summaryrefslogtreecommitdiffstats
path: root/include/linux/fsnotify_backend.h
diff options
context:
space:
mode:
authorEric Paris <eparis@redhat.com>2010-10-28 17:21:57 -0400
committerEric Paris <eparis@redhat.com>2010-10-28 17:22:14 -0400
commite7099d8a5a34d2876908a9fab4952dabdcfc5909 (patch)
tree34f62d8ae23c4c115a0b615cd13e9ae7ddd28b42 /include/linux/fsnotify_backend.h
parent5dd03f55fd2f21916ce248bb2e68bbfb39d94fe5 (diff)
downloadlinux-e7099d8a5a34d2876908a9fab4952dabdcfc5909.tar.gz
linux-e7099d8a5a34d2876908a9fab4952dabdcfc5909.tar.bz2
linux-e7099d8a5a34d2876908a9fab4952dabdcfc5909.zip
fanotify: limit the number of marks in a single fanotify group
There is currently no limit on the number of marks a given fanotify group can have. Since fanotify is gated on CAP_SYS_ADMIN this was not seen as a serious DoS threat. This patch implements a default of 8192, the same as inotify to work towards removing the CAP_SYS_ADMIN gating and eliminating the default DoS'able status. Signed-off-by: Eric Paris <eparis@redhat.com>
Diffstat (limited to 'include/linux/fsnotify_backend.h')
-rw-r--r--include/linux/fsnotify_backend.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/fsnotify_backend.h b/include/linux/fsnotify_backend.h
index b37f3a71a9dc..49ceed6e92b1 100644
--- a/include/linux/fsnotify_backend.h
+++ b/include/linux/fsnotify_backend.h
@@ -169,6 +169,7 @@ struct fsnotify_group {
bool bypass_perm; /* protected by access_mutex */
#endif /* CONFIG_FANOTIFY_ACCESS_PERMISSIONS */
int f_flags;
+ unsigned int max_marks;
} fanotify_data;
#endif /* CONFIG_FANOTIFY */
};