fanotify_user.c 28.5 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
2
#include <linux/fanotify.h>
3
#include <linux/fcntl.h>
4
#include <linux/file.h>
5
#include <linux/fs.h>
6
#include <linux/anon_inodes.h>
7
#include <linux/fsnotify_backend.h>
8
#include <linux/init.h>
E
Eric Paris 已提交
9
#include <linux/mount.h>
10
#include <linux/namei.h>
E
Eric Paris 已提交
11
#include <linux/poll.h>
12 13
#include <linux/security.h>
#include <linux/syscalls.h>
T
Tejun Heo 已提交
14
#include <linux/slab.h>
15
#include <linux/types.h>
E
Eric Paris 已提交
16
#include <linux/uaccess.h>
17
#include <linux/compat.h>
18
#include <linux/sched/signal.h>
19
#include <linux/memcontrol.h>
20 21
#include <linux/statfs.h>
#include <linux/exportfs.h>
E
Eric Paris 已提交
22 23

#include <asm/ioctls.h>
24

25
#include "../../mount.h"
26
#include "../fdinfo.h"
27
#include "fanotify.h"
28

29
#define FANOTIFY_DEFAULT_MAX_EVENTS	16384
30
#define FANOTIFY_DEFAULT_MAX_MARKS	8192
31
#define FANOTIFY_DEFAULT_MAX_LISTENERS	128
32

33 34 35 36 37 38 39 40 41 42 43 44 45
/*
 * All flags that may be specified in parameter event_f_flags of fanotify_init.
 *
 * Internal and external open flags are stored together in field f_flags of
 * struct file. Only external open flags shall be allowed in event_f_flags.
 * Internal flags like FMODE_NONOTIFY, FMODE_EXEC, FMODE_NOCMTIME shall be
 * excluded.
 */
#define	FANOTIFY_INIT_ALL_EVENT_F_BITS				( \
		O_ACCMODE	| O_APPEND	| O_NONBLOCK	| \
		__O_SYNC	| O_DSYNC	| O_CLOEXEC     | \
		O_LARGEFILE	| O_NOATIME	)

46
extern const struct fsnotify_ops fanotify_fsnotify_ops;
47

48
struct kmem_cache *fanotify_mark_cache __read_mostly;
49
struct kmem_cache *fanotify_event_cachep __read_mostly;
50
struct kmem_cache *fanotify_perm_event_cachep __read_mostly;
51

52 53 54 55 56 57 58 59 60 61 62 63
#define FANOTIFY_EVENT_ALIGN 4

static int fanotify_event_info_len(struct fanotify_event *event)
{
	if (!fanotify_event_has_fid(event))
		return 0;

	return roundup(sizeof(struct fanotify_event_info_fid) +
		       sizeof(struct file_handle) + event->fh_len,
		       FANOTIFY_EVENT_ALIGN);
}

E
Eric Paris 已提交
64 65 66
/*
 * Get an fsnotify notification event if one exists and is small
 * enough to fit in "count". Return an error pointer if the count
67 68
 * is not large enough. When permission event is dequeued, its state is
 * updated accordingly.
E
Eric Paris 已提交
69 70 71 72
 */
static struct fsnotify_event *get_one_event(struct fsnotify_group *group,
					    size_t count)
{
73
	size_t event_size = FAN_EVENT_METADATA_LEN;
74
	struct fsnotify_event *fsn_event = NULL;
E
Eric Paris 已提交
75 76 77

	pr_debug("%s: group=%p count=%zd\n", __func__, group, count);

78
	spin_lock(&group->notification_lock);
E
Eric Paris 已提交
79
	if (fsnotify_notify_queue_is_empty(group))
80
		goto out;
E
Eric Paris 已提交
81

82
	if (FAN_GROUP_FLAG(group, FAN_REPORT_FID)) {
83 84
		event_size += fanotify_event_info_len(
			FANOTIFY_E(fsnotify_peek_first_event(group)));
85 86
	}

87 88 89 90 91
	if (event_size > count) {
		fsn_event = ERR_PTR(-EINVAL);
		goto out;
	}
	fsn_event = fsnotify_remove_first_event(group);
92 93
	if (fanotify_is_perm_event(FANOTIFY_E(fsn_event)->mask))
		FANOTIFY_PE(fsn_event)->state = FAN_EVENT_REPORTED;
94 95 96
out:
	spin_unlock(&group->notification_lock);
	return fsn_event;
E
Eric Paris 已提交
97 98
}

99
static int create_fd(struct fsnotify_group *group,
100
		     struct fanotify_event *event,
101
		     struct file **file)
E
Eric Paris 已提交
102 103 104 105
{
	int client_fd;
	struct file *new_file;

106
	pr_debug("%s: group=%p event=%p\n", __func__, group, event);
E
Eric Paris 已提交
107

108
	client_fd = get_unused_fd_flags(group->fanotify_data.f_flags);
E
Eric Paris 已提交
109 110 111 112 113 114 115 116 117
	if (client_fd < 0)
		return client_fd;

	/*
	 * we need a new file handle for the userspace program so it can read even if it was
	 * originally opened O_WRONLY.
	 */
	/* it's possible this event was an overflow event.  in that case dentry and mnt
	 * are NULL;  That's fine, just don't call dentry open */
118 119
	if (event->path.dentry && event->path.mnt)
		new_file = dentry_open(&event->path,
120
				       group->fanotify_data.f_flags | FMODE_NONOTIFY,
E
Eric Paris 已提交
121 122 123 124 125 126 127 128 129 130 131 132 133 134
				       current_cred());
	else
		new_file = ERR_PTR(-EOVERFLOW);
	if (IS_ERR(new_file)) {
		/*
		 * we still send an event even if we can't open the file.  this
		 * can happen when say tasks are gone and we try to open their
		 * /proc files or we try to open a WRONLY file like in sysfs
		 * we just send the errno to userspace since there isn't much
		 * else we can do.
		 */
		put_unused_fd(client_fd);
		client_fd = PTR_ERR(new_file);
	} else {
135
		*file = new_file;
E
Eric Paris 已提交
136 137
	}

