From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id F235DC433F5 for ; Wed, 23 Feb 2022 17:05:44 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 689D98D002B; Wed, 23 Feb 2022 12:05:44 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 610138D0011; Wed, 23 Feb 2022 12:05:44 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4B0F38D002B; Wed, 23 Feb 2022 12:05:44 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0052.hostedemail.com [216.40.44.52]) by kanga.kvack.org (Postfix) with ESMTP id 28C128D0011 for ; Wed, 23 Feb 2022 12:05:44 -0500 (EST) Received: from smtpin16.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id B34E08248D52 for ; Wed, 23 Feb 2022 17:05:43 +0000 (UTC) X-FDA: 79174671366.16.54011C6 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by imf15.hostedemail.com (Postfix) with ESMTP id 3CDD3A0011 for ; Wed, 23 Feb 2022 17:05:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1645635942; x=1677171942; h=date:from:to:cc:subject:message-id:mime-version; bh=LjsulUFMTyAwK00jr4JfoVWPqtKYJZRdMpZ3F8QPJeQ=; b=QT/Eg75cP6fXPho+/E8SHZHrZ7ds7iOw/Yv53hfYmiECJXoqC8uKECZR QjhjYm1CwAHBAPhTXhVMBCgBsExK+1o5Qf6Xk4G95jujUCpKugSRhJEm/ R9r3UUgU+5fU/8vDxh4MvovjuxnCzgZY2NiMW8mgF2leZINlFtLDP7HbV Impgjsf0H/LzDTR86uEk5Yw8uFPrzNscKZsKpQTeHak8/FQZBnW2Z3TVD 6bH6VL3qq6jW42AwOtAzUVI/4EYn2UiMMn3bbESOQWPmRj5u5tDloKjPH 2kkjLa/fppeSCK97CohwjZZuSK8cIh+GjVmC8+cA1/rIAe3RUGW89kHw8 w==; X-IronPort-AV: E=McAfee;i="6200,9189,10267"; a="251762999" X-IronPort-AV: E=Sophos;i="5.88,391,1635231600"; d="scan'208";a="251762999" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Feb 2022 09:03:41 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,391,1635231600"; d="scan'208";a="543388627" Received: from lkp-server01.sh.intel.com (HELO 788b1cd46f0d) ([10.239.97.150]) by fmsmga007.fm.intel.com with ESMTP; 23 Feb 2022 09:03:40 -0800 Received: from kbuild by 788b1cd46f0d with local (Exim 4.92) (envelope-from ) id 1nMv3D-0001dj-Fn; Wed, 23 Feb 2022 17:03:39 +0000 Date: Thu, 24 Feb 2022 01:02:40 +0800 From: kernel test robot To: Arnd Bergmann Cc: kbuild-all@lists.01.org, Linux Memory Management List , Christoph Hellwig Subject: [linux-next:master 6322/7526] arch/riscv/kernel/perf_callchain.c:19:26: sparse: sparse: incorrect type in initializer (different address spaces) Message-ID: <202202240123.jVKXO4uv-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 3CDD3A0011 X-Stat-Signature: 4qt9da7k7b4pfm7hx1zofnc9nq1h6gi1 Authentication-Results: imf15.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="QT/Eg75c"; spf=none (imf15.hostedemail.com: domain of lkp@intel.com has no SPF policy when checking 134.134.136.24) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com X-Rspam-User: X-HE-Tag: 1645635941-515891 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: tree: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master head: 196d330d7fb1e7cc0d85641c89ce4602cb36f12e commit: 27e8140d7819b7dce32967e4b5bba102b59196ee [6322/7526] uaccess: fix type mismatch warnings from access_ok() config: riscv-randconfig-s032-20220223 (https://download.01.org/0day-ci/archive/20220224/202202240123.jVKXO4uv-lkp@intel.com/config) compiler: riscv64-linux-gcc (GCC) 11.2.0 reproduce: wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # apt-get