• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // SPDX-License-Identifier: GPL-2.0-or-later
2 /*
3  * fs/inotify_user.c - inotify support for userspace
4  *
5  * Authors:
6  *	John McCutchan	<ttb@tentacle.dhs.org>
7  *	Robert Love	<rml@novell.com>
8  *
9  * Copyright (C) 2005 John McCutchan
10  * Copyright 2006 Hewlett-Packard Development Company, L.P.
11  *
12  * Copyright (C) 2009 Eric Paris <Red Hat Inc>
13  * inotify was largely rewriten to make use of the fsnotify infrastructure
14  */
15 
16 #include <linux/dcache.h> /* d_unlinked */
17 #include <linux/fs.h> /* struct inode */
18 #include <linux/fsnotify_backend.h>
19 #include <linux/inotify.h>
20 #include <linux/path.h> /* struct path */
21 #include <linux/slab.h> /* kmem_* */
22 #include <linux/types.h>
23 #include <linux/sched.h>
24 #include <linux/sched/user.h>
25 #include <linux/sched/mm.h>
26 
27 #include "inotify.h"
28 
29 /*
30  * Check if 2 events contain the same information.
31  */
event_compare(struct fsnotify_event * old_fsn,struct fsnotify_event * new_fsn)32 static bool event_compare(struct fsnotify_event *old_fsn,
33 			  struct fsnotify_event *new_fsn)
34 {
35 	struct inotify_event_info *old, *new;
36 
37 	old = INOTIFY_E(old_fsn);
38 	new = INOTIFY_E(new_fsn);
39 	if (old->mask & FS_IN_IGNORED)
40 		return false;
41 	if ((old->mask == new->mask) &&
42 	    (old_fsn->objectid == new_fsn->objectid) &&
43 	    (old->name_len == new->name_len) &&
44 	    (!old->name_len || !strcmp(old->name, new->name)))
45 		return true;
46 	return false;
47 }
48 
inotify_merge(struct list_head * list,struct fsnotify_event * event)49 static int inotify_merge(struct list_head *list,
50 			  struct fsnotify_event *event)
51 {
52 	struct fsnotify_event *last_event;
53 
54 	last_event = list_entry(list->prev, struct fsnotify_event, list);
55 	return event_compare(last_event, event);
56 }
57 
inotify_handle_event(struct fsnotify_group * group,struct inode * inode,u32 mask,const void * data,int data_type,const struct qstr * file_name,u32 cookie,struct fsnotify_iter_info * iter_info)58 int inotify_handle_event(struct fsnotify_group *group,
59 			 struct inode *inode,
60 			 u32 mask, const void *data, int data_type,
61 			 const struct qstr *file_name, u32 cookie,
62 			 struct fsnotify_iter_info *iter_info)
63 {
64 	struct fsnotify_mark *inode_mark = fsnotify_iter_inode_mark(iter_info);
65 	struct inotify_inode_mark *i_mark;
66 	struct inotify_event_info *event;
67 	struct fsnotify_event *fsn_event;
68 	int ret;
69 	int len = 0, wd;
70 	int alloc_len = sizeof(struct inotify_event_info);
71 
72 	if (WARN_ON(fsnotify_iter_vfsmount_mark(iter_info)))
73 		return 0;
74 
75 	if ((inode_mark->mask & FS_EXCL_UNLINK) &&
76 	    (data_type == FSNOTIFY_EVENT_PATH)) {
77 		const struct path *path = data;
78 
79 		if (d_unlinked(path->dentry))
80 			return 0;
81 	}
82 	if (file_name) {
83 		len = file_name->len;
84 		alloc_len += len + 1;
85 	}
86 
87 	pr_debug("%s: group=%p inode=%p mask=%x\n", __func__, group, inode,
88 		 mask);
89 
90 	i_mark = container_of(inode_mark, struct inotify_inode_mark,
91 			      fsn_mark);
92 
93 	/*
94 	 * We can be racing with mark being detached. Don't report event with
95 	 * invalid wd.
96 	 */
97 	wd = READ_ONCE(i_mark->wd);
98 	if (wd == -1)
99 		return 0;
100 	/*
101 	 * Whoever is interested in the event, pays for the allocation. Do not
102 	 * trigger OOM killer in the target monitoring memcg as it may have
103 	 * security repercussion.
104 	 */
105 	memalloc_use_memcg(group->memcg);
106 	event = kmalloc(alloc_len, GFP_KERNEL_ACCOUNT | __GFP_RETRY_MAYFAIL);
107 	memalloc_unuse_memcg();
108 
109 	if (unlikely(!event)) {
110 		/*
111 		 * Treat lost event due to ENOMEM the same way as queue
112 		 * overflow to let userspace know event was lost.
