[PATCH v3 fanotify 1/2] fanotify: Introduce fanotify filter
kernel test robot
lkp at intel.com
Mon Nov 25 11:01:14 UTC 2024
Hi Song,
kernel test robot noticed the following build warnings:
[auto build test WARNING on jack-fs/fsnotify]
[also build test WARNING on linus/master v6.12 next-20241125]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch#_base_tree_information]
url: https://github.com/intel-lab-lkp/linux/commits/Song-Liu/fanotify-Introduce-fanotify-filter/20241125-110818
base: https://git.kernel.org/pub/scm/linux/kernel/git/jack/linux-fs.git fsnotify
patch link: https://lore.kernel.org/r/20241122225958.1775625-2-song%40kernel.org
patch subject: [PATCH v3 fanotify 1/2] fanotify: Introduce fanotify filter
config: i386-randconfig-001-20241125 (https://download.01.org/0day-ci/archive/20241125/202411251801.nLqLjFGW-lkp@intel.com/config)
compiler: gcc-12 (Debian 12.2.0-14) 12.2.0
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20241125/202411251801.nLqLjFGW-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp at intel.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202411251801.nLqLjFGW-lkp@intel.com/
All warnings (new ones prefixed by >>):
fs/notify/fanotify/fanotify_filter.c: In function 'fanotify_filter_add':
>> fs/notify/fanotify/fanotify_filter.c:226:55: warning: cast to pointer from integer of different size [-Wint-to-pointer-cast]
226 | if (copy_from_user(init_args, (void __user *)args.init_args,
| ^
vim +226 fs/notify/fanotify/fanotify_filter.c
156
157 /*
158 * fanotify_filter_add - Add a filter to fsnotify_group.
159 *
160 * Add a filter from filter_list to a fsnotify_group.
161 *
162 * @group: fsnotify_group that will have add
163 * @argp: fanotify_filter_args that specifies the filter
164 * and the init arguments of the filter.
165 *
166 * Returns:
167 * 0 - on success;
168 * -EEXIST - filter of the same name already exists.
169 */
170 int fanotify_filter_add(struct fsnotify_group *group,
171 struct fanotify_filter_args __user *argp)
172 {
173 struct fanotify_filter_hook *filter_hook;
174 struct fanotify_filter_ops *filter_ops;
175 struct fanotify_filter_args args;
176 void *init_args = NULL;
177 int ret = 0;
178
179 ret = copy_from_user(&args, argp, sizeof(args));
180 if (ret)
181 return -EFAULT;
182
183 if (args.init_args_size > FAN_FILTER_ARGS_MAX)
184 return -EINVAL;
185
186 args.name[FAN_FILTER_NAME_MAX - 1] = '\0';
187
188 fsnotify_group_lock(group);
189
190 if (rcu_access_pointer(group->fanotify_data.filter_hook)) {
191 fsnotify_group_unlock(group);
192 return -EBUSY;
193 }
194
195 filter_hook = kzalloc(sizeof(*filter_hook), GFP_KERNEL);
196 if (!filter_hook) {
197 ret = -ENOMEM;
198 goto out;
199 }
200
201 spin_lock(&filter_list_lock);
202 filter_ops = fanotify_filter_find(args.name);
203 if (!filter_ops || !try_module_get(filter_ops->owner)) {
204 spin_unlock(&filter_list_lock);
205 ret = -ENOENT;
206 goto err_free_hook;
207 }
208 spin_unlock(&filter_list_lock);
209
210 if (!capable(CAP_SYS_ADMIN) && (filter_ops->flags & FAN_FILTER_F_SYS_ADMIN_ONLY)) {
211 ret = -EPERM;
212 goto err_module_put;
213 }
214
215 if (filter_ops->filter_init) {
216 if (args.init_args_size != filter_ops->init_args_size) {
217 ret = -EINVAL;
218 goto err_module_put;
219 }
220 if (args.init_args_size) {
221 init_args = kzalloc(args.init_args_size, GFP_KERNEL);
222 if (!init_args) {
223 ret = -ENOMEM;
224 goto err_module_put;
225 }
> 226 if (copy_from_user(init_args, (void __user *)args.init_args,
227 args.init_args_size)) {
228 ret = -EFAULT;
229 goto err_free_args;
230 }
231
232 }
233 ret = filter_ops->filter_init(group, filter_hook, init_args);
234 if (ret)
235 goto err_free_args;
236 kfree(init_args);
237 }
238 filter_hook->ops = filter_ops;
239 rcu_assign_pointer(group->fanotify_data.filter_hook, filter_hook);
240
241 out:
242 fsnotify_group_unlock(group);
243 return ret;
244
245 err_free_args:
246 kfree(init_args);
247 err_module_put:
248 module_put(filter_ops->owner);
249 err_free_hook:
250 kfree(filter_hook);
251 goto out;
252 }
253
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
More information about the Linux-security-module-archive
mailing list