Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp3050389pxt; Mon, 9 Aug 2021 15:46:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwqKc3rXQIFIC3YbhaZwfRVen/mvZ12PyEcRc1YePTG3g4pLfY9gmQD/d01itYNZE+fbkh7 X-Received: by 2002:aa7:cd92:: with SMTP id x18mr766734edv.325.1628549198798; Mon, 09 Aug 2021 15:46:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628549198; cv=none; d=google.com; s=arc-20160816; b=KDMnzDLG8jIXzOEp6oGpQZHzRexIPd2LRH9+9Xe0bF9uCcaWVnND7UCVSrT1ZEkzME 8hHuACMjnp7J5Zz4OfskPQwBZNgnL1NvOEOBXGEAWw8gwyrOisYKM24KwGgLBZndikbN PJtU9HPcTKm0Wj71+bX0NldNFpytG/aAftK1DbMidXTvIDvgiq/1lDVYRLoVxwy0VgEJ of68Npy69PQhmJVKbJDcEcuvt8cSzmy3bybGV/TpfzCWmscuNtXsFx6V2Dvn/rVWvj6V LkRG0vabymDu2vcTkH6dNuLpNCMl8Z4mxouKbuX3kGQsV9s9Q/banaFTPEU0oDtTF50U YB1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:mime-version:message-id:date:user-agent :references:in-reply-to:cc:to:from; bh=91gnuoHZuDWzIvc/wSQI96s1ChJIE5OxNxKMLxLFfcI=; b=fxqIFnJvzfhABiHXGEtmP4l2w91tobsTf/E6yiIX233QpypUbcT9AkePLkYh4/mY4W mJXkf9SJ8Q/ext/SOCG/GKrZ38tWHYImxDMy1Aw47pUwVeOTQ8E6MnZ8JfdyhxLKpCwP XVV0th/BplhktqY8dpGkCWhfdxkyDYootE4BrpnRGoeJWJKB6hY2KyDvh6kJWpVEGkwF 6xx5GxM9xaSjrRtc66yCeCs8gcV9TGjqw38ewLtHT9Vms+u7HaXp7le+cpocXyqkJKb+ MGIgSUfqu11YuWC8+Lt2tQnxCKjJ0W6mpm3JF+HrIQ8bNSMLHYcc/i+re3nv33ekHws7 4HiQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i2si18498156edx.577.2021.08.09.15.46.13; Mon, 09 Aug 2021 15:46:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236288AbhHIUof (ORCPT + 99 others); Mon, 9 Aug 2021 16:44:35 -0400 Received: from out03.mta.xmission.com ([166.70.13.233]:39308 "EHLO out03.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233348AbhHIUoe (ORCPT ); Mon, 9 Aug 2021 16:44:34 -0400 Received: from in02.mta.xmission.com ([166.70.13.52]:42266) by out03.mta.xmission.com with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1mDC84-006eur-13; Mon, 09 Aug 2021 14:44:12 -0600 Received: from ip68-227-160-95.om.om.cox.net ([68.227.160.95]:51854 helo=email.xmission.com) by in02.mta.xmission.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1mDC82-003SLf-2z; Mon, 09 Aug 2021 14:44:11 -0600 From: ebiederm@xmission.com (Eric W. Biederman) To: Naresh Kamboju Cc: Sven Schnelle , Nathan Chancellor , Alexey Gladkov , open list , LTP List , linux-fsdevel@vger.kernel.org, Jan Kara In-Reply-To: (Naresh Kamboju's message of "Fri, 6 Aug 2021 16:06:51 +0530") References: <20210730062854.3601635-1-svens@linux.ibm.com> <875ywlat5e.fsf@disp2133> <94478003-8259-4b57-6d93-5a07e0750946@kernel.org> <87v94jalck.fsf@disp2133> <56b7c0fe-f2e1-7c4f-eb1b-1d9793dea5a8@kernel.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) Date: Mon, 09 Aug 2021 15:43:56 -0500 Message-ID: <8735rijqlv.fsf_-_@disp2133> MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1mDC82-003SLf-2z;;;mid=<8735rijqlv.fsf_-_@disp2133>;;;hst=in02.mta.xmission.com;;;ip=68.227.160.95;;;frm=ebiederm@xmission.com;;;spf=neutral X-XM-AID: U2FsdGVkX1+R3wCFlQLiMNmQm42YcNlMYC9wsvdUJNU= X-SA-Exim-Connect-IP: 68.227.160.95 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on sa07.xmission.com X-Spam-Level: X-Spam-Status: No, score=-0.2 required=8.0 tests=ALL_TRUSTED,BAYES_50, DCC_CHECK_NEGATIVE,T_TM2_M_HEADER_IN_MSG autolearn=disabled version=3.4.2 X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% * [score: 0.4999] * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa07 1397; Body=1 Fuz1=1 Fuz2=1] X-Spam-DCC: XMission; sa07 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ;Naresh Kamboju X-Spam-Relay-Country: X-Spam-Timing: total 558 ms - load_scoreonly_sql: 0.06 (0.0%), signal_user_changed: 10 (1.7%), b_tie_ro: 8 (1.5%), parse: 1.07 (0.2%), extract_message_metadata: 17 (3.0%), get_uri_detail_list: 3.2 (0.6%), tests_pri_-1000: 28 (5.0%), tests_pri_-950: 1.31 (0.2%), tests_pri_-900: 1.09 (0.2%), tests_pri_-90: 90 (16.2%), check_bayes: 88 (15.8%), b_tokenize: 11 (1.9%), b_tok_get_all: 8 (1.5%), b_comp_prob: 2.4 (0.4%), b_tok_touch_all: 62 (11.1%), b_finish: 0.96 (0.2%), tests_pri_0: 398 (71.3%), check_dkim_signature: 0.71 (0.1%), check_dkim_adsp: 2.7 (0.5%), poll_dns_idle: 0.81 (0.1%), tests_pri_10: 2.3 (0.4%), tests_pri_500: 7 (1.2%), rewrite_mail: 0.00 (0.0%) Subject: [PATCH v4] ucounts: