From nobody Sun Apr 19 11:01:34 2026 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 55725314D1D for ; Mon, 16 Feb 2026 15:06:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771254395; cv=none; b=PU3rMvr65U3qjry4qTd5JGPtNH3aKkLw7J8xkyVl7vFMmQsnzz3Fq1k3Po5E8ir98mED/bQeqWiJ2AH+wQdGPz8FbplpUc1LjgDK/NbPTR5c1v/lDz1BUBgZCcKteHqOrF5XizkkH13FNccENp3xxwhd4kEzxz6WVpie0uj+9Ck= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771254395; c=relaxed/simple; bh=ku1dmf4toeaGtX7VBobBNgDz1QSiC/bGi9Lw8fcbevM=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=njl1htRQ8q3ViCYJ6ZuoopvOABBb1EyPaDo4ptrv5Cg7TAvMHHO7q+2dHeNRjV6clvl8GPgNQVS97wqTNFkaP6FjmW38DXeyYL43hsg0aMRfaIp/Q+QdXm5/nb0lBHuRiQnap1nmYkeqD2a2adhogQowgau7YOAW2Bn0j9yoObU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=L4/OYM8u; dkim=pass (2048-bit key) header.d=redhat.com header.i=@redhat.com header.b=rn7DRheX; arc=none smtp.client-ip=170.10.133.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="L4/OYM8u"; dkim=pass (2048-bit key) header.d=redhat.com header.i=@redhat.com header.b="rn7DRheX" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1771254393; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=iHwTYo0eyOVUxW79e4wmbJ3vj33NqFZ0GmFxn5mLB1o=; b=L4/OYM8urn2QSXNxTIaZKJFxYJBmkMoB7Hf9wg455waOb6XrnbhkjnJdET7y+8LsRy3icA xuWJjSoN3svj25mwIxSdzUv27JtfYkjFR/ORbxCfZLZwtgg5fqOYjfOZ1dEuWp2w9bEhQP 6WZv6QKNcUZQk3vx8ARXOGpvQb0bNw4= Received: from mail-wr1-f69.google.com (mail-wr1-f69.google.com [209.85.221.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-272-OA1nIECKNeGO_FPNRW1njA-1; Mon, 16 Feb 2026 10:06:32 -0500 X-MC-Unique: OA1nIECKNeGO_FPNRW1njA-1 X-Mimecast-MFC-AGG-ID: OA1nIECKNeGO_FPNRW1njA_1771254391 Received: by mail-wr1-f69.google.com with SMTP id ffacd0b85a97d-437681ecd32so2751350f8f.1 for ; Mon, 16 Feb 2026 07:06:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=google; t=1771254390; x=1771859190; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=iHwTYo0eyOVUxW79e4wmbJ3vj33NqFZ0GmFxn5mLB1o=; b=rn7DRheXDTjheiqdd6YBnXlDjTn2snEwg44RmwxopDmHPZG0CmzKz8bHlbEIqb44HY cM17ZVgg8b0fKfaCqCEqU1YazVBAJIFL8b8g1r+1F6n2v9oJy/TIkCtF08Dk0RNpi3gP 6UaT4u5m1ViX+WqyY4OwHCqesim+QpNBTiYXySJLQIXbL/2X7i7CN5fRQoeXJDZ5m6Dz 7ZEDzzELLo7B5QW23UbPhN2u+EEZlZ1xVWrFqrAtEGNDbYJoqhVxZTMZGjikp/x/aMdb 1Au42kraHRcck9jgnHy1qKZg63+xzCIvGI0pHVvYzfRyb7T45s8atcmNVBxbFokWJeXp U+1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771254390; x=1771859190; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=iHwTYo0eyOVUxW79e4wmbJ3vj33NqFZ0GmFxn5mLB1o=; b=t13DKfOjya+pPgvg6Hk0h1jtXvTZCNrdJPQmmkHFDEuN/vZJNcMN/wc6YhTroyvn+J HnxERtgJJXLWDSMgCpt1U78Yz0pcuEETv97cevrfC3QLTh/qQyrEuWosPJhLl6hI6UQt BTkV2g6LKrApEWR4jjqkGWVp1DKCjLdiv6LSy07SHPBKaIwO+jLIMgZN1xe9uLDKt5r5 m2xq/vsaQjnAl2JXUmeMLGvvT+t7o2ZSUDCD6i9XZXHT6+kz0Gx25p79lJzOrvke3Zan