install sparse # sparse version: v0.6.4-dirty # https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=27e8140d7819b7dce32967e4b5bba102b59196ee git remote add linux-next https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git git fetch --no-tags linux-next master git checkout 27e8140d7819b7dce32967e4b5bba102b59196ee # save the config file to linux build tree mkdir build_dir COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=riscv SHELL=/bin/bash arch/riscv/kernel/ If you fix the issue, kindly add following tag as appropriate Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) >> arch/riscv/kernel/perf_callchain.c:19:26: sparse: sparse: incorrect type in initializer (different address spaces) @@ expected unsigned long [noderef] __user *user_frame_tail @@ got unsigned long * @@ arch/riscv/kernel/perf_callchain.c:19:26: sparse: expected unsigned long [noderef] __user *user_frame_tail arch/riscv/kernel/perf_callchain.c:19:26: sparse: got unsigned long * vim +19 arch/riscv/kernel/perf_callchain.c dbeb90b0c1eb86 Mao Han 2019-08-29 8 dbeb90b0c1eb86 Mao Han 2019-08-29 9 /* dbeb90b0c1eb86 Mao Han 2019-08-29 10 * Get the return address for a single stackframe and return a pointer to the dbeb90b0c1eb86 Mao Han 2019-08-29 11 * next frame tail. dbeb90b0c1eb86 Mao Han 2019-08-29 12 */ dbeb90b0c1eb86 Mao Han 2019-08-29 13 static unsigned long user_backtrace(struct perf_callchain_entry_ctx *entry, dbeb90b0c1eb86 Mao Han 2019-08-29 14 unsigned long fp, unsigned long reg_ra) dbeb90b0c1eb86 Mao Han 2019-08-29 15 { dbeb90b0c1eb86 Mao Han 2019-08-29 16 struct stackframe buftail; dbeb90b0c1eb86 Mao Han 2019-08-29 17 unsigned long ra = 0; 27e8140d7819b7 Arnd Bergmann 2022-02-14 18 unsigned long __user *user_frame_tail = dbeb90b0c1eb86 Mao Han 2019-08-29 @19 (unsigned long *)(fp - sizeof(struct stackframe)); dbeb90b0c1eb86 Mao Han 2019-08-29 20 dbeb90b0c1eb86 Mao Han 2019-08-29 21 /* Check accessibility of one struct frame_tail beyond */ dbeb90b0c1eb86 Mao Han 2019-08-29 22 if (!access_ok(user_frame_tail, sizeof(buftail))) dbeb90b0c1eb86 Mao Han 2019-08-29 23 return 0; dbeb90b0c1eb86 Mao Han 2019-08-29 24 if (__copy_from_user_inatomic(&buftail, user_frame_tail, dbeb90b0c1eb86 Mao Han 2019-08-29 25 sizeof(buftail))) dbeb90b0c1eb86 Mao Han 2019-08-29 26 return 0; dbeb90b0c1eb86 Mao Han 2019-08-29 27 dbeb90b0c1eb86 Mao Han 2019-08-29 28 if (reg_ra != 0) dbeb90b0c1eb86 Mao Han 2019-08-29 29 ra = reg_ra; dbeb90b0c1eb86 Mao Han 2019-08-29 30 else dbeb90b0c1eb86 Mao Han 2019-08-29 31 ra = buftail.ra; dbeb90b0c1eb86 Mao Han 2019-08-29 32 dbeb90b0c1eb86 Mao Han 2019-08-29 33 fp = buftail.fp; dbeb90b0c1eb86 Mao Han 2019-08-29 34 if (ra != 0) dbeb90b0c1eb86 Mao Han 2019-08-29 35 perf_callchain_store(entry, ra); dbeb90b0c1eb86 Mao Han 2019-08-29 36 else dbeb90b0c1eb86 Mao Han 2019-08-29 37 return 0; dbeb90b0c1eb86 Mao Han 2019-08-29 38 dbeb90b0c1eb86 Mao Han 2019-08-29 39 return fp; dbeb90b0c1eb86 Mao Han 2019-08-29 40 } dbeb90b0c1eb86 Mao Han 2019-08-29 41 :::::: The code at line 19 was first introduced by commit :::::: dbeb90b0c1eb86a9b963b929d3c937afb7dadfa3 riscv: Add perf callchain support :::::: TO: Mao Han :::::: CC: Paul Walmsley --- 0-DAY CI Kernel Test Service, Intel Corporation https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org