add missing data type changes X-SA-Exim-Version: 4.2.1 (built Sat, 08 Feb 2020 21:53:50 +0000) X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org commit f9c82a4ea89c3 ("Increase size of ucounts to atomic_long_t") changed the data type of ucounts/ucounts_max to long, but missed to adjust a few other places. This is noticeable on big endian platforms from user space because the /proc/sys/user/max_*_names files all contain 0. v4 - Made the min and max constants long so the sysctl values are actually settable on little endian machines. -- EWB Fixes: f9c82a4ea89c ("Increase size of ucounts to atomic_long_t") Signed-off-by: Sven Schnelle Tested-by: Nathan Chancellor Tested-by: Linux Kernel Functional Testing Acked-by: Alexey Gladkov v1: https://lkml.kernel.org/r/20210721115800.910778-1-svens@linux.ibm.com v2: https://lkml.kernel.org/r/20210721125233.1041429-1-svens@linux.ibm.com v3: https://lkml.kernel.org/r/20210730062854.3601635-1-svens@linux.ibm.com Signed-off-by: Eric W. Biederman --- Thanks everyone for testing and helping find the cause of this bug. I will push this out to linux-next shortly. fs/notify/fanotify/fanotify_user.c | 17 +++++++++++------ fs/notify/inotify/inotify_user.c | 17 +++++++++++------ kernel/ucount.c | 19 +++++++++++-------- 3 files changed, 33 insertions(+), 20 deletions(-) diff --git a/fs/notify/fanotify/fanotify_user.c b/fs/notify/fanotify/fanotify_user.c index 64864fb40b40..28b67cb9458d 100644 --- a/fs/notify/fanotify/fanotify_user.c +++ b/fs/notify/fanotify/fanotify_user.c @@ -54,22 +54,27 @@ static int fanotify_max_queued_events __read_mostly; #include +static long ft_zero = 0; +static long ft_int_max = INT_MAX; + struct ctl_table fanotify_table[] = { { .procname = "max_user_groups", .data = &init_user_ns.ucount_max[UCOUNT_FANOTIFY_GROUPS], - .maxlen = sizeof(int), + .maxlen = sizeof(long), .mode = 0644, - .proc_handler = proc_dointvec_minmax, - .extra1 = SYSCTL_ZERO, + .proc_handler = proc_doulongvec_minmax, + .extra1 = &ft_zero, + .extra2 = &ft_int_max, }, { .procname = "max_user_marks", .data = &init_user_ns.ucount_max[UCOUNT_FANOTIFY_MARKS], - .maxlen = sizeof(int), + .maxlen = sizeof(long), .mode = 0644, - .proc_handler = proc_dointvec_minmax, - .extra1 = SYSCTL_ZERO, + .proc_handler = proc_doulongvec_minmax, + .extra1 = &ft_zero, + .extra2 = &ft_int_max, }, { .procname = "max_queued_events", diff --git a/fs/notify/inotify/inotify_user.c b/fs/notify/inotify/inotify_user.c index 98f61b31745a..62051247f6d2 100644 --- a/fs/notify/inotify/inotify_user.c +++ b/fs/notify/inotify/inotify_user.c @@ -55,22 +55,27 @@ struct kmem_cache *inotify_inode_mark_cachep __read_mostly; #include +static long it_zero = 0; +static long it_int_max = INT_MAX; + struct ctl_table inotify_table[] = { { .procname = "max_user_instances", .data = &init_user_ns.ucount_max[UCOUNT_INOTIFY_INSTANCES], - .maxlen = sizeof(int), + .maxlen = sizeof(long), .mode = 0644, - .proc_handler = proc_dointvec_minmax, - .extra1 = SYSCTL_ZERO, + .proc_handler = proc_doulongvec_minmax, + .extra1 = &it_zero, + .extra2 = &it_int_max, }, { .procname = "max_user_watches", .data = &init_user_ns.ucount_max[UCOUNT_INOTIFY_WATCHES], - .maxlen = sizeof(int), + .maxlen = sizeof(long), .mode = 0644, - .proc_handler = proc_dointvec_minmax, - .extra1 = SYSCTL_ZERO, + .proc_handler = proc_doulongvec_minmax, + .extra1 = &it_zero, + .extra2 = &it_int_max, }, { .procname = "max_queued_events", diff --git a/kernel/ucount.c b/kernel/ucount.c index 77be3bbe3cc4..bb51849e6375 100644 --- a/kernel/ucount.c +++ b/kernel/ucount.c @@ -58,14 +58,17 @@ static struct ctl_table_root set_root = { .permissions = set_permissions, }; -#define UCOUNT_ENTRY(name) \ - { \ - .procname = name, \ - .maxlen = sizeof(int), \ - .mode = 0644, \ - .proc_handler = proc_dointvec_minmax, \ - .extra1 = SYSCTL_ZERO, \ - .extra2 = SYSCTL_INT_MAX, \ +static long ue_zero = 0; +static long ue_int_max = INT_MAX; + +#define UCOUNT_ENTRY(name) \ + { \ + .procname = name, \ + .maxlen = sizeof(long), \ + .mode = 0644, \ + .proc_handler = proc_doulongvec_minmax, \ + .extra1 = &ue_zero, \ + .extra2 = &ue_int_max, \ } static struct ctl_table user_table[] = { UCOUNT_ENTRY("max_user_namespaces"), -- 2.20.1