Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1667381ybz; Thu, 16 Apr 2020 13:17:38 -0700 (PDT) X-Google-Smtp-Source: APiQypKrcazwhlBYaomPrvCQyHZhkj98HPwvNt4pXecFHqQwMR42D1aBHzzXGIx69ZV/t9vAtmvD X-Received: by 2002:a05:6402:1d1c:: with SMTP id dg28mr29374113edb.135.1587068258600; Thu, 16 Apr 2020 13:17:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587068258; cv=none; d=google.com; s=arc-20160816; b=fsT+WxSLNboCx8RAq2P/i8mU5ugtKi5A0uSKXKh6yevZy5FX24g9cVv+6+p36FHHit B8hRPRxow6uK0CM1FNQFyRWy+LJrU6xoNftkADhvaiYcyYCJyOH4bfCenULN7ynZ+iXU 0n43SNjOfWdc5n7dt5+sCaMsgOCInCbTjzbBTAoh9TQbervir1ttR7P0GIl/fIpb6wI/ IDHi1Bye1HBJRAXZSfdQIu8I+IrIxMYg1BoWxyl03qMeZyeLR7Hfga1uZbQhRYady0kC J/z9fXTQWioTwyEkHIj+p5N7WIWEgxgkrVgNgJT+ri84xHs7NAuQ4ffhv8vmLOZVBVGk bSYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=41s5zMXHSDpgpLcOzAbZRQK5XFnUWxADcMXuRKsSgGY=; b=AdCXw7MAg9CkKIF9axgc1BIoaOSghI8goAJlLPf/0IR54kr0e6v06dULWGNxc8KV0I w8/qJVhUbjsQtyc6+O7enigBtc3HKZnojXlhfx1Ni4ctC+Qx427Pai46HKFoE8v3anh1 Fr/ej4j68rJpzZzJxwFNj+ecQXuEy38x4DuNR84V64PlN9/iAKAcrIyufEOgjxRagqNn aS9f0x99nWNSfr4YfCPi8kBLNMgm334Oges6TxuhoMiATw8UCTerkZZgPZAO3bAEH1Nq LeN1i6Qw107O/hvoqqKzn9UDOGn+uH309OwImyB5OHIht6t9uY+YkNBTgwzXgUQiN5A8 5nVw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LWv1Uisz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bs10si3285860edb.429.2020.04.16.13.17.15; Thu, 16 Apr 2020 13:17:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LWv1Uisz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393556AbgDPOLB (ORCPT + 99 others); Thu, 16 Apr 2020 10:11:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:32882 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2898635AbgDPNqy (ORCPT ); Thu, 16 Apr 2020 09:46:54 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6B8812222D; Thu, 16 Apr 2020 13:46:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587044813; bh=TngxyyCp0Rdwo2YoXhGFlYACMiVZ+4ahpshlX/svg6Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=LWv1Uisz52l/Y86Url45+TtUmTu+/hYE4vaLokyafetPCjSKnFyNhHtbgbQGZrhpX EkePN5zgb2qR2gi+kK61Wx84e2bmrN0HLB565U5Gu4wuTfPSaPwAq6bzW0492lO2MD zpcHGwM7u5wIaWRt6ror/bdRQ1Sk+6CWj2piRDkk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jens Axboe Subject: [PATCH 5.4 112/232] io_uring: remove bogus RLIMIT_NOFILE check in file registration Date: Thu, 16 Apr 2020 15:23:26 +0200 Message-Id: <20200416131329.139822140@linuxfoundation.org> X-Mailer: git-send-email 2.26.1 In-Reply-To: <20200416131316.640996080@linuxfoundation.org> References: <20200416131316.640996080@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jens Axboe commit c336e992cb1cb1db9ee608dfb30342ae781057ab upstream. We already checked this limit when the file was opened, and we keep it open in the file table. Hence when we added unit_inflight to the count we want to register, we're doubly accounting these files. This results in -EMFILE for file registration, if we're at half the limit. Cc: stable@vger.kernel.org # v5.1+ Signed-off-by: Jens Axboe Signed-off-by: Greg Kroah-Hartman --- fs/io_uring.c | 7 ------- 1 file changed, 7 deletions(-) --- a/fs/io_uring.c +++ b/fs/io_uring.c @@ -3092,13 +3092,6 @@ static int __io_sqe_files_scm(struct io_ struct sk_buff *skb; int i; - if (!capable(CAP_SYS_RESOURCE) && !capable(CAP_SYS_ADMIN)) { - unsigned long inflight = ctx->user->unix_inflight + nr; - - if (inflight > task_rlimit(current, RLIMIT_NOFILE)) - return -EMFILE; - } - fpl = kzalloc(sizeof(*fpl), GFP_KERNEL); if (!fpl) return -ENOMEM;