138
	return client_fd;
E
Eric Paris 已提交
139 140
}

141 142 143 144 145 146 147 148 149
/*
 * Finish processing of permission event by setting it to ANSWERED state and
 * drop group->notification_lock.
 */
static void finish_permission_event(struct fsnotify_group *group,
				    struct fanotify_perm_event *event,
				    unsigned int response)
				    __releases(&group->notification_lock)
{
150 151
	bool destroy = false;

152 153
	assert_spin_locked(&group->notification_lock);
	event->response = response;
154 155 156 157
	if (event->state == FAN_EVENT_CANCELED)
		destroy = true;
	else
		event->state = FAN_EVENT_ANSWERED;
158
	spin_unlock(&group->notification_lock);
159 160
	if (destroy)
		fsnotify_destroy_event(group, &event->fae.fse);
161 162
}

163 164 165
static int process_access_response(struct fsnotify_group *group,
				   struct fanotify_response *response_struct)
{
166
	struct fanotify_perm_event *event;
167 168
	int fd = response_struct->fd;
	int response = response_struct->response;
169 170 171 172 173

	pr_debug("%s: group=%p fd=%d response=%d\n", __func__, group,
		 fd, response);
	/*
	 * make sure the response is valid, if invalid we do nothing and either
L
Lucas De Marchi 已提交
174
	 * userspace can send a valid response or we will clean it up after the
175 176
	 * timeout
	 */
177
	switch (response & ~FAN_AUDIT) {
178 179 180 181 182 183 184 185 186 187
	case FAN_ALLOW:
	case FAN_DENY:
		break;
	default:
		return -EINVAL;
	}

	if (fd < 0)
		return -EINVAL;

188
	if ((response & FAN_AUDIT) && !FAN_GROUP_FLAG(group, FAN_ENABLE_AUDIT))
189 190
		return -EINVAL;

191 192 193 194 195
	spin_lock(&group->notification_lock);
	list_for_each_entry(event, &group->fanotify_data.access_list,
			    fae.fse.list) {
		if (event->fd != fd)
			continue;
196

197
		list_del_init(&event->fae.fse.list);
198
		finish_permission_event(group, event, response);
199 200 201 202
		wake_up(&group->fanotify_data.access_waitq);
		return 0;
	}
	spin_unlock(&group->notification_lock);
203

204
	return -ENOENT;
205 206
}

207 208 209 210
static int copy_fid_to_user(struct fanotify_event *event, char __user *buf)
{
	struct fanotify_event_info_fid info = { };
	struct file_handle handle = { };
211
	unsigned char bounce[FANOTIFY_INLINE_FH_LEN], *fh;
212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236
	size_t fh_len = event->fh_len;
	size_t len = fanotify_event_info_len(event);

	if (!len)
		return 0;

	if (WARN_ON_ONCE(len < sizeof(info) + sizeof(handle) + fh_len))
		return -EFAULT;

	/* Copy event info fid header followed by vaiable sized file handle */
	info.hdr.info_type = FAN_EVENT_INFO_TYPE_FID;
	info.hdr.len = len;
	info.fsid = event->fid.fsid;
	if (copy_to_user(buf, &info, sizeof(info)))
		return -EFAULT;

	buf += sizeof(info);
	len -= sizeof(info);
	handle.handle_type = event->fh_type;
	handle.handle_bytes = fh_len;
	if (copy_to_user(buf, &handle, sizeof(handle)))
		return -EFAULT;

	buf += sizeof(handle);
	len -= sizeof(handle);
237 238 239 240 241 242 243 244 245 246
	/*
	 * For an inline fh, copy through stack to exclude the copy from
	 * usercopy hardening protections.
	 */
	fh = fanotify_event_fh(event);
	if (fh_len <= FANOTIFY_INLINE_FH_LEN) {
		memcpy(bounce, fh, fh_len);
		fh = bounce;
	}
	if (copy_to_user(buf, fh, fh_len))
247 248 249 250 251 252 253 254 255 256 257 258
		return -EFAULT;

	/* Pad with 0's */
	buf += fh_len;
	len -= fh_len;
	WARN_ON_ONCE(len < 0 || len >= FANOTIFY_EVENT_ALIGN);
	if (len > 0 && clear_user(buf, len))
		return -EFAULT;

	return 0;
}

E
Eric Paris 已提交
259
static ssize_t copy_event_to_user(struct fsnotify_group *group,
260
				  struct fsnotify_event *fsn_event,
261
				  char __user *buf, size_t count)
E
Eric Paris 已提交
262
{
263 264 265
	struct fanotify_event_metadata metadata;
	struct fanotify_event *event;
	struct file *f = NULL;
266
	int ret, fd = FAN_NOFD;
E
Eric Paris 已提交
267

268
	pr_debug("%s: group=%p event=%p\n", __func__, group, fsn_event);
E
Eric Paris 已提交
269

270 271 272 273 274 275 276 277
	event = container_of(fsn_event, struct fanotify_event, fse);
	metadata.event_len = FAN_EVENT_METADATA_LEN;
	metadata.metadata_len = FAN_EVENT_METADATA_LEN;
	metadata.vers = FANOTIFY_METADATA_VERSION;
	metadata.reserved = 0;
	metadata.mask = event->mask & FANOTIFY_OUTGOING_EVENTS;
	metadata.pid = pid_vnr(event->pid);