xkgQrssQ5MwcKQSGSTJ1aORNS7JGBtWP4KH/+xOAa39LTzuapbOqx2Iv36F07HNsO/Cc AIPw== X-Forwarded-Encrypted: i=1; AJvYcCX9DU0qiILHe5ARCW9Ww1qdgTf3QorclOja48e2u6R3QPgOZ8S6cGGpaiC13P0Alk/Yg3UNnHMKqubSVJs=@vger.kernel.org X-Gm-Message-State: AOJu0YzW9pSbScTcE9w9n4upeTO5KpJpmd4Nmmg8Era52NB6tW5N83j3 p/qY9aD9yYewCzmnDZnW01tjUX++MX0yX/mlmnUw9w6rg4MgM/DDxl6NlKOdPQP5uo6zuibPyVM sylRcsC6uTJvuQMD1tr2cKKKEQV8M8t+hKMztJpjWODVCg944BP5dudH5o5iQ+HIT7MHYKZ93nw == X-Gm-Gg: AZuq6aI2xmI6IJRPOigVCADvJrG/asjCL67I1Ew6ecIXccIE7PpGnLWflAhg7PBaAr/ XtT7ot5M713FQmOq/YJ8zfcso5mnOgtAEn7TgIuiyIDrZahuq6uCbgiI4lUsYO7flQV0Cyqjany VJR+bNB/WBSGnDXdOymyr/LIi5m82XUFZ70aM2SxP1pD5JUOXqjW1PRVA7mC5BlYgvBlmP4qSOI SpHRHJF7qIriqjgEpMmGQt87qO4MB7AJF76bzqaLv5YPPVWt8D86nHoWFgCCbx441gb6XHfx0Gt 1g/xsLc3ojKZajH1qa9+yfziqoLf5lRuB/qKFftVyQYWIBE1+EEY+VIr6YcSL+eCOZ9lZOjlEeh 2KuFaRTkONHfKOSFomtJUCwr+w03q5AmORKAcWpPZ4GgX2AsB X-Received: by 2002:a05:6000:2906:b0:431:369:e7b with SMTP id ffacd0b85a97d-4379db61b66mr14358249f8f.18.1771254390349; Mon, 16 Feb 2026 07:06:30 -0800 (PST) X-Received: by 2002:a05:6000:2906:b0:431:369:e7b with SMTP id ffacd0b85a97d-4379db61b66mr14358189f8f.18.1771254389851; Mon, 16 Feb 2026 07:06:29 -0800 (PST) Received: from fedora.redhat.com (109-81-17-58.rct.o2.cz. [109.81.17.58]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43796abc9b2sm25631899f8f.21.2026.02.16.07.06.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Feb 2026 07:06:29 -0800 (PST) From: Ondrej Mosnacek To: Jan Kara Cc: Amir Goldstein , Matthew Bobrowski , linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 1/2] fanotify: avoid/silence premature LSM capability checks Date: Mon, 16 Feb 2026 16:06:24 +0100 Message-ID: <20260216150625.793013-2-omosnace@redhat.com> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260216150625.793013-1-omosnace@redhat.com> References: <20260216150625.793013-1-omosnace@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Make sure calling capable()/ns_capable() actually leads to access denied when false is returned, because these functions emit an audit record when a Linux Security Module denies the capability, which makes it difficult to avoid allowing/silencing unnecessary permissions in security policies (namely with SELinux). Where the return value just used to set a flag, use the non-auditing ns_capable_noaudit() instead. Fixes: 7cea2a3c505e ("fanotify: support limited functionality for unprivile= ged users") Signed-off-by: Ondrej Mosnacek Reviewed-by: Amir Goldstein Reviewed-by: Paul Moore --- fs/notify/fanotify/fanotify_user.c | 25 +++++++++++++------------ 1 file changed, 13 insertions(+), 12 deletions(-) diff --git a/fs/notify/fanotify/fanotify_user.c b/fs/notify/fanotify/fanoti= fy_user.c index d0b9b984002fe..9c9fca2976d2b 100644 --- a/fs/notify/fanotify/fanotify_user.c +++ b/fs/notify/fanotify/fanotify_user.c @@ -1615,17 +1615,18 @@ SYSCALL_DEFINE2(fanotify_init, unsigned int, flags,= unsigned int, event_f_flags) pr_debug("%s: flags=3D%x event_f_flags=3D%x\n", __func__, flags, event_f_flags); =20 - if (!capable(CAP_SYS_ADMIN)) { - /* - * An unprivileged user can setup an fanotify group with - * limited functionality - an unprivileged group is limited to - * notification events with file handles or mount ids and it - * cannot use unlimited queue/marks. - */ - if ((flags & FANOTIFY_ADMIN_INIT_FLAGS) || - !(flags & (FANOTIFY_FID_BITS | FAN_REPORT_MNT))) - return -EPERM; + /* + * An unprivileged user can setup an fanotify group with + * limited functionality - an unprivileged group is limited to + * notification events with file handles or mount ids and it + * cannot use unlimited queue/marks. + */ + if (((flags & FANOTIFY_ADMIN_INIT_FLAGS) || + !(flags & (FANOTIFY_FID_BITS | FAN_REPORT_MNT))) && + !capable(CAP_SYS_ADMIN)) + return -EPERM; =20 + if (!ns_capable_noaudit(&init_user_ns, CAP_SYS_ADMIN)) { /* * Setting the internal flag FANOTIFY_UNPRIV on the group * prevents setting mount/filesystem marks on this group and @@ -1990,8 +1991,8 @@ static int do_fanotify_mark(int fanotify_fd, unsigned= int flags, __u64 mask, * A user is allowed to setup sb/mount/mntns marks only if it is * capable in the user ns where the group was created. */ - if (!ns_capable(group->user_ns, CAP_SYS_ADMIN) && - mark_type !=3D FAN_MARK_INODE) + if (mark_type !=3D FAN_MARK_INODE && + !ns_capable(group->user_ns, CAP_SYS_ADMIN)) return -EPERM; =20 /* --=20 2.53.0 From nobody Sun Apr 19 11:01:34 2026 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 918713161B8 for ; Mon, 16 Feb 2026 15:06:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771254396; cv=none; b=VLtfoMKleNFKwGwX1ZX2tVcp1ktoM1o8mPp479PgVqFuukbHY0WwXVy2p/AeKHRcQld0zVRf3pPJbUsjc4CpZeckm9z4KxE4dCM/gQ3L4qxaa4jBHz2r0dQX9812J7P7XPpiHKHgV0WSLNDIaA0CwGJvHY3whfAhGl4HLW2JH/M= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1771254396; c=relaxed/simple; bh=zx3WubZPys3qQZ9hjzoig3BrUfn76syHM4LUOku80x4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=L7u0Q4Ka9A4EelABPxCr2XZVRmsd+SUSJrYdaWrlhuyrEWRojUv5zmKdA/qiEa3qYP7NsQF18/WDj1uC5auvF/VgWFyvGjmj1wXIkAt8JLKNDzplItmPXtMBofddqjpkAVYDiktHWpVSwAJ036BmxsVzmFOwrKNjCuXAe9TbbME= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=cuFzr/K3; dkim=pass (2048-bit key) header.d=redhat.com header.i=@redhat.com header.b=rJo1z+9+; arc=none smtp.client-ip=170.10.133.