From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com ([209.132.183.28]:40990 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751829AbbIIXQo (ORCPT ); Wed, 9 Sep 2015 19:16:44 -0400 Message-ID: <1441840602.27892.99.camel@redhat.com> Subject: Re: [PATCH] inotify: actually check for invalid bits in sys_inotify_add_watch() From: Eric Paris To: Dave Hansen Cc: john@johnmccutchan.com, rlove@rlove.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org, akpm@linux-foundation.org Date: Wed, 09 Sep 2015 18:16:42 -0500 In-Reply-To: <55F0ABDB.7040509@sr71.net> References: <20150630173603.D986EDB7@viggo.jf.intel.com> <55F0ABDB.7040509@sr71.net> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: stable-owner@vger.kernel.org List-ID: Looks fine to me. And usually akpm picks them up these days. On Wed, 2015-09-09 at 14:59 -0700, Dave Hansen wrote: > On 06/30/2015 10:36 AM, Dave Hansen wrote: > > From: Dave Hansen > > > > The comment here says that it is checking for invalid bits. But, > > the mask is *actually* checking to ensure that _any_ valid bit > > is set, which is quite different. > > > > Add the actual check which was intended. Retain the existing > > check because it actually does something useful: ensure that some > > inotify bits are being added to the watch. Plus, this is > > existing behavior which would be nice to preserve. > > > > I did a quick sniff test that inotify functions and that my > > 'inotify-tools' package passes 'make check'. > > Did anybody have any comments on this patch? Who picks up inotify > patches? > > > b/fs/notify/inotify/inotify_user.c | 3 +++ > > 1 file changed, 3 insertions(+) > > > > diff -puN fs/notify/inotify/inotify_user.c~inotify-EINVAL-on > > -invalid-bit fs/notify/inotify/inotify_user.c > > --- a/fs/notify/inotify/inotify_user.c~inotify-EINVAL-on-invalid > > -bit 2015-06-26 13:33:30.277219285 -0700 > > +++ b/fs/notify/inotify/inotify_user.c 2015-06-26 > > 13:35:19.026122033 -0700 > > @@ -707,6 +707,9 @@ SYSCALL_DEFINE3(inotify_add_watch, int, > > unsigned flags = 0; > > > > /* don't allow invalid bits: we don't want flags set */ > > + if (unlikely(mask & ~ALL_INOTIFY_BITS)) > > + return -EINVAL; > > + /* require at least one valid bit set in the mask */ > > if (unlikely(!(mask & ALL_INOTIFY_BITS))) > > return -EINVAL; > > > > _ > > >