278
	if (fanotify_event_has_path(event)) {
279 280 281
		fd = create_fd(group, event, &f);
		if (fd < 0)
			return fd;
282 283
	} else if (fanotify_event_has_fid(event)) {
		metadata.event_len += fanotify_event_info_len(event);
284 285
	}
	metadata.fd = fd;
286 287

	ret = -EFAULT;
288 289 290 291
	/*
	 * Sanity check copy size in case get_one_event() and
	 * fill_event_metadata() event_len sizes ever get out of sync.
	 */
292
	if (WARN_ON_ONCE(metadata.event_len > count))
293
		goto out_close_fd;
294

295
	if (copy_to_user(buf, &metadata, FAN_EVENT_METADATA_LEN))
296 297
		goto out_close_fd;

298 299
	if (fanotify_is_perm_event(event->mask))
		FANOTIFY_PE(fsn_event)->fd = fd;
E
Eric Paris 已提交
300

301
	if (fanotify_event_has_path(event)) {
302
		fd_install(fd, f);
303 304 305 306 307 308
	} else if (fanotify_event_has_fid(event)) {
		ret = copy_fid_to_user(event, buf + FAN_EVENT_METADATA_LEN);
		if (ret < 0)
			return ret;
	}

309
	return metadata.event_len;
310 311

out_close_fd:
312 313 314 315
	if (fd != FAN_NOFD) {
		put_unused_fd(fd);
		fput(f);
	}
316
	return ret;
E
Eric Paris 已提交
317 318 319
}

/* intofiy userspace file descriptor functions */
A
Al Viro 已提交
320
static __poll_t fanotify_poll(struct file *file, poll_table *wait)
E
Eric Paris 已提交
321 322
{
	struct fsnotify_group *group = file->private_data;
A
Al Viro 已提交
323
	__poll_t ret = 0;
E
Eric Paris 已提交
324 325

	poll_wait(file, &group->notification_waitq, wait);
326
	spin_lock(&group->notification_lock);
E
Eric Paris 已提交
327
	if (!fsnotify_notify_queue_is_empty(group))
328
		ret = EPOLLIN | EPOLLRDNORM;
329
	spin_unlock(&group->notification_lock);
E
Eric Paris 已提交
330 331 332 333 334 335 336 337 338 339 340

	return ret;
}

static ssize_t fanotify_read(struct file *file, char __user *buf,
			     size_t count, loff_t *pos)
{
	struct fsnotify_group *group;
	struct fsnotify_event *kevent;
	char __user *start;
	int ret;
341
	DEFINE_WAIT_FUNC(wait, woken_wake_function);
E
Eric Paris 已提交
342 343 344 345 346 347

	start = buf;
	group = file->private_data;

	pr_debug("%s: group=%p\n", __func__, group);

348
	add_wait_queue(&group->notification_waitq, &wait);
E
Eric Paris 已提交
349 350
	while (1) {
		kevent = get_one_event(group, count);
351
		if (IS_ERR(kevent)) {
E
Eric Paris 已提交
352
			ret = PTR_ERR(kevent);
353 354 355 356 357 358
			break;
		}

		if (!kevent) {
			ret = -EAGAIN;
			if (file->f_flags & O_NONBLOCK)
E
Eric Paris 已提交
359
				break;
360 361 362 363 364 365

			ret = -ERESTARTSYS;
			if (signal_pending(current))
				break;

			if (start != buf)
E
Eric Paris 已提交
366
				break;
367 368

			wait_woken(&wait, TASK_INTERRUPTIBLE, MAX_SCHEDULE_TIMEOUT);
E
Eric Paris 已提交
369 370 371
			continue;
		}

372
		ret = copy_event_to_user(group, kevent, buf, count);
373 374 375 376 377 378 379 380 381 382
		if (unlikely(ret == -EOPENSTALE)) {
			/*
			 * We cannot report events with stale fd so drop it.
			 * Setting ret to 0 will continue the event loop and
			 * do the right thing if there are no more events to
			 * read (i.e. return bytes read, -EAGAIN or wait).
			 */
			ret = 0;
		}

383 384 385 386
		/*
		 * Permission events get queued to wait for response.  Other
		 * events can be destroyed now.
		 */
387
		if (!fanotify_is_perm_event(FANOTIFY_E(kevent)->mask)) {
388
			fsnotify_destroy_event(group, kevent);
389
		} else {
390
			if (ret <= 0) {
391 392 393
				spin_lock(&group->notification_lock);
				finish_permission_event(group,
					FANOTIFY_PE(kevent), FAN_DENY);
394
				wake_up(&group->fanotify_data.access_waitq);
395 396 397 398 399
			} else {
				spin_lock(&group->notification_lock);
				list_add_tail(&kevent->list,
					&group->fanotify_data.access_list);
				spin_unlock(&group->notification_lock);
400 401
			}
		}
402 403
		if (ret < 0)
			break;
404 405
		buf += ret;
		count -= ret;
E
Eric Paris 已提交
406
	}
407
	remove_wait_queue(&group->notification_waitq, &wait);
E
Eric Paris 已提交
408 409 410 411 412 413

	if (start != buf && ret != -EFAULT)
		ret = buf - start;
	return ret;
}

414 415 416 417 418 419
static ssize_t fanotify_write(struct file *file, const char __user *buf, size_t count, loff_t *pos)
{
	struct fanotify_response response = { .fd = -1, .response = -1 };
	struct fsnotify_group *group;
	int ret;