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="cuFzr/K3"; dkim=pass (2048-bit key) header.d=redhat.com header.i=@redhat.com header.b="rJo1z+9+" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1771254394; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=aIxEocxEapJW7yU9OtfyLhPCnRBq6fT8ce1CcmY6sug=; b=cuFzr/K3/lCCNtXG9TWhKNqpWtuEBrQD8jPV3o6pv52qBZxjwahEFo/uOAaIsAFQhaqjIo NjyFGCLpVymV/0325dM3aEhd3YLHHSW7S57yKdqlLkjAPJWkfjZ2kr8NOqyh+vktnKL016 ihNfMfd7M+PkFRqeu/fgEDMPV1XYaKI= Received: from mail-wr1-f69.google.com (mail-wr1-f69.google.com [209.85.221.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-78-Ill_0x9VMamYlU9gkKKM6w-1; Mon, 16 Feb 2026 10:06:33 -0500 X-MC-Unique: Ill_0x9VMamYlU9gkKKM6w-1 X-Mimecast-MFC-AGG-ID: Ill_0x9VMamYlU9gkKKM6w_1771254392 Received: by mail-wr1-f69.google.com with SMTP id ffacd0b85a97d-437159d3ff2so3622377f8f.1 for ; Mon, 16 Feb 2026 07:06:33 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=google; t=1771254392; x=1771859192; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=aIxEocxEapJW7yU9OtfyLhPCnRBq6fT8ce1CcmY6sug=; b=rJo1z+9+eVKxNpXT8hTbok3DlMsug39L9ZmZyXs8HXxMd5/qwbco2B5rsHfcj0DZK9 l4dTUsA+rf1eHjjv9PBumTPUlfehW2Iyx6NjDvxxUQub90GfycXtkcrdkuzzp0Zprglc eOl8DHs8/ZZiamLGufa7JU8q6lxi/Nyu1t5yitPT5QJFs9Yh8hHckRxTwVP2Z5b8DQY0 LkDJM5sjXzbsNSO2RaYHLtetNaXYr3TrjL/vPnXKQZUjcPx0ezMq2ybtGQ3N/7PIMy8u hREpb4n9EBeXeeH7pZF9kIE88FhagCxpQzaJWrY+bITz8g9JrMs7ipDRF+e3pvgXfT0d HrOw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1771254392; x=1771859192; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=aIxEocxEapJW7yU9OtfyLhPCnRBq6fT8ce1CcmY6sug=; b=kZVSdNuiNgwYozkEUoT06sSmoA59m+eJzaf0ie6ctkLIrXhk2ACpTyYIHjaPaRBeJH RepvMuVg8czXYoZOj4XJw/mugpK8rS1fWoJn+7sJLtVRa0Z3EjtU0RYCCok3Kqx2MH/K NAJFPn0B8v/uHyVMSYVCDToN9SvU/o+GqHpECIo7feI1ovUG2K9DXBtairA8j8Zlru8V qPis48e1Wm6w/O3s+oL6e2wlKmSCFHw0IlBEbnmdO5QEWr5Kt6c2Or1NoI4Z+go81i8I SEMNBo1UKIHlXyrKpvPl3hELb2D1Tp6tI48MQIOR4uSRlGiiTRyD0QczM3dSrdN7ozaB QYRw== X-Forwarded-Encrypted: i=1; AJvYcCX7TqywOAQY5aq6dxdY/ToSH5/GmpSyFbIJG+WoXEQ9GewfmFW6P15j5JzujRoB8/oGqvuSso7ygSB32iE=@vger.kernel.org X-Gm-Message-State: AOJu0YyNehZq7LH0qLTOJ4oYxo286+qC9YXRhoWXBZUIpJjmUm96hK9E TnOsNkW7ukgjnc5Q4YP/FNvQq+2tB5bhunnali0aphMJGv8YzDLfSzOI2e7a51t5aUa8O09I/9Z QCsCMIN0+SAAxcg3dfp8lD+ZJhBgFtDbneceVFZUrYQvHmXL/36WUV6BrClBB18wXDg== X-Gm-Gg: AZuq6aL94eUvRDppCQor3uEFjFa+9xfxkzjgo6nK7ZiCCTAnFqYNIXI8XP1k9cOp3i7 rJyI3eluJgMI66gAxZ/NF4vU3DtUOhkI+t6iigAUi5gjkKLnvZq7PDnslZ/mhnnbk2dnEf8pYdk hCndLXDYT95dqgxomppQvdnVOnImLRUlRBb5K0ixGdp6LwA5x4YhvfchRrk9gGhAczhmt8huAO9 d69oT1nm0PAQIHUAVPBESjOZjnANPjp8CEvRcTIV2MbGUD7i+nTRV/A87sld1C5X1dybuSnZ1/S L420Mba0eHWtHj6AhrYtht64DdW1MNwYh+LPAi6wSnzUugGxH2ruezMxeatXIgcWm4A1MwkReAN 1men18+M2iFOR5l4LhNPj7SFCu9wd7aR/4sMd9b5hwiKbbWsM X-Received: by 2002:a05:6000:420a:b0:437:6758:ce75 with SMTP id ffacd0b85a97d-43796ac216amr22698928f8f.23.1771254391995; Mon, 16 Feb 2026 07:06:31 -0800 (PST) X-Received: by 2002:a05:6000:420a:b0:437:6758:ce75 with SMTP id ffacd0b85a97d-43796ac216amr22698863f8f.23.1771254391533; Mon, 16 Feb 2026 07:06:31 -0800 (PST) Received: from fedora.redhat.com (109-81-17-58.rct.o2.cz. [109.81.17.58]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-43796abc9b2sm25631899f8f.21.2026.02.16.07.06.