Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp6746480pxv; Fri, 30 Jul 2021 01:02:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw7GNM8MEFcDBHYu8G/M7ZI2ViNKyTHZ93p3pRIBXpH0UI3VWC7Qr3H0cHQtQ7dKZMvXOqD X-Received: by 2002:a05:6402:cab:: with SMTP id cn11mr1480818edb.369.1627632165558; Fri, 30 Jul 2021 01:02:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627632165; cv=none; d=google.com; s=arc-20160816; b=z4/WUWnzS4XSDyF23rW0ZkAx+gs5Gj4vHSs7P2JJlwjq6Ed9845O6RZGqWP6zydD9o TW0r4xHp+b/vQTvC/RAwrp4EBIzJeP7uDsbCxer++UQFDmJibx/NabVdwGfsRd/w7usE 2YUatMvZZy61MSnvYA5n0AtI6tMGRq8D6WlTX4+/B2jutRkoq6d98RJxdLaipPI1mzm0 gx+ZeiacIAaKK9JBa0TNh5eyf0TWAexCWy1H8FIlLS1XxvkNHyx0UgpQloUJ7wlo98/d PSr6FUM+Mm5zq6+Ni1RtOmmOQ9HBHIC41CsUNKKLPDOkuQO6II24sB4/rlYdYY5hRDg1 HX3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:message-id:in-reply-to :subject:cc:to:from:date:dkim-signature; bh=Y7HX5YFqqvflWtOAFdHp5v6MXY/OcEeQOaBTkBgwruM=; b=ziFQ76/h44ptedfKXj7JurTKYFZb0S+MoR/3aEwqCVP4+q0bG/1aNQIZJ73HuZPWKx 3E8C/1lZ3C3bO8iWdAID3OFq9G3FoEsHETIaZBFS13CSOVhpNVpHgU+SbaTUdGx8XR5N L+INs0MX17pod7GaRF4uLbkGlujtH3K+BnlbybdgXhzdDzhR8Ql+XGubzDqy9c4b4Jsg 3kyS9NkRKJro7ulMmJ5/+vAeAWvOG1qr/tc5IVo4vL4RPZER1U9DbpBDzcSQdNv+eMJJ TJVs0WBOE2F7SzT8NC9ab4CGBaElyOHGMYrWdrxV/M1HL95iKgEGFd2JXSgXhfdG9TwV 8VUQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=u8YUNlG7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c6si798180ejc.71.2021.07.30.01.02.20; Fri, 30 Jul 2021 01:02:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=u8YUNlG7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237886AbhG3IA0 (ORCPT + 99 others); Fri, 30 Jul 2021 04:00:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55848 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237922AbhG3IAZ (ORCPT ); Fri, 30 Jul 2021 04:00:25 -0400 Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1D8D1C0613C1 for ; Fri, 30 Jul 2021 01:00:21 -0700 (PDT) Received: by mail-qk1-x733.google.com with SMTP id 184so8663811qkh.1 for ; Fri, 30 Jul 2021 01:00:21 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :mime-version; bh=Y7HX5YFqqvflWtOAFdHp5v6MXY/OcEeQOaBTkBgwruM=; b=u8YUNlG7+lu5Is9eMpdvivobPs3T+0kbTL+S17t5SgHQK7ZI42wPzwim0p5Qj9MV7u 2bU9YmpRo2bxZv0e7RZC0bKrCIrL2hx3bFOEZ6pFcNGTALYst0tCHVstlt4tlGIRQQdX YBJkVxUcLZYwRKs5+DEOoB5RT6WXu3viAXutpX6d0PengNqn+KpyfxmeUiJktHHuDf9S wz6YT+4+y452/F7EFITeaClRAPZZk6ry5z+Bi8M8uGzUp3dTwWg0eb8/yMP9X5qjqoH0 P/262T7dGLXaXcsIuhno7w4OQvYVMVnVrxPySbDDf0a4bY6qGegqMAGl1aNtMhFP5DZ/ 8ibw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:mime-version; bh=Y7HX5YFqqvflWtOAFdHp5v6MXY/OcEeQOaBTkBgwruM=; b=Z/RcAv7lEZ0RRtQ4JF0QoKSwCTmuC3cymAjyFH4edaW9aGN7vcClC4+DhWrL9Ml6YV oK46hcRRVTQROTfER5lJvpUUTCNtjAw+PzYTflBjhKVz0DyeL48Vtiu6vmXdOaANYIaG 4t06AJF4EnVWkkVFFCT4JzpqyoXUWENpxwjRiBX+hOX6YZeumPNzTnuTJIKEEKDAyJp/ LsvSlTIyp+dwrLIIxTm83rKLE6SvLm66yP1JyoMcixAdEoEebq8wOTZ2BCJZx3Oor3ZQ vynu/4WggJFG+L1s6v8RXU32NXIe51HCQRdMxhjoEwFWb1jWrNeTzzKbECMOKMItD2Gy 