420 421 422
	if (!IS_ENABLED(CONFIG_FANOTIFY_ACCESS_PERMISSIONS))
		return -EINVAL;

423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439
	group = file->private_data;

	if (count > sizeof(response))
		count = sizeof(response);

	pr_debug("%s: group=%p count=%zu\n", __func__, group, count);

	if (copy_from_user(&response, buf, count))
		return -EFAULT;

	ret = process_access_response(group, &response);
	if (ret < 0)
		count = ret;

	return count;
}

440 441 442
static int fanotify_release(struct inode *ignored, struct file *file)
{
	struct fsnotify_group *group = file->private_data;
443
	struct fanotify_perm_event *event;
444
	struct fsnotify_event *fsn_event;
445

446
	/*
447 448 449
	 * Stop new events from arriving in the notification queue. since
	 * userspace cannot use fanotify fd anymore, no event can enter or
	 * leave access_list by now either.
450
	 */
451
	fsnotify_group_stop_queueing(group);
452

453 454 455 456
	/*
	 * Process all permission events on access_list and notification queue
	 * and simulate reply from userspace.
	 */
457
	spin_lock(&group->notification_lock);
458 459 460
	while (!list_empty(&group->fanotify_data.access_list)) {
		event = list_first_entry(&group->fanotify_data.access_list,
				struct fanotify_perm_event, fae.fse.list);
461
		list_del_init(&event->fae.fse.list);
462 463
		finish_permission_event(group, event, FAN_ALLOW);
		spin_lock(&group->notification_lock);
464 465
	}

466
	/*
467 468 469
	 * Destroy all non-permission events. For permission events just
	 * dequeue them and set the response. They will be freed once the
	 * response is consumed and fanotify_get_response() returns.
470
	 */
471 472
	while (!fsnotify_notify_queue_is_empty(group)) {
		fsn_event = fsnotify_remove_first_event(group);
473
		if (!(FANOTIFY_E(fsn_event)->mask & FANOTIFY_PERM_EVENTS)) {
474
			spin_unlock(&group->notification_lock);
475
			fsnotify_destroy_event(group, fsn_event);
476
		} else {
477 478
			finish_permission_event(group, FANOTIFY_PE(fsn_event),
						FAN_ALLOW);
479
		}
480
		spin_lock(&group->notification_lock);
481
	}
482
	spin_unlock(&group->notification_lock);
483 484

	/* Response for all permission events it set, wakeup waiters */
485
	wake_up(&group->fanotify_data.access_waitq);
486

487
	/* matches the fanotify_init->fsnotify_alloc_group */
488
	fsnotify_destroy_group(group);
489 490 491 492

	return 0;
}

E
Eric Paris 已提交
493 494 495
static long fanotify_ioctl(struct file *file, unsigned int cmd, unsigned long arg)
{
	struct fsnotify_group *group;
496
	struct fsnotify_event *fsn_event;
E
Eric Paris 已提交
497 498 499 500 501 502 503 504 505 506
	void __user *p;
	int ret = -ENOTTY;
	size_t send_len = 0;

	group = file->private_data;

	p = (void __user *) arg;

	switch (cmd) {
	case FIONREAD:
507
		spin_lock(&group->notification_lock);
508
		list_for_each_entry(fsn_event, &group->notification_list, list)
E
Eric Paris 已提交
509
			send_len += FAN_EVENT_METADATA_LEN;
510
		spin_unlock(&group->notification_lock);
E
Eric Paris 已提交
511 512 513 514 515 516 517
		ret = put_user(send_len, (int __user *) p);
		break;
	}

	return ret;
}

518
static const struct file_operations fanotify_fops = {
519
	.show_fdinfo	= fanotify_show_fdinfo,
E
Eric Paris 已提交
520 521
	.poll		= fanotify_poll,
	.read		= fanotify_read,
522
	.write		= fanotify_write,
523 524
	.fasync		= NULL,
	.release	= fanotify_release,
E
Eric Paris 已提交
525 526
	.unlocked_ioctl	= fanotify_ioctl,
	.compat_ioctl	= fanotify_ioctl,
527
	.llseek		= noop_llseek,
528 529
};

530 531 532 533 534 535 536 537 538
static int fanotify_find_path(int dfd, const char __user *filename,
			      struct path *path, unsigned int flags)
{
	int ret;

	pr_debug("%s: dfd=%d filename=%p flags=%x\n", __func__,
		 dfd, filename, flags);

	if (filename == NULL) {
539
		struct fd f = fdget(dfd);
540 541

		ret = -EBADF;
542
		if (!f.file)
543 544 545 546
			goto out;

		ret = -ENOTDIR;
		if ((flags & FAN_MARK_ONLYDIR) &&
A
Al Viro 已提交
547
		    !(S_ISDIR(file_inode(f.file)->i_mode))) {
548
			fdput(f);
549 550 551
			goto out;
		}

552
		*path = f.file->f_path;
553
		path_get(path);
554
		fdput(f);
555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575
	} else {
		unsigned int lookup_flags = 0;

		if (!(flags & FAN_MARK_DONT_FOLLOW))
			lookup_flags |= LOOKUP_FOLLOW;
		if (flags & FAN_MARK_ONLYDIR)
			lookup_flags |= LOOKUP_DIRECTORY;

		ret = user_path_at(dfd, filename, lookup_flags, path);
		if (ret)
			goto out;
	}

	/* you can only watch an inode if you have read permissions on it */
	ret = inode_permission(path->dentry->d_inode, MAY_READ);
	if (ret)
		path_put(path);
out:
	return ret;
}

