From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6F42CC433F5 for ; Thu, 27 Jan 2022 13:20:03 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BF3AE6B0071; Thu, 27 Jan 2022 08:20:02 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id B7B796B0072; Thu, 27 Jan 2022 08:20:02 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A1BB16B0073; Thu, 27 Jan 2022 08:20:02 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0150.hostedemail.com [216.40.44.150]) by kanga.kvack.org (Postfix) with ESMTP id 8F29C6B0071 for ; Thu, 27 Jan 2022 08:20:02 -0500 (EST) Received: from smtpin20.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id 3C8E0181CA754 for ; Thu, 27 Jan 2022 13:20:02 +0000 (UTC) X-FDA: 79076125044.20.1A34C43 Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by imf25.hostedemail.com (Postfix) with ESMTP id 45141A000B for ; Thu, 27 Jan 2022 13:20:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1643289601; x=1674825601; h=date:from:to:cc:subject:message-id:mime-version; bh=dsPwMpBHf2H27yUFginfHhB9QXpo6HIwcdqi0UWp2I0=; b=ewyG7ooRwMUcMB3AE3EcMNxOu0JHNoaMxI2wDV0HiNIFCM8QxTeKTFUM eS1nIoUy8yEYYWhegvtrxWF9EK6Ky1e4BlAb0p5FcKJQtlnL72TJnNYCU u3Sysb34CxL942yDkZZ3stDGOm7YDyih9S7GFgbDaEiX0La5+iCvIaaTq Mi/6vvZBmp2ekvKw9ej0lWdUmKvRjSL2MyJqyETeOU/mc1fi5On3VULyJ X13AA+xsCNIkHmA0l+4ze+M5f54Td+sy1bhPodjrvFQjqMnO5AheHBj8i cwSjCIKzfBVb4odpgv/QX1tiUHVnDnbuitKL1eDAzx14iuelsMcLAWyPi g==; X-IronPort-AV: E=McAfee;i="6200,9189,10239"; a="226819167" X-IronPort-AV: E=Sophos;i="5.88,320,1635231600"; d="scan'208";a="226819167" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Jan 2022 05:19:59 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,320,1635231600"; d="scan'208";a="563781504" Received: from lkp-server01.sh.intel.com (HELO 276f1b88eecb) ([10.239.97.150]) by orsmga001.jf.intel.com with ESMTP; 27 Jan 2022 05:19:58 -0800 Received: from kbuild by 276f1b88eecb with local (Exim 4.92) (envelope-from ) id 1nD4gv-000Mdf-Ee; Thu, 27 Jan 2022 13:19:57 +0000 Date: Thu, 27 Jan 2022 21:19:43 +0800 From: kernel test robot To: Christian =?iso-8859-1?Q?G=F6ttsche?= Cc: kbuild-all@lists.01.org, Linux Memory Management List , Paul Moore Subject: [linux-next:master 2260/2421] security/selinux/hooks.c:216:36: sparse: sparse: incorrect type in argument 1 (different address spaces) Message-ID: <202201272153.o6t8kbDn-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: 45141A000B X-Stat-Signature: gma3twuarx763z114wesrffktcu9acnt X-Rspam-User: nil Authentication-Results: imf25.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=ewyG7ooR; spf=none (imf25.hostedemail.com: domain of lkp@intel.com has no SPF policy when checking 192.55.52.136) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com X-HE-Tag: 1643289601-612463 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000828, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: 0eb96e2c58c03e79fc2ee833ba88bf9226986564 commit: b084e189b01a7614d3098aca4f2381a759460d88 [2260/2421] selinux: simplify cred_init_security config: x86_64-rhel-8.3-kselftests (https://download.01.org/0day-ci/archive/20220127/202201272153.o6t8kbDn-lkp@intel.com/config) compiler: gcc-9 (Debian 9.3.0-22) 9.3.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-dirty # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=b084e189b01a7614d3098aca4f2381a759460d88 git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git git fetch --no-tags linux-next master git checkout b084e189b01a7614d3098aca4f2381a759460d88 # save the config file to linux build tree mkdir build_dir make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=x86_64 SHELL=/bin/bash security/selinux/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) security/selinux/hooks.c: note: in included file: include/net/sctp/structs.h:335:41: sparse: sparse: array of flexible structures >> security/selinux/hooks.c:216:36: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct cred const *cred @@ got struct cred const [noderef] __rcu *real_cred @@ security/selinux/hooks.c:216:36: sparse: expected struct cred const *cred security/selinux/hooks.c:216:36: sparse: got struct cred const [noderef] __rcu *real_cred security/selinux/hooks.c:2537:39: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct spinlock [usertype] *lock @@ got struct spinlock [noderef] __rcu * @@ security/selinux/hooks.c:2537:39: sparse: expected struct spinlock [usertype] *lock security/selinux/hooks.c:2537:39: sparse: got struct spinlock [noderef] __rcu * security/selinux/hooks.c:2545:41: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct spinlock [usertype] *lock @@ got struct spinlock [noderef] __rcu * @@ security/selinux/hooks.c:2545:41: sparse: expected struct spinlock [usertype] *lock security/selinux/hooks.c:2545:41: sparse: got struct spinlock [noderef] __rcu * security/selinux/hooks.c:2551:42: sparse: sparse: incorrect type in argument 2 (different address spaces) @@ expected struct task_struct *parent @@ got struct task_struct [noderef] __rcu *real_parent @@ security/selinux/hooks.c:2551:42: sparse: expected struct task_struct *parent security/selinux/hooks.c:2551:42: sparse: got struct task_struct [noderef] __rcu *real_parent security/selinux/hooks.c:5423:22: sparse: sparse: restricted __be16 degrades to integer security/selinux/hooks.c:5424:22: sparse: sparse: restricted __be16 degrades to integer vim +216 security/selinux/hooks.c 208 209 /* 210 * initialise the security for the init task 211 */ 212 static void cred_init_security(void) 213 { 214 struct task_security_struct *tsec; 215 > 216 tsec = selinux_cred(current->real_cred); 217 tsec->osid = tsec->sid = SECINITSID_KERNEL; 218 } 219 --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org