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Feb 2026 07:06:30 -0800 (PST) From: Ondrej Mosnacek To: Jan Kara Cc: Amir Goldstein , Matthew Bobrowski , linux-fsdevel@vger.kernel.org, linux-security-module@vger.kernel.org, selinux@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH 2/2] fanotify: call fanotify_events_supported() before path_permission() and security_path_notify() Date: Mon, 16 Feb 2026 16:06:25 +0100 Message-ID: <20260216150625.793013-3-omosnace@redhat.com> X-Mailer: git-send-email 2.53.0 In-Reply-To: <20260216150625.793013-1-omosnace@redhat.com> References: <20260216150625.793013-1-omosnace@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The latter trigger LSM (e.g. SELinux) checks, which will log a denial when permission is denied, so it's better to do them after validity checks to avoid logging a denial when the operation would fail anyway. Fixes: 0b3b094ac9a7 ("fanotify: Disallow permission events for proc filesys= tem") Signed-off-by: Ondrej Mosnacek Reviewed-by: Amir Goldstein Reviewed-by: Paul Moore --- fs/notify/fanotify/fanotify_user.c | 25 ++++++++++--------------- 1 file changed, 10 insertions(+), 15 deletions(-) diff --git a/fs/notify/fanotify/fanotify_user.c b/fs/notify/fanotify/fanoti= fy_user.c index 9c9fca2976d2b..bfc4d09e6964a 100644 --- a/fs/notify/fanotify/fanotify_user.c +++ b/fs/notify/fanotify/fanotify_user.c @@ -1210,6 +1210,7 @@ static int fanotify_find_path(int dfd, const char __u= ser *filename, =20 *path =3D fd_file(f)->f_path; path_get(path); + ret =3D 0; } else { unsigned int lookup_flags =3D 0; =20 @@ -1219,22 +1220,7 @@ static int fanotify_find_path(int dfd, const char __= user *filename, lookup_flags |=3D LOOKUP_DIRECTORY; =20 ret =3D user_path_at(dfd, filename, lookup_flags, path); - if (ret) - goto out; } - - /* you can only watch an inode if you have read permissions on it */ - ret =3D path_permission(path, MAY_READ); - if (ret) { - path_put(path); - goto out; - } - - ret =3D security_path_notify(path, mask, obj_type); - if (ret) - path_put(path); - -out: return ret; } =20 @@ -2058,6 +2044,15 @@ static int do_fanotify_mark(int fanotify_fd, unsigne= d int flags, __u64 mask, goto path_put_and_out; } =20 + /* you can only watch an inode if you have read permissions on it */ + ret =3D path_permission(&path, MAY_READ); + if (ret) + goto path_put_and_out; + + ret =3D security_path_notify(&path, mask, obj_type); + if (ret) + goto path_put_and_out; + if (fid_mode) { ret =3D fanotify_test_fsid(path.dentry, flags, &__fsid); if (ret) --=20 2.53.0