071Q== X-Gm-Message-State: AOAM530cxdUSBNVrLqyBsNhohrdwU7CrHTfJtK/aTkU59VgMAVHYPuYw Bb903Y7azVRrTrtUaW2dwOYBYQ== X-Received: by 2002:a05:620a:13a1:: with SMTP id m1mr1061123qki.91.1627632020050; Fri, 30 Jul 2021 01:00:20 -0700 (PDT) Received: from ripple.attlocal.net (172-10-233-147.lightspeed.sntcca.sbcglobal.net. [172.10.233.147]) by smtp.gmail.com with ESMTPSA id m80sm536727qke.98.2021.07.30.01.00.17 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 30 Jul 2021 01:00:18 -0700 (PDT) Date: Fri, 30 Jul 2021 01:00:16 -0700 (PDT) From: Hugh Dickins X-X-Sender: hugh@ripple.anvils To: Andrew Morton cc: Hugh Dickins , Shakeel Butt , "Kirill A. Shutemov" , Yang Shi , Miaohe Lin , Mike Kravetz , Michal Hocko , Rik van Riel , Christoph Hellwig , Matthew Wilcox , "Eric W. Biederman" , Alexey Gladkov , Chris Wilson , Matthew Auld , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, linux-mm@kvack.org Subject: [PATCH 12/16] tmpfs: refuse memlock when fallocated beyond i_size In-Reply-To: <2862852d-badd-7486-3a8e-c5ea9666d6fb@google.com> Message-ID: <3e5b2999-a27d-3590-46d9-80841b9427a9@google.com> References: <2862852d-badd-7486-3a8e-c5ea9666d6fb@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org F_MEM_LOCK is accounted by i_size, but fallocate(,FALLOC_FL_KEEP_SIZE,,) could have added many pages beyond i_size, which would also be held as Unevictable from memory. The mlock_ucounts check in shmem_fallocate() is fine, but shmem_memlock_fcntl() needs to check fallocend too. We could change F_MEM_LOCK accounting to use the max of i_size and fallocend, but fallocend is obscure: I think it's better just to refuse the F_MEM_LOCK (with EPERM) if fallocend exceeds (page-rounded) i_size. Signed-off-by: Hugh Dickins --- mm/shmem.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/mm/shmem.c b/mm/shmem.c index 6e53dabe658b..35c0f5c7120e 100644 --- a/mm/shmem.c +++ b/mm/shmem.c @@ -2304,7 +2304,10 @@ static int shmem_memlock_fcntl(struct file *file, unsigned int cmd) inode_lock(inode); if (cmd == F_MEM_LOCK) { - if (!info->mlock_ucounts) { + if (info->fallocend > DIV_ROUND_UP(inode->i_size, PAGE_SIZE)) { + /* locking is accounted by i_size: disallow excess */ + retval = -EPERM; + } else if (!info->mlock_ucounts) { struct ucounts *ucounts = current_ucounts(); /* capability/rlimit check is down in user_shm_lock */ retval = shmem_lock(file, 1, ucounts); @@ -2854,9 +2857,10 @@ static long shmem_fallocate(struct file *file, int mode, loff_t offset, spin_unlock(&inode->i_lock); /* - * info->fallocend is only relevant when huge pages might be + * info->fallocend is mostly relevant when huge pages might be * involved: to prevent split_huge_page() freeing fallocated * pages when FALLOC_FL_KEEP_SIZE committed beyond i_size. + * But it is also checked in F_MEM_LOCK validation. */ undo_fallocend = info->fallocend; if (info->fallocend < end) -- 2.26.2