576 577
static __u32 fanotify_mark_remove_from_mask(struct fsnotify_mark *fsn_mark,
					    __u32 mask,
578 579
					    unsigned int flags,
					    int *destroy)
580
{
581
	__u32 oldmask = 0;
582 583

	spin_lock(&fsn_mark->lock);
584 585
	if (!(flags & FAN_MARK_IGNORED_MASK)) {
		oldmask = fsn_mark->mask;
586
		fsn_mark->mask &= ~mask;
587
	} else {
588
		fsn_mark->ignored_mask &= ~mask;
589
	}
590
	*destroy = !(fsn_mark->mask | fsn_mark->ignored_mask);
591 592 593 594 595
	spin_unlock(&fsn_mark->lock);

	return mask & oldmask;
}

596 597 598
static int fanotify_remove_mark(struct fsnotify_group *group,
				fsnotify_connp_t *connp, __u32 mask,
				unsigned int flags)
599 600
{
	struct fsnotify_mark *fsn_mark = NULL;
601
	__u32 removed;
602
	int destroy_mark;
603

604
	mutex_lock(&group->mark_mutex);
605
	fsn_mark = fsnotify_find_mark(connp, group);
606 607
	if (!fsn_mark) {
		mutex_unlock(&group->mark_mutex);
608
		return -ENOENT;
609
	}
610

611 612
	removed = fanotify_mark_remove_from_mask(fsn_mark, mask, flags,
						 &destroy_mark);
613 614
	if (removed & fsnotify_conn_mask(fsn_mark->connector))
		fsnotify_recalc_mask(fsn_mark->connector);
615
	if (destroy_mark)
616
		fsnotify_detach_mark(fsn_mark);
617
	mutex_unlock(&group->mark_mutex);
618 619
	if (destroy_mark)
		fsnotify_free_mark(fsn_mark);
620

621
	/* matches the fsnotify_find_mark() */
622 623 624
	fsnotify_put_mark(fsn_mark);
	return 0;
}
625

626 627 628 629 630 631 632 633
static int fanotify_remove_vfsmount_mark(struct fsnotify_group *group,
					 struct vfsmount *mnt, __u32 mask,
					 unsigned int flags)
{
	return fanotify_remove_mark(group, &real_mount(mnt)->mnt_fsnotify_marks,
				    mask, flags);
}

634 635 636 637 638 639 640
static int fanotify_remove_sb_mark(struct fsnotify_group *group,
				      struct super_block *sb, __u32 mask,
				      unsigned int flags)
{
	return fanotify_remove_mark(group, &sb->s_fsnotify_marks, mask, flags);
}

641
static int fanotify_remove_inode_mark(struct fsnotify_group *group,
642 643
				      struct inode *inode, __u32 mask,
				      unsigned int flags)
644
{
645 646
	return fanotify_remove_mark(group, &inode->i_fsnotify_marks, mask,
				    flags);
647 648
}

649 650 651
static __u32 fanotify_mark_add_to_mask(struct fsnotify_mark *fsn_mark,
				       __u32 mask,
				       unsigned int flags)
652
{
653
	__u32 oldmask = -1;
654 655

	spin_lock(&fsn_mark->lock);
656 657
	if (!(flags & FAN_MARK_IGNORED_MASK)) {
		oldmask = fsn_mark->mask;
658
		fsn_mark->mask |= mask;
659
	} else {
660
		fsn_mark->ignored_mask |= mask;
661 662
		if (flags & FAN_MARK_IGNORED_SURV_MODIFY)
			fsn_mark->flags |= FSNOTIFY_MARK_FLAG_IGNORED_SURV_MODIFY;
663
	}
664 665 666 667 668
	spin_unlock(&fsn_mark->lock);

	return mask & ~oldmask;
}

669
static struct fsnotify_mark *fanotify_add_new_mark(struct fsnotify_group *group,
670
						   fsnotify_connp_t *connp,
671 672
						   unsigned int type,
						   __kernel_fsid_t *fsid)
673 674 675 676 677 678 679 680 681 682 683
{
	struct fsnotify_mark *mark;
	int ret;

	if (atomic_read(&group->num_marks) > group->fanotify_data.max_marks)
		return ERR_PTR(-ENOSPC);

	mark = kmem_cache_alloc(fanotify_mark_cache, GFP_KERNEL);
	if (!mark)
		return ERR_PTR(-ENOMEM);

684
	fsnotify_init_mark(mark, group);
685
	ret = fsnotify_add_mark_locked(mark, connp, type, 0, fsid);
686 687 688 689 690 691 692 693 694
	if (ret) {
		fsnotify_put_mark(mark);
		return ERR_PTR(ret);
	}

	return mark;
}


695 696
static int fanotify_add_mark(struct fsnotify_group *group,
			     fsnotify_connp_t *connp, unsigned int type,
697 698
			     __u32 mask, unsigned int flags,
			     __kernel_fsid_t *fsid)
699 700
{
	struct fsnotify_mark *fsn_mark;
701
	__u32 added;
702

703
	mutex_lock(&group->mark_mutex);
704
	fsn_mark = fsnotify_find_mark(connp, group);
705
	if (!fsn_mark) {
706
		fsn_mark = fanotify_add_new_mark(group, connp, type, fsid);
707
		if (IS_ERR(fsn_mark)) {
708
			mutex_unlock(&group->mark_mutex);
709
			return PTR_ERR(fsn_mark);
710
		}
711
	}
712
	added = fanotify_mark_add_to_mask(fsn_mark, mask, flags);
713 714
	if (added & ~fsnotify_conn_mask(fsn_mark->connector))
		fsnotify_recalc_mask(fsn_mark->connector);
715
	mutex_unlock(&group->mark_mutex);
716

