From: Jan Kara <jack@suse.cz>
To: linux-fsdevel@vger.kernel.org
Cc: Amir Goldstein <amir73il@gmail.com>, Jan Kara <jack@suse.cz>
Subject: Re: [PATCH v2] fanotify: Disallow permission events for proc filesystem
Date: Tue, 28 May 2019 17:54:30 +0200 [thread overview]
Message-ID: <20190528155430.GA27155@quack2.suse.cz> (raw)
In-Reply-To: <20190516115619.18926-1-jack@suse.cz>
On Thu 16-05-19 13:56:19, Jan Kara wrote:
> Proc filesystem has special locking rules for various files. Thus
> fanotify which opens files on event delivery can easily deadlock
> against another process that waits for fanotify permission event to be
> handled. Since permission events on /proc have doubtful value anyway,
> just disallow them.
>
> Link: https://lore.kernel.org/linux-fsdevel/20190320131642.GE9485@quack2.suse.cz/
> Signed-off-by: Jan Kara <jack@suse.cz>
Amir, ping? What do you think about this version of the patch?
Honza
> ---
> fs/notify/fanotify/fanotify_user.c | 22 ++++++++++++++++++++++
> fs/proc/root.c | 2 +-
> include/linux/fs.h | 1 +
> 3 files changed, 24 insertions(+), 1 deletion(-)
>
> Changes since v1:
> * use type flag to detect filesystems not supporting permission events
> * return -EINVAL instead of -EOPNOTSUPP for such filesystems
>
> diff --git a/fs/notify/fanotify/fanotify_user.c b/fs/notify/fanotify/fanotify_user.c
> index a90bb19dcfa2..91006f47e420 100644
> --- a/fs/notify/fanotify/fanotify_user.c
> +++ b/fs/notify/fanotify/fanotify_user.c
> @@ -920,6 +920,22 @@ static int fanotify_test_fid(struct path *path, __kernel_fsid_t *fsid)
> return 0;
> }
>
> +static int fanotify_events_supported(struct path *path, __u64 mask)
> +{
> + /*
> + * Some filesystems such as 'proc' acquire unusual locks when opening
> + * files. For them fanotify permission events have high chances of
> + * deadlocking the system - open done when reporting fanotify event
> + * blocks on this "unusual" lock while another process holding the lock
> + * waits for fanotify permission event to be answered. Just disallow
> + * permission events for such filesystems.
> + */
> + if (mask & FANOTIFY_PERM_EVENTS &&
> + path->mnt->mnt_sb->s_type->fs_flags & FS_DISALLOW_NOTIFY_PERM)
> + return -EINVAL;
> + return 0;
> +}
> +
> static int do_fanotify_mark(int fanotify_fd, unsigned int flags, __u64 mask,
> int dfd, const char __user *pathname)
> {
> @@ -1018,6 +1034,12 @@ static int do_fanotify_mark(int fanotify_fd, unsigned int flags, __u64 mask,
> if (ret)
> goto fput_and_out;
>
> + if (flags & FAN_MARK_ADD) {
> + ret = fanotify_events_supported(&path, mask);
> + if (ret)
> + goto path_put_and_out;
> + }
> +
> if (FAN_GROUP_FLAG(group, FAN_REPORT_FID)) {
> ret = fanotify_test_fid(&path, &__fsid);
> if (ret)
> diff --git a/fs/proc/root.c b/fs/proc/root.c
> index 8b145e7b9661..522199e9525e 100644
> --- a/fs/proc/root.c
> +++ b/fs/proc/root.c
> @@ -211,7 +211,7 @@ static struct file_system_type proc_fs_type = {
> .init_fs_context = proc_init_fs_context,
> .parameters = &proc_fs_parameters,
> .kill_sb = proc_kill_sb,
> - .fs_flags = FS_USERNS_MOUNT,
> + .fs_flags = FS_USERNS_MOUNT | FS_DISALLOW_NOTIFY_PERM,
> };
>
> void __init proc_root_init(void)
> diff --git a/include/linux/fs.h b/include/linux/fs.h
> index f7fdfe93e25d..c7136c98b5ba 100644
> --- a/include/linux/fs.h
> +++ b/include/linux/fs.h
> @@ -2184,6 +2184,7 @@ struct file_system_type {
> #define FS_BINARY_MOUNTDATA 2
> #define FS_HAS_SUBTYPE 4
> #define FS_USERNS_MOUNT 8 /* Can be mounted by userns root */
> +#define FS_DISALLOW_NOTIFY_PERM 16 /* Disable fanotify permission events */
> #define FS_RENAME_DOES_D_MOVE 32768 /* FS will handle d_move() during rename() internally. */
> int (*init_fs_context)(struct fs_context *);
> const struct fs_parameter_description *parameters;
> --
> 2.16.4
>
--
Jan Kara <jack@suse.com>
SUSE Labs, CR
next prev parent reply other threads:[~2019-05-28 15:54 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-05-16 11:56 [PATCH v2] fanotify: Disallow permission events for proc filesystem Jan Kara
2019-05-28 15:54 ` Jan Kara [this message]
2019-05-28 16:02 ` Amir Goldstein
2019-05-28 16:08 ` Jan Kara
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190528155430.GA27155@quack2.suse.cz \
--to=jack@suse.cz \
--cc=amir73il@gmail.com \
--cc=linux-fsdevel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).