From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A81C434D90D; Tue, 6 Jan 2026 17:27:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767720444; cv=none; b=Btmm1o85M+oK/uBGVKFLLD+Z12gya/zDrpct/pIRqvcU9Xop30kwmT/g++5tMIqsKd+X6yoMMiaWRszb/LYG+10CsWXGxv8B92zD/50AnxE9tVoPiqhYmNeMMTg7y/GMCPZS1EOtM25UODcsqfahIY0gYEdXasafs0IRwyUKsec= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1767720444; c=relaxed/simple; bh=UtCguZOWEgvjf7aa3jP0YzUKx1DVlIDoZTbkrhIGfa8=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=g0pHqeraGYoATyijfF/fWmX1wohHjpzo3l7UcyoSXmk5jU0o7BlDNLBIgL2wVbs+fkT+c2g517Xirewjfh6XbTjAqE2/5N8Z3NHsChB4vtAyofoCQwPKZgke+F8zjiPzc35Z5dy2mi6xlF5I+GZ3Q5ppqioctWyHWekGtzKlQ80= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=Q3DvuTaz; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="Q3DvuTaz" Received: by smtp.kernel.org (Postfix) with ESMTPSA id BD2CAC116C6; Tue, 6 Jan 2026 17:27:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1767720444; bh=UtCguZOWEgvjf7aa3jP0YzUKx1DVlIDoZTbkrhIGfa8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Q3DvuTaze5PK2V763yBumMeAmim6QIvXrn5UC1yXPonlpo3+qJQXiW9KvZyfMNHnr 3nWSQwMNJfpBSl3mALlbpHupayr7EY66syxkBkirbUqmkZvNsi7JpZME2df1MJR4Ra 0YW7nf2/wjQWp5FYERpQy4mtA3a1ScXzSbXB6z4M= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Sudheendra Raghav Neela , Amir Goldstein , Jan Kara Subject: [PATCH 6.12 237/567] fsnotify: do not generate ACCESS/MODIFY events on child for special files Date: Tue, 6 Jan 2026 18:00:19 +0100 Message-ID: <20260106170500.086168241@linuxfoundation.org> X-Mailer: git-send-email 2.52.0 In-Reply-To: <20260106170451.332875001@linuxfoundation.org> References: <20260106170451.332875001@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.12-stable review patch. If anyone has any objections, please let me know. ------------------ From: Amir Goldstein commit 635bc4def026a24e071436f4f356ea08c0eed6ff upstream. inotify/fanotify do not allow users with no read access to a file to subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the same user to subscribe for watching events on children when the user has access to the parent directory (e.g. /dev). Users with no read access to a file but with read access to its parent directory can still stat the file and see if it was accessed/modified via atime/mtime change. The same is not true for special files (e.g. /dev/null). Users will not generally observe atime/mtime changes when other users read/write to special files, only when someone sets atime/mtime via utimensat(). Align fsnotify events with this stat behavior and do not generate ACCESS/MODIFY events to parent watchers on read/write of special files. The events are still generated to parent watchers on utimensat(). This closes some side-channels that could be possibly used for information exfiltration [1]. [1] https://snee.la/pdf/pubs/file-notification-attacks.pdf Reported-by: Sudheendra Raghav Neela CC: stable@vger.kernel.org Signed-off-by: Amir Goldstein Signed-off-by: Jan Kara Signed-off-by: Greg Kroah-Hartman --- fs/notify/fsnotify.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) --- a/fs/notify/fsnotify.c +++ b/fs/notify/fsnotify.c @@ -247,8 +247,15 @@ int __fsnotify_parent(struct dentry *den /* * Include parent/name in notification either if some notification * groups require parent info or the parent is interested in this event. + * The parent interest in ACCESS/MODIFY events does not apply to special + * files, where read/write are not on the filesystem of the parent and + * events can provide an undesirable side-channel for information + * exfiltration. */ - parent_interested = mask & p_mask & ALL_FSNOTIFY_EVENTS; + parent_interested = mask & p_mask & ALL_FSNOTIFY_EVENTS && + !(data_type == FSNOTIFY_EVENT_PATH && + d_is_special(dentry) && + (mask & (FS_ACCESS | FS_MODIFY))); if (parent_needed || parent_interested) { /* When notifying parent, child should be passed as data */ WARN_ON_ONCE(inode != fsnotify_data_inode(data, data_type));