717
	fsnotify_put_mark(fsn_mark);
718
	return 0;
719 720
}

721 722
static int fanotify_add_vfsmount_mark(struct fsnotify_group *group,
				      struct vfsmount *mnt, __u32 mask,
723
				      unsigned int flags, __kernel_fsid_t *fsid)
724 725
{
	return fanotify_add_mark(group, &real_mount(mnt)->mnt_fsnotify_marks,
726
				 FSNOTIFY_OBJ_TYPE_VFSMOUNT, mask, flags, fsid);
727 728
}

729
static int fanotify_add_sb_mark(struct fsnotify_group *group,
730 731
				struct super_block *sb, __u32 mask,
				unsigned int flags, __kernel_fsid_t *fsid)
732 733
{
	return fanotify_add_mark(group, &sb->s_fsnotify_marks,
734
				 FSNOTIFY_OBJ_TYPE_SB, mask, flags, fsid);
735 736
}

737
static int fanotify_add_inode_mark(struct fsnotify_group *group,
738
				   struct inode *inode, __u32 mask,
739
				   unsigned int flags, __kernel_fsid_t *fsid)
740 741
{
	pr_debug("%s: group=%p inode=%p\n", __func__, group, inode);
742

743 744 745 746 747 748 749
	/*
	 * If some other task has this inode open for write we should not add
	 * an ignored mark, unless that ignored mark is supposed to survive
	 * modification changes anyway.
	 */
	if ((flags & FAN_MARK_IGNORED_MASK) &&
	    !(flags & FAN_MARK_IGNORED_SURV_MODIFY) &&
750
	    inode_is_open_for_write(inode))
751 752
		return 0;

753
	return fanotify_add_mark(group, &inode->i_fsnotify_marks,
754
				 FSNOTIFY_OBJ_TYPE_INODE, mask, flags, fsid);
755
}
756

757
/* fanotify syscalls */
758
SYSCALL_DEFINE2(fanotify_init, unsigned int, flags, unsigned int, event_f_flags)
759
{
760 761
	struct fsnotify_group *group;
	int f_flags, fd;
762
	struct user_struct *user;
763
	struct fanotify_event *oevent;
764

765 766
	pr_debug("%s: flags=%x event_f_flags=%x\n",
		 __func__, flags, event_f_flags);
767 768

	if (!capable(CAP_SYS_ADMIN))
769
		return -EPERM;
770

771
#ifdef CONFIG_AUDITSYSCALL
772
	if (flags & ~(FANOTIFY_INIT_FLAGS | FAN_ENABLE_AUDIT))
773
#else
774
	if (flags & ~FANOTIFY_INIT_FLAGS)
775
#endif
776 777
		return -EINVAL;

778 779 780 781 782 783 784 785 786 787 788 789
	if (event_f_flags & ~FANOTIFY_INIT_ALL_EVENT_F_BITS)
		return -EINVAL;

	switch (event_f_flags & O_ACCMODE) {
	case O_RDONLY:
	case O_RDWR:
	case O_WRONLY:
		break;
	default:
		return -EINVAL;
	}

790 791 792 793
	if ((flags & FAN_REPORT_FID) &&
	    (flags & FANOTIFY_CLASS_BITS) != FAN_CLASS_NOTIF)
		return -EINVAL;

794 795 796 797 798 799
	user = get_current_user();
	if (atomic_read(&user->fanotify_listeners) > FANOTIFY_DEFAULT_MAX_LISTENERS) {
		free_uid(user);
		return -EMFILE;
	}

800
	f_flags = O_RDWR | FMODE_NONOTIFY;
801 802 803 804 805 806 807
	if (flags & FAN_CLOEXEC)
		f_flags |= O_CLOEXEC;
	if (flags & FAN_NONBLOCK)
		f_flags |= O_NONBLOCK;

	/* fsnotify_alloc_group takes a ref.  Dropped in fanotify_release */
	group = fsnotify_alloc_group(&fanotify_fsnotify_ops);
808 809
	if (IS_ERR(group)) {
		free_uid(user);
810
		return PTR_ERR(group);
811
	}
812

813
	group->fanotify_data.user = user;
814
	group->fanotify_data.flags = flags;
815
	atomic_inc(&user->fanotify_listeners);
816
	group->memcg = get_mem_cgroup_from_mm(current->mm);
817

818 819
	oevent = fanotify_alloc_event(group, NULL, FS_Q_OVERFLOW, NULL,
				      FSNOTIFY_EVENT_NONE, NULL);
820 821 822 823 824 825
	if (unlikely(!oevent)) {
		fd = -ENOMEM;
		goto out_destroy_group;
	}
	group->overflow_event = &oevent->fse;

826 827
	if (force_o_largefile())
		event_f_flags |= O_LARGEFILE;
828
	group->fanotify_data.f_flags = event_f_flags;
E
Eric Paris 已提交
829 830
	init_waitqueue_head(&group->fanotify_data.access_waitq);
	INIT_LIST_HEAD(&group->fanotify_data.access_list);
831
	switch (flags & FANOTIFY_CLASS_BITS) {
832 833 834 835 836 837 838 839 840 841 842
	case FAN_CLASS_NOTIF:
		group->priority = FS_PRIO_0;
		break;
	case FAN_CLASS_CONTENT:
		group->priority = FS_PRIO_1;
		break;
	case FAN_CLASS_PRE_CONTENT:
		group->priority = FS_PRIO_2;
		break;
	default:
		fd = -EINVAL;
843
		goto out_destroy_group;
844
	}
E
Eric Paris 已提交
845

