Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3921191pxv; Mon, 28 Jun 2021 16:43:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx7+kiO9uiLX3EpPhVHd2kPxMGlqNW1sCehd5EYMdtKPTJzRiRD3QyWxWYhQXkzzaSIKtCs X-Received: by 2002:aa7:c043:: with SMTP id k3mr35735870edo.160.1624923818076; Mon, 28 Jun 2021 16:43:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624923818; cv=none; d=google.com; s=arc-20160816; b=0XPUSNW6pauvO2xrXJXQ47KXPdK419llLuRmh4rWYF01P7WG4hDSY5woDRyseGQbpC 1KW6XBO0apEfWsjC/JjjnHNzVwRSEUkDPF9JDws/kxHy8xE8LnOGrkRVxgeoeUldZ5ti VXe8p7WGwD8l2rg+RSmhVI+T+iZOveH7msNMYSJPoA+ZsMtUIhYxsBkhOdE4q0JPYQui vK8MV6Gw/Tw2XiGUhlwZK/vbn8Dnc2q5IziUmVzHg8Cgr18s+hVcNPXj3IkQNqrXCNLF ITT1srsTtG+DchykZFmQPRCLSaCOouNVgS79BiNOfxA3y8yDOJzUCn2JoaONYI68Imnz rO9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=uFGojLro2S6zmHilKiDR6iZiCZt8ULH5o4uOpSvCxIw=; b=T0uA5Z5KeBR9FnG0O543UsAzfk0mTyJFTnmMez6cuEOtjBWliaWJe8d1ArkLWDqkmZ sqQ7BM4HztuUyIj1CVuBT2x/SZZ9pp/bXTmJV6RE6usSxQ2EIh25Qdv2d/+DmYCUqoj7 h+Pl9qNGxiwotrAb/DBkjjbd5pxbxRvJk2WTyNbyLX5lwfaLkAgb4UhmuqF/JWCNWJCG tcU+QStkBef9wutoSUToHdpAKcM+jVgO2zMrx9RvzFwxL2TdqUDHnVmqTeNeGhtwVbjv gXtuAm5uN1wuI8mtsiY49uXDeZZVStEEAWIyKcrQZFBDgrU/WbnDTRrGpY2CTeuAHBaw epxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ht7si2650862ejc.481.2021.06.28.16.43.13; Mon, 28 Jun 2021 16:43:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234264AbhF1Wge (ORCPT + 99 others); Mon, 28 Jun 2021 18:36:34 -0400 Received: from mail105.syd.optusnet.com.au ([211.29.132.249]:54729 "EHLO mail105.syd.optusnet.com.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233442AbhF1Wgd (ORCPT ); Mon, 28 Jun 2021 18:36:33 -0400 Received: from dread.disaster.area (pa49-179-138-183.pa.nsw.optusnet.com.au [49.179.138.183]) by mail105.syd.optusnet.com.au (Postfix) with ESMTPS id 74A7F1044A55; Tue, 29 Jun 2021 08:34:04 +1000 (AEST) Received: from dave by dread.disaster.area with local (Exim 4.92.3) (envelope-from ) id 1lxzpL-000XQU-FI; Tue, 29 Jun 2021 08:34:03 +1000 Date: Tue, 29 Jun 2021 08:34:03 +1000 From: Dave Chinner To: Wang Shilong Cc: linux-fsdevel@vger.kernel.org, linux-xfs@vger.kernel.org, linux-ext4@vger.kernel.org, linux-f2fs-devel@lists.sourceforge.net Subject: Re: [PATCH v2] fs: forbid invalid project ID Message-ID: <20210628223403.GE664593@dread.disaster.area> References: <20210628123801.3511-1-wangshilong1991@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210628123801.3511-1-wangshilong1991@gmail.com> X-Optus-CM-Score: 0 X-Optus-CM-Analysis: v=2.3 cv=YKPhNiOx c=1 sm=1 tr=0 a=MnllW2CieawZLw/OcHE/Ng==:117 a=MnllW2CieawZLw/OcHE/Ng==:17 a=kj9zAlcOel0A:10 a=r6YtysWOX24A:10 a=lB0dNpNiAAAA:8 a=7-415B0cAAAA:8 a=7euumQaoeVMSjSfkz0cA:9 a=CjuIK1q_8ugA:10 a=c-ZiYqmG3AbHTdtsH08C:22 a=biEYGPWJfzWAr4FL6Ov7:22 Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Mon, Jun 28, 2021 at 08:38:01AM -0400, Wang Shilong wrote: > fileattr_set_prepare() should check if project ID > is valid, otherwise dqget() will return NULL for > such project ID quota. > > Signed-off-by: Wang Shilong > --- > v1->v2: try to fix in the VFS > --- > fs/ioctl.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/fs/ioctl.c b/fs/ioctl.c > index 1e2204fa9963..5db5b218637b 100644 > --- a/fs/ioctl.c > +++ b/fs/ioctl.c > @@ -845,6 +845,9 @@ static int fileattr_set_prepare(struct inode *inode, > if (fa->fsx_cowextsize == 0) > fa->fsx_xflags &= ~FS_XFLAG_COWEXTSIZE; > > + if (!projid_valid(KPROJIDT_INIT(fa->fsx_projid))) > + return -EINVAL; This needs to go further up in this function in the section where project IDs passed into this function are validated. Projids are only allowed to be changed when current_user_ns() == &init_user_ns, so this needs to be associated with that verification context. This check should also use make_kprojid(), please, not open code KPROJIDT_INIT. Cheers, Dave. -- Dave Chinner david@fromorbit.com