113 		 */
114 		fsnotify_queue_overflow(group);
115 		return -ENOMEM;
116 	}
117 
118 	/*
119 	 * We now report FS_ISDIR flag with MOVE_SELF and DELETE_SELF events
120 	 * for fanotify. inotify never reported IN_ISDIR with those events.
121 	 * It looks like an oversight, but to avoid the risk of breaking
122 	 * existing inotify programs, mask the flag out from those events.
123 	 */
124 	if (mask & (IN_MOVE_SELF | IN_DELETE_SELF))
125 		mask &= ~IN_ISDIR;
126 
127 	fsn_event = &event->fse;
128 	fsnotify_init_event(fsn_event, (unsigned long)inode);
129 	event->mask = mask;
130 	event->wd = wd;
131 	event->sync_cookie = cookie;
132 	event->name_len = len;
133 	if (len)
134 		strcpy(event->name, file_name->name);
135 
136 	ret = fsnotify_add_event(group, fsn_event, inotify_merge);
137 	if (ret) {
138 		/* Our event wasn't used in the end. Free it. */
139 		fsnotify_destroy_event(group, fsn_event);
140 	}
141 
142 	if (inode_mark->mask & IN_ONESHOT)
143 		fsnotify_destroy_mark(inode_mark, group);
144 
145 	return 0;
146 }
147 
inotify_freeing_mark(struct fsnotify_mark * fsn_mark,struct fsnotify_group * group)148 static void inotify_freeing_mark(struct fsnotify_mark *fsn_mark, struct fsnotify_group *group)
149 {
150 	inotify_ignored_and_remove_idr(fsn_mark, group);
151 }
152 
153 /*
154  * This is NEVER supposed to be called.  Inotify marks should either have been
155  * removed from the idr when the watch was removed or in the
156  * fsnotify_destroy_mark_by_group() call when the inotify instance was being
157  * torn down.  This is only called if the idr is about to be freed but there
158  * are still marks in it.
159  */
idr_callback(int id,void * p,void * data)160 static int idr_callback(int id, void *p, void *data)
161 {
162 	struct fsnotify_mark *fsn_mark;
163 	struct inotify_inode_mark *i_mark;
164 	static bool warned = false;
165 
166 	if (warned)
167 		return 0;
168 
169 	warned = true;
170 	fsn_mark = p;
171 	i_mark = container_of(fsn_mark, struct inotify_inode_mark, fsn_mark);
172 
173 	WARN(1, "inotify closing but id=%d for fsn_mark=%p in group=%p still in "
174 		"idr.  Probably leaking memory\n", id, p, data);
175 
176 	/*
177 	 * I'm taking the liberty of assuming that the mark in question is a
178 	 * valid address and I'm dereferencing it.  This might help to figure
179 	 * out why we got here and the panic is no worse than the original
180 	 * BUG() that was here.
181 	 */
182 	if (fsn_mark)
183 		printk(KERN_WARNING "fsn_mark->group=%p wd=%d\n",
184 			fsn_mark->group, i_mark->wd);
185 	return 0;
186 }
187 
inotify_free_group_priv(struct fsnotify_group * group)188 static void inotify_free_group_priv(struct fsnotify_group *group)
189 {
190 	/* ideally the idr is empty and we won't hit the BUG in the callback */
191 	idr_for_each(&group->inotify_data.idr, idr_callback, group);
192 	idr_destroy(&group->inotify_data.idr);
193 	if (group->inotify_data.ucounts)
194 		dec_inotify_instances(group->inotify_data.ucounts);
195 }
196 
inotify_free_event(struct fsnotify_event * fsn_event)197 static void inotify_free_event(struct fsnotify_event *fsn_event)
198 {
199 	kfree(INOTIFY_E(fsn_event));
200 }
201 
202 /* ding dong the mark is dead */
inotify_free_mark(struct fsnotify_mark * fsn_mark)203 static void inotify_free_mark(struct fsnotify_mark *fsn_mark)
204 {
205 	struct inotify_inode_mark *i_mark;
206 
207 	i_mark = container_of(fsn_mark, struct inotify_inode_mark, fsn_mark);
208 
209 	kmem_cache_free(inotify_inode_mark_cachep, i_mark);
210 }
211 
212 const struct fsnotify_ops inotify_fsnotify_ops = {
213 	.handle_event = inotify_handle_event,
214 	.free_group_priv = inotify_free_group_priv,
215 	.free_event = inotify_free_event,
216 	.freeing_mark = inotify_freeing_mark,
217 	.free_mark = inotify_free_mark,
218 };
219