), 23 deletions(-) --- a/fs/pipe.c +++ b/fs/pipe.c @@ -1009,9 +1009,24 @@ static inline unsigned int round_pipe_si * Allocate a new array of pipe buffers and copy the info over. Returns the * pipe size if successful, or return -ERROR on error. */ -static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long nr_pages) +static long pipe_set_size(struct pipe_inode_info *pipe, unsigned long arg) { struct pipe_buffer *bufs; + unsigned int size, nr_pages; + + size = round_pipe_size(arg); + nr_pages = size >> PAGE_SHIFT; + + if (!nr_pages) + return -EINVAL; + + if (!capable(CAP_SYS_RESOURCE) && size > pipe_max_size) + return -EPERM; + + if ((too_many_pipe_buffers_hard(pipe->user) || + too_many_pipe_buffers_soft(pipe->user)) && + !capable(CAP_SYS_RESOURCE) && !capable(CAP_SYS_ADMIN)) + return -EPERM; /* * We can shrink the pipe, if arg >= pipe->nrbufs. Since we don't @@ -1094,28 +1109,9 @@ long pipe_fcntl(struct file *file, unsig __pipe_lock(pipe); switch (cmd) { - case F_SETPIPE_SZ: { - unsigned int size, nr_pages; - - size = round_pipe_size(arg); - nr_pages = size >> PAGE_SHIFT; - - ret = -EINVAL; - if (!nr_pages) - goto out; - - if (!capable(CAP_SYS_RESOURCE) && size > pipe_max_size) { - ret = -EPERM; - goto out; - } else if ((too_many_pipe_buffers_hard(pipe->user) || - too_many_pipe_buffers_soft(pipe->user)) && - !capable(CAP_SYS_RESOURCE) && !capable(CAP_SYS_ADMIN)) { - ret = -EPERM; - goto out; - } - ret = pipe_set_size(pipe, nr_pages); + case F_SETPIPE_SZ: + ret = pipe_set_size(pipe, arg); break; - } case F_GETPIPE_SZ: ret = pipe->buffers * PAGE_SIZE; break; @@ -1124,7 +1120,6 @@ long pipe_fcntl(struct file *file, unsig break; } -out: __pipe_unlock(pipe); return ret; }