Re: A desktop environment[1] kernel wishlist

From: Heinrich Schuchardt
Date: Tue Nov 04 2014 - 14:55:54 EST


On 04.11.2014 10:28, Jan Kara wrote:

If inotify_add_watch() would allow to mark a complete mount (like
fanotify_mark() called with FAN_MOUNT) events for all files on this
mount could be detected. If furthermore inotify_read() would return
the complete relative path of the changed file relative to the mount
in inotify_event->name, it would be obvious what the meaning of the
event is.
There are two catches though:
1) Getting of the path itself is unreliable due to presence of other fs
changes happening in parallel to you traversing the directory tree.

2) The name you get from inotify_event->name is unreliable because by the
time you read the event, directory tree may be completely different.

These are the reasons why fanotify passes file descriptors with the
events instead of names.

Also for mountpoint wide notification your app has to be much faster
processing events so that the event queue doesn't overflow (and thus forces
you to do full rescan). fanotify deals with this by not limiting event
queue length at all but that's one of the reason why it's restricted to
CAP_SYS_ADMIN users.

This is reflected in fanotify_init already by explicitly checking CAP_SYS_ADMIN when using flag FAN_UNLIMITED_QUEUE.


So all in all I would find it better to extend fanotify to provide
directory events (that was originally planned but the support was dropped
due to technical issues),

I had a brief look at the systemd coding. They use at least:
IN_ATTRIB
IN_CLOSE_WRITE
IN_CLOSE_NOWRITE
IN_CREATE
IN_DELETE
IN_DELETE_SELF
IN_MODIFY
IN_MOVE_SELF
IN_MOVED_FROM
IN_MOVED_TO

Most of the sources of these events are passed as dentry and not as path. Bug 86781 describes that fanotify does not create events for double mounted file systems. It suggest to use the mount list of the superblock (which the dentry points to) instead of the mount indicated by a path. https://bugzilla.kernel.org/show_bug.cgi?id=86781

Using dentries would allow to minimize code changes outside the core of the notification framework. Hence this is a central design decision to take before implementing the additional fanotify events.

> solve problems with unlimited event queues,

Isn't this already solved by
group->max_events = FANOTIFY_DEFAULT_MAX_EVENTS?

> add some permission checking for passed file descriptors

This brings us back to
https://lkml.org/lkml/2014/4/19/151
(fanotify: check permissions when creating file descriptor)

and audit fanotify to
verify it's otherwise safe for regular users.

Best regards

Heinrich Schuchardt

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/