Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp1525340rwd; Wed, 31 May 2023 15:29:32 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5Q+MqApFG4nOhgPGKtmqxYD9xEmHWmJhM9q244/yPlz0wd/5UYJIsx8gMCG85rWz5M+4c3 X-Received: by 2002:a05:6358:280e:b0:123:33e3:cec6 with SMTP id k14-20020a056358280e00b0012333e3cec6mr4557812rwb.17.1685572172063; Wed, 31 May 2023 15:29:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685572172; cv=none; d=google.com; s=arc-20160816; b=p7x0iEzggKMqo7yqfQlmgWwOlS2WeAGptrBw5K3BBdTUKOSXnDE5V6PDhquqZ4061j FGy7QOp+hMcVilGefY4pFwgnnDGHmgPdVFj2gie1TxrqlHsUDlsdqXMUOwurCxVM/D/F v26X4Uz5XBSy4AIBDx+ih+GecvzPTBdeaM5miCeNPskZTigO6yHGD7E/MF75astRRfeT J6G1oxqwC5LzZ/steANkSIj6XY/RSDWIefGvUbXcXqs1NI5Dn1MtQWPTHAESrgrG1pMD JAiqjg1mb6TK51A2mpAdu4S777YAU2HIZgY11WF15/ZxUW+6a5lZxOq8zgJ6oNBrbywS /YSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=UTIv0VGbGIS0XYyxH4kv7iiG5HFiGn5poO4djyKsO8Q=; b=mIgNLQx51Hi/wHqroD9d9NR1MKQwmfO8JGFAuF1eIK3sgH0n6bpt+KDuCTyVpU+/Z5 DsoddCYVTgZYLSasYzrfvDTT5lO7A2JRUT5iUUPa6vl9KzPjZc4y9jOcVKue/sSERETN cTs98KAuCZABx5tRXN5ef468/Lm/tjC+LNogVyVwV5pKOwhhwt/AEJveNSQ31ZCilKJZ KzeOosBUdkNpHctTZRRWzTLLeOxn3cMF2ueTNPLr/GLoN1kioRjVWF5Ka8pqKPRXD7zk YWlXtWnFm1Yv6/BBBHe+WE7d+bQp0gOlzybUE2Q/HZkjKmQPY6YV3CLNffzgl1nGoMTQ cJpQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=sH7XXkPr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m10-20020a17090a3f8a00b002536713c7basi60086pjc.55.2023.05.31.15.29.20; Wed, 31 May 2023 15:29:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=sH7XXkPr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230361AbjEaWMb (ORCPT + 99 others); Wed, 31 May 2023 18:12:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35586 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230376AbjEaWM3 (ORCPT ); Wed, 31 May 2023 18:12:29 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8FAF3191 for ; Wed, 31 May 2023 15:11:59 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 2D38763F92 for ; Wed, 31 May 2023 22:11:49 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 52E92C433EF; Wed, 31 May 2023 22:11:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1685571108; bh=Q3O+YfTi8ZwhCNuCN0xNiOxst69PRRr66pHSmYOzp1U=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=sH7XXkPri4OLA8eYaGe6mlFtbTmTfWJRgdLV4scGrBIX/t5996wccgLGVkfiDj6H4 v+NC0hMlKUTUMgN1tnClGHtXKzsZ3fiYLCPfcFu8RcFtJ4tJ7kAiZvgdnJ0LL2lR36 IC8jOSIz/ccDKBVkwumZg7geS4XMZPWgDO15k7WE= Date: Wed, 31 May 2023 15:11:47 -0700 From: Andrew Morton To: =?ISO-8859-1?Q?Lu=EDs?= Henriques Cc: =?ISO-8859-1?Q?Lu=EDs?= Henriques via Ocfs2-devel , Mark Fasheh , Joel Becker , Joseph Qi , Heming Zhao , linux-kernel@vger.kernel.org Subject: Re: [Ocfs2-devel] [PATCH] ocfs2: check new file size on fallocate call Message-Id: <20230531151147.3d98aa2fb1d7f659bccef37b@linux-foundation.org> In-Reply-To: <20230529152645.32680-1-lhenriques@suse.de> References: <20230529152645.32680-1-lhenriques@suse.de> X-Mailer: Sylpheed 3.8.0beta1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 29 May 2023 16:26:45 +0100 Lu=EDs Henriques via Ocfs2-devel wrote: > When changing a file size with fallocate() the new size isn't being > checked. In particular, the FSIZE ulimit isn't being checked, which makes > fstest generic/228 fail. Simply adding a call to inode_newsize_ok() fixes > this issue. >=20 > ... > > --- a/fs/ocfs2/file.c > +++ b/fs/ocfs2/file.c > @@ -2100,14 +2100,20 @@ static long ocfs2_fallocate(struct file *file, in= t mode, loff_t offset, > struct ocfs2_space_resv sr; > int change_size =3D 1; > int cmd =3D OCFS2_IOC_RESVSP64; > + int ret =3D 0; > =20 > if (mode & ~(FALLOC_FL_KEEP_SIZE | FALLOC_FL_PUNCH_HOLE)) > return -EOPNOTSUPP; > if (!ocfs2_writes_unwritten_extents(osb)) > return -EOPNOTSUPP; > =20 > - if (mode & FALLOC_FL_KEEP_SIZE) > + if (mode & FALLOC_FL_KEEP_SIZE) { > change_size =3D 0; > + } else { > + ret =3D inode_newsize_ok(inode, offset + len); > + if (ret) > + return ret; > + } > =20 So userspace can exceed rlimit(RLIMIT_FSIZE). Do we think this flaw is serious enough to justify backporting the fix into earlier -stable kernels?