linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Jan Kara <jack@suse.cz>
To: linux-fsdevel@vger.kernel.org
Cc: Amir Goldstein <amir73il@gmail.com>, Jan Kara <jack@suse.cz>
Subject: Re: [PATCH v2] fanotify: Disallow permission events for proc filesystem
Date: Tue, 28 May 2019 17:54:30 +0200	[thread overview]
Message-ID: <20190528155430.GA27155@quack2.suse.cz> (raw)
In-Reply-To: <20190516115619.18926-1-jack@suse.cz>

On Thu 16-05-19 13:56:19, Jan Kara wrote:
> Proc filesystem has special locking rules for various files. Thus
> fanotify which opens files on event delivery can easily deadlock
> against another process that waits for fanotify permission event to be
> handled. Since permission events on /proc have doubtful value anyway,
> just disallow them.
> 
> Link: https://lore.kernel.org/linux-fsdevel/20190320131642.GE9485@quack2.suse.cz/
> Signed-off-by: Jan Kara <jack@suse.cz>

Amir, ping? What do you think about this version of the patch?

								Honza

> ---
>  fs/notify/fanotify/fanotify_user.c | 22 ++++++++++++++++++++++
>  fs/proc/root.c                     |  2 +-
>  include/linux/fs.h                 |  1 +
>  3 files changed, 24 insertions(+), 1 deletion(-)
> 
> Changes since v1:
> * use type flag to detect filesystems not supporting permission events
> * return -EINVAL instead of -EOPNOTSUPP for such filesystems
> 
> diff --git a/fs/notify/fanotify/fanotify_user.c b/fs/notify/fanotify/fanotify_user.c
> index a90bb19dcfa2..91006f47e420 100644
> --- a/fs/notify/fanotify/fanotify_user.c
> +++ b/fs/notify/fanotify/fanotify_user.c
> @@ -920,6 +920,22 @@ static int fanotify_test_fid(struct path *path, __kernel_fsid_t *fsid)
>  	return 0;
>  }
>  
> +static int fanotify_events_supported(struct path *path, __u64 mask)
> +{
> +	/*
> +	 * Some filesystems such as 'proc' acquire unusual locks when opening
> +	 * files. For them fanotify permission events have high chances of
> +	 * deadlocking the system - open done when reporting fanotify event
> +	 * blocks on this "unusual" lock while another process holding the lock
> +	 * waits for fanotify permission event to be answered. Just disallow
> +	 * permission events for such filesystems.
> +	 */
> +	if (mask & FANOTIFY_PERM_EVENTS &&
> +	    path->mnt->mnt_sb->s_type->fs_flags & FS_DISALLOW_NOTIFY_PERM)
> +		return -EINVAL;
> +	return 0;
> +}
> +
>  static int do_fanotify_mark(int fanotify_fd, unsigned int flags, __u64 mask,
>  			    int dfd, const char  __user *pathname)
>  {
> @@ -1018,6 +1034,12 @@ static int do_fanotify_mark(int fanotify_fd, unsigned int flags, __u64 mask,
>  	if (ret)
>  		goto fput_and_out;
>  
> +	if (flags & FAN_MARK_ADD) {
> +		ret = fanotify_events_supported(&path, mask);
> +		if (ret)
> +			goto path_put_and_out;
> +	}
> +
>  	if (FAN_GROUP_FLAG(group, FAN_REPORT_FID)) {
>  		ret = fanotify_test_fid(&path, &__fsid);
>  		if (ret)
> diff --git a/fs/proc/root.c b/fs/proc/root.c
> index 8b145e7b9661..522199e9525e 100644
> --- a/fs/proc/root.c
> +++ b/fs/proc/root.c
> @@ -211,7 +211,7 @@ static struct file_system_type proc_fs_type = {
>  	.init_fs_context	= proc_init_fs_context,
>  	.parameters		= &proc_fs_parameters,
>  	.kill_sb		= proc_kill_sb,
> -	.fs_flags		= FS_USERNS_MOUNT,
> +	.fs_flags		= FS_USERNS_MOUNT | FS_DISALLOW_NOTIFY_PERM,
>  };
>  
>  void __init proc_root_init(void)
> diff --git a/include/linux/fs.h b/include/linux/fs.h
> index f7fdfe93e25d..c7136c98b5ba 100644
> --- a/include/linux/fs.h
> +++ b/include/linux/fs.h
> @@ -2184,6 +2184,7 @@ struct file_system_type {
>  #define FS_BINARY_MOUNTDATA	2
>  #define FS_HAS_SUBTYPE		4
>  #define FS_USERNS_MOUNT		8	/* Can be mounted by userns root */
> +#define FS_DISALLOW_NOTIFY_PERM	16	/* Disable fanotify permission events */
>  #define FS_RENAME_DOES_D_MOVE	32768	/* FS will handle d_move() during rename() internally. */
>  	int (*init_fs_context)(struct fs_context *);
>  	const struct fs_parameter_description *parameters;
> -- 
> 2.16.4
> 
-- 
Jan Kara <jack@suse.com>
SUSE Labs, CR

  reply	other threads:[~2019-05-28 15:54 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-05-16 11:56 [PATCH v2] fanotify: Disallow permission events for proc filesystem Jan Kara
2019-05-28 15:54 ` Jan Kara [this message]
2019-05-28 16:02   ` Amir Goldstein
2019-05-28 16:08     ` Jan Kara

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20190528155430.GA27155@quack2.suse.cz \
    --to=jack@suse.cz \
    --cc=amir73il@gmail.com \
    --cc=linux-fsdevel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).