Received: by 10.192.165.148 with SMTP id m20csp2522408imm; Sun, 22 Apr 2018 08:47:22 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/rlvyfACn1H0Cv1lSpnBtq9ItXDtdVVoVz8ozs1WP2Dwh3DeWYeg4O4Jrjwu9gHSvHpqQL X-Received: by 2002:a17:902:848e:: with SMTP id c14-v6mr17472758plo.95.1524412042349; Sun, 22 Apr 2018 08:47:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524412042; cv=none; d=google.com; s=arc-20160816; b=QgmaUB4mT9Mz5+auapQ06KWRC5PZW2jSSgOj7rcgk3yuzKL2dDFvYVGmKecfKwrsX/ iJWmCwU8aFAo/Tlx9nl0BtpcUSDoz6mS5wfjv/HviiToPrgWv1M71eNUq+tCwajqGB0y B+xr59hCWm9zMkd+Ck9ZKBpBu3zSnhVxUMSE2XlquEYcLUwuhAuiA0Ie2+/ak122WLMW stk73X/DBJwZLUCRZ4XiFW+J4sNj8xwl37AIndiHHGc3l1yP0DqSO74MqOVeMU6PJsRn dm5nChsJghiixIJ17LND1QDAFXpxPErNN6T4BZ1oc3O2KjaOZGdMNiOsRGgWCZrSE943 LTTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=9z0Fb46gAYhk4lq7HLnCyIT1qGAEILVQP2frDk/noIg=; b=KJmJMVtn133xdM57X6hgd+geUUe9QbxQP79tqpjTZ+Ao98n+RIpUcdZDSCjGR436bE xefk0nePZcBa9M2JkGt00gyrTaIEVQ2zZd92BpYFTDhOSK00bWLmPf8/ppaVH1Uwyr4k CvkKvYiiQk3ULQTlASrvww7L9aSUpk94c/1eK9pj+OAKPPG1DtVLycdbxMmW+6DXX1PN g2vuClcYITp9W5Oz9Aql0DIGheqWDBjKDFflQu8llNWSJKECIdQhpwIBEsPCSrNvznwi BqWa8e0MUO56ZKpD0/Hfn0PB/O0ghKAXlpqnhPanRWDc9TShTFJ+rWQ7Xw0KsVWlswxZ g3mg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h23-v6si9673326plr.576.2018.04.22.08.47.08; Sun, 22 Apr 2018 08:47:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754896AbeDVOCl (ORCPT + 99 others); Sun, 22 Apr 2018 10:02:41 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:48604 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754865AbeDVOCb (ORCPT ); Sun, 22 Apr 2018 10:02:31 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 7A1689C; Sun, 22 Apr 2018 14:02:30 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Amir Goldstein , Jan Kara Subject: [PATCH 4.16 181/196] fanotify: fix logic of events on child Date: Sun, 22 Apr 2018 15:53:21 +0200 Message-Id: <20180422135113.619785651@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180422135104.278511750@linuxfoundation.org> References: <20180422135104.278511750@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Amir Goldstein commit 54a307ba8d3cd00a3902337ffaae28f436eeb1a4 upstream. When event on child inodes are sent to the parent inode mark and parent inode mark was not marked with FAN_EVENT_ON_CHILD, the event will not be delivered to the listener process. However, if the same process also has a mount mark, the event to the parent inode will be delivered regadless of the mount mark mask. This behavior is incorrect in the case where the mount mark mask does not contain the specific event type. For example, the process adds a mark on a directory with mask FAN_MODIFY (without FAN_EVENT_ON_CHILD) and a mount mark with mask FAN_CLOSE_NOWRITE (without FAN_ONDIR). A modify event on a file inside that directory (and inside that mount) should not create a FAN_MODIFY event, because neither of the marks requested to get that event on the file. Fixes: 1968f5eed54c ("fanotify: use both marks when possible") Cc: stable Signed-off-by: Amir Goldstein Signed-off-by: Jan Kara Signed-off-by: Greg Kroah-Hartman --- fs/notify/fanotify/fanotify.c | 34 +++++++++++++++------------------- 1 file changed, 15 insertions(+), 19 deletions(-) --- a/fs/notify/fanotify/fanotify.c +++ b/fs/notify/fanotify/fanotify.c @@ -92,7 +92,7 @@ static bool fanotify_should_send_event(s u32 event_mask, const void *data, int data_type) { - __u32 marks_mask, marks_ignored_mask; + __u32 marks_mask = 0, marks_ignored_mask = 0; const struct path *path = data; pr_debug("%s: inode_mark=%p vfsmnt_mark=%p mask=%x data=%p" @@ -108,24 +108,20 @@ static bool fanotify_should_send_event(s !d_can_lookup(path->dentry)) return false; - if (inode_mark && vfsmnt_mark) { - marks_mask = (vfsmnt_mark->mask | inode_mark->mask); - marks_ignored_mask = (vfsmnt_mark->ignored_mask | inode_mark->ignored_mask); - } else if (inode_mark) { - /* - * if the event is for a child and this inode doesn't care about - * events on the child, don't send it! - */ - if ((event_mask & FS_EVENT_ON_CHILD) && - !(inode_mark->mask & FS_EVENT_ON_CHILD)) - return false; - marks_mask = inode_mark->mask; - marks_ignored_mask = inode_mark->ignored_mask; - } else if (vfsmnt_mark) { - marks_mask = vfsmnt_mark->mask; - marks_ignored_mask = vfsmnt_mark->ignored_mask; - } else { - BUG(); + /* + * if the event is for a child and this inode doesn't care about + * events on the child, don't send it! + */ + if (inode_mark && + (!(event_mask & FS_EVENT_ON_CHILD) || + (inode_mark->mask & FS_EVENT_ON_CHILD))) { + marks_mask |= inode_mark->mask; + marks_ignored_mask |= inode_mark->ignored_mask; + } + + if (vfsmnt_mark) { + marks_mask |= vfsmnt_mark->mask; + marks_ignored_mask |= vfsmnt_mark->ignored_mask; } if (d_is_dir(path->dentry) &&