From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from aserp2130.oracle.com ([141.146.126.79]:35380 "EHLO aserp2130.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726015AbfE2TQP (ORCPT ); Wed, 29 May 2019 15:16:15 -0400 Date: Wed, 29 May 2019 12:13:59 -0700 From: "Darrick J. Wong" Subject: Re: [PATCH v3 07/13] xfs: use file_modified() helper Message-ID: <20190529191359.GI5231@magnolia> References: <20190529174318.22424-1-amir73il@gmail.com> <20190529174318.22424-8-amir73il@gmail.com> <20190529183149.GG5231@magnolia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-xfs-owner@vger.kernel.org List-ID: List-Id: xfs To: Amir Goldstein Cc: Dave Chinner , Christoph Hellwig , linux-xfs , Olga Kornievskaia , Luis Henriques , Al Viro , linux-fsdevel , linux-api@vger.kernel.org, ceph-devel@vger.kernel.org, Linux NFS Mailing List , CIFS On Wed, May 29, 2019 at 10:10:37PM +0300, Amir Goldstein wrote: > On Wed, May 29, 2019 at 9:31 PM Darrick J. Wong wrote: > > > > On Wed, May 29, 2019 at 08:43:11PM +0300, Amir Goldstein wrote: > > > Note that by using the helper, the order of calling file_remove_privs() > > > after file_update_mtime() in xfs_file_aio_write_checks() has changed. > > > > > > Signed-off-by: Amir Goldstein > > > --- > > > fs/xfs/xfs_file.c | 15 +-------------- > > > 1 file changed, 1 insertion(+), 14 deletions(-) > > > > > > diff --git a/fs/xfs/xfs_file.c b/fs/xfs/xfs_file.c > > > index 76748255f843..916a35cae5e9 100644 > > > --- a/fs/xfs/xfs_file.c > > > +++ b/fs/xfs/xfs_file.c > > > @@ -367,20 +367,7 @@ xfs_file_aio_write_checks( > > > * lock above. Eventually we should look into a way to avoid > > > * the pointless lock roundtrip. > > > */ > > > - if (likely(!(file->f_mode & FMODE_NOCMTIME))) { > > > > ...especially since here we think NOCMTIME is likely /not/ to be set. > > > > > - error = file_update_time(file); > > > - if (error) > > > - return error; > > > - } > > > - > > > - /* > > > - * If we're writing the file then make sure to clear the setuid and > > > - * setgid bits if the process is not being run by root. This keeps > > > - * people from modifying setuid and setgid binaries. > > > - */ > > > - if (!IS_NOSEC(inode)) > > > - return file_remove_privs(file); > > > > Hm, file_modified doesn't have the !IS_NOSEC check guarding > > file_remove_privs, are you sure it's ok to remove the suid bits > > unconditionally? Even if SB_NOSEC (and therefore S_NOSEC) are set? > > > > file_remove_privs() has its own IS_NOSEC() check. Ah, ok, Reviewed-by: Darrick J. Wong --D > Thanks, > Amir.