846 847 848
	if (flags & FAN_UNLIMITED_QUEUE) {
		fd = -EPERM;
		if (!capable(CAP_SYS_ADMIN))
849
			goto out_destroy_group;
850 851 852 853
		group->max_events = UINT_MAX;
	} else {
		group->max_events = FANOTIFY_DEFAULT_MAX_EVENTS;
	}
854

855 856 857
	if (flags & FAN_UNLIMITED_MARKS) {
		fd = -EPERM;
		if (!capable(CAP_SYS_ADMIN))
858
			goto out_destroy_group;
859 860 861 862
		group->fanotify_data.max_marks = UINT_MAX;
	} else {
		group->fanotify_data.max_marks = FANOTIFY_DEFAULT_MAX_MARKS;
	}
863

864 865 866 867 868 869
	if (flags & FAN_ENABLE_AUDIT) {
		fd = -EPERM;
		if (!capable(CAP_AUDIT_WRITE))
			goto out_destroy_group;
	}

870 871
	fd = anon_inode_getfd("[fanotify]", &fanotify_fops, group, f_flags);
	if (fd < 0)
872
		goto out_destroy_group;
873 874 875

	return fd;

876 877
out_destroy_group:
	fsnotify_destroy_group(group);
878
	return fd;
879
}
880

881
/* Check if filesystem can encode a unique fid */
882
static int fanotify_test_fid(struct path *path, __kernel_fsid_t *fsid)
883
{
884
	__kernel_fsid_t root_fsid;
885 886 887 888 889
	int err;

	/*
	 * Make sure path is not in filesystem with zero fsid (e.g. tmpfs).
	 */
890
	err = vfs_get_fsid(path->dentry, fsid);
891 892 893
	if (err)
		return err;

894
	if (!fsid->val[0] && !fsid->val[1])
895 896 897 898 899 900
		return -ENODEV;

	/*
	 * Make sure path is not inside a filesystem subvolume (e.g. btrfs)
	 * which uses a different fsid than sb root.
	 */
901
	err = vfs_get_fsid(path->dentry->d_sb->s_root, &root_fsid);
902 903 904
	if (err)
		return err;

905 906
	if (root_fsid.val[0] != fsid->val[0] ||
	    root_fsid.val[1] != fsid->val[1])
907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922
		return -EXDEV;

	/*
	 * We need to make sure that the file system supports at least
	 * encoding a file handle so user can use name_to_handle_at() to
	 * compare fid returned with event to the file handle of watched
	 * objects. However, name_to_handle_at() requires that the
	 * filesystem also supports decoding file handles.
	 */
	if (!path->dentry->d_sb->s_export_op ||
	    !path->dentry->d_sb->s_export_op->fh_to_dentry)
		return -EOPNOTSUPP;

	return 0;
}

923 924
static int do_fanotify_mark(int fanotify_fd, unsigned int flags, __u64 mask,
			    int dfd, const char  __user *pathname)
925
{
926 927
	struct inode *inode = NULL;
	struct vfsmount *mnt = NULL;
928
	struct fsnotify_group *group;
929
	struct fd f;
930
	struct path path;
931
	__kernel_fsid_t __fsid, *fsid = NULL;
932
	u32 valid_mask = FANOTIFY_EVENTS | FANOTIFY_EVENT_FLAGS;
933
	unsigned int mark_type = flags & FANOTIFY_MARK_TYPE_BITS;
934
	int ret;
935 936 937 938 939 940 941 942

	pr_debug("%s: fanotify_fd=%d flags=%x dfd=%d pathname=%p mask=%llx\n",
		 __func__, fanotify_fd, flags, dfd, pathname, mask);

	/* we only use the lower 32 bits as of right now. */
	if (mask & ((__u64)0xffffffff << 32))
		return -EINVAL;

943
	if (flags & ~FANOTIFY_MARK_FLAGS)
944
		return -EINVAL;
945 946 947 948 949 950 951 952 953 954

	switch (mark_type) {
	case FAN_MARK_INODE:
	case FAN_MARK_MOUNT:
	case FAN_MARK_FILESYSTEM:
		break;
	default:
		return -EINVAL;
	}

E
Eric Paris 已提交
955
	switch (flags & (FAN_MARK_ADD | FAN_MARK_REMOVE | FAN_MARK_FLUSH)) {
956
	case FAN_MARK_ADD:		/* fallthrough */
957
	case FAN_MARK_REMOVE:
958 959
		if (!mask)
			return -EINVAL;
960
		break;
E
Eric Paris 已提交
961
	case FAN_MARK_FLUSH:
962
		if (flags & ~(FANOTIFY_MARK_TYPE_BITS | FAN_MARK_FLUSH))
963
			return -EINVAL;
964 965 966 967
		break;
	default:
		return -EINVAL;
	}
968

969
	if (IS_ENABLED(CONFIG_FANOTIFY_ACCESS_PERMISSIONS))
970
		valid_mask |= FANOTIFY_PERM_EVENTS;
971 972

	if (mask & ~valid_mask)
973 974
		return -EINVAL;

975 976
	f = fdget(fanotify_fd);
	if (unlikely(!f.file))
977 978 979 980
		return -EBADF;

	/* verify that this is indeed an fanotify instance */
	ret = -EINVAL;
981
	if (unlikely(f.file->f_op != &fanotify_fops))
982
		goto fput_and_out;
983
	group = f.file->private_data;
984 985 986 987 988 989

	/*
	 * group->priority == FS_PRIO_0 == FAN_CLASS_NOTIF.  These are not
	 * allowed to set permissions events.
	 */
	ret = -EINVAL;
990
	if (mask & FANOTIFY_PERM_EVENTS &&
991 992
	    group->priority == FS_PRIO_0)
		goto fput_and_out;
993

994 995 996 997 998 999 1000 1001 1002 1003 1004 1005
	/*
	 * Events with data type inode do not carry enough information to report
	 * event->fd, so we do not allow setting a mask for inode events unless
	 * group supports reporting fid.
	 * inode events are not supported on a mount mark, because they do not
	 * carry enough information (i.e. path) to be filtered by mount point.
	 */
	if (mask & FANOTIFY_INODE_EVENTS &&
	    (!FAN_GROUP_FLAG(group, FAN_REPORT_FID) ||
	     mark_type == FAN_MARK_MOUNT))
		goto fput_and_out;

1006 1007
	if (flags & FAN_MARK_FLUSH) {
		ret = 0;
1008
		if (mark_type == FAN_MARK_MOUNT)
1009
			fsnotify_clear_vfsmount_marks_by_group(group);
1010 1011
		else if (mark_type == FAN_MARK_FILESYSTEM)
			fsnotify_clear_sb_marks_by_group(group);
1012 1013 1014 1015 1016
		else
			fsnotify_clear_inode_marks_by_group(group);
		goto fput_and_out;
	}

1017 1018 1019 1020
	ret = fanotify_find_path(dfd, pathname, &path, flags);
	if (ret)
		goto fput_and_out;

1021
	if (FAN_GROUP_FLAG(group, FAN_REPORT_FID)) {
1022
		ret = fanotify_test_fid(&path, &__fsid);
1023 1024
		if (ret)
			goto path_put_and_out;
1025

1026
		fsid = &__fsid;
1027 1028
	}

1029
	/* inode held in place by reference to path; group by fget on fd */
1030
	if (mark_type == FAN_MARK_INODE)
1031 1032 1033
		inode = path.dentry->d_inode;
	else
		mnt = path.mnt;
1034 1035

	/* create/update an inode mark */
1036
	switch (flags & (FAN_MARK_ADD | FAN_MARK_REMOVE)) {
1037
	case FAN_MARK_ADD:
1038
		if (mark_type == FAN_MARK_MOUNT)
1039 1040
			ret = fanotify_add_vfsmount_mark(group, mnt, mask,
							 flags, fsid);
1041
		else if (mark_type == FAN_MARK_FILESYSTEM)
1042 1043
			ret = fanotify_add_sb_mark(group, mnt->mnt_sb, mask,
						   flags, fsid);
1044
		else
1045 1046
			ret = fanotify_add_inode_mark(group, inode, mask,
						      flags, fsid);
1047 1048
		break;
	case FAN_MARK_REMOVE:
1049
		if (mark_type == FAN_MARK_MOUNT)
1050 1051
			ret = fanotify_remove_vfsmount_mark(group, mnt, mask,
							    flags);
1052
		else if (mark_type == FAN_MARK_FILESYSTEM)
1053 1054
			ret = fanotify_remove_sb_mark(group, mnt->mnt_sb, mask,
						      flags);
1055
		else
1056 1057
			ret = fanotify_remove_inode_mark(group, inode, mask,
							 flags);
1058 1059 1060 1061
		break;
	default:
		ret = -EINVAL;
	}
1062

1063
path_put_and_out:
1064 1065
	path_put(&path);
fput_and_out:
1066
	fdput(f);
1067 1068 1069
	return ret;
}

1070 1071 1072 1073 1074 1075 1076
SYSCALL_DEFINE5(fanotify_mark, int, fanotify_fd, unsigned int, flags,
			      __u64, mask, int, dfd,
			      const char  __user *, pathname)
{
	return do_fanotify_mark(fanotify_fd, flags, mask, dfd, pathname);
}

1077 1078 1079 1080 1081 1082
#ifdef CONFIG_COMPAT
COMPAT_SYSCALL_DEFINE6(fanotify_mark,
				int, fanotify_fd, unsigned int, flags,
				__u32, mask0, __u32, mask1, int, dfd,
				const char  __user *, pathname)
{
1083
	return do_fanotify_mark(fanotify_fd, flags,
1084 1085
#ifdef __BIG_ENDIAN
				((__u64)mask0 << 32) | mask1,
H
Heiko Carstens 已提交
1086 1087
#else
				((__u64)mask1 << 32) | mask0,
1088 1089 1090 1091 1092
#endif
				 dfd, pathname);
}
#endif

1093
/*
1094
 * fanotify_user_setup - Our initialization function.  Note that we cannot return
1095 1096 1097 1098 1099
 * error because we have compiled-in VFS hooks.  So an (unlikely) failure here
 * must result in panic().
 */
static int __init fanotify_user_setup(void)
{
1100
	BUILD_BUG_ON(HWEIGHT32(FANOTIFY_INIT_FLAGS) != 8);
1101 1102
	BUILD_BUG_ON(HWEIGHT32(FANOTIFY_MARK_FLAGS) != 9);

1103 1104
	fanotify_mark_cache = KMEM_CACHE(fsnotify_mark,
					 SLAB_PANIC|SLAB_ACCOUNT);
1105
	fanotify_event_cachep = KMEM_CACHE(fanotify_event, SLAB_PANIC);
1106 1107
	if (IS_ENABLED(CONFIG_FANOTIFY_ACCESS_PERMISSIONS)) {
		fanotify_perm_event_cachep =
1108
			KMEM_CACHE(fanotify_perm_event, SLAB_PANIC);
1109
	}
1110 1111

	return 0;
1112
}
1113
device_initcall(fanotify_user_setup);