From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 43D9BE674A4 for ; Fri, 1 Nov 2024 04:57:15 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 6DB6A6B009E; Fri, 1 Nov 2024 00:57:14 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 6635D6B00A0; Fri, 1 Nov 2024 00:57:14 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 503E66B00A1; Fri, 1 Nov 2024 00:57:14 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 30C1C6B009E for ; Fri, 1 Nov 2024 00:57:14 -0400 (EDT) Received: from smtpin04.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id D18F2141CCC for ; Fri, 1 Nov 2024 04:57:13 +0000 (UTC) X-FDA: 82736316642.04.9652DDD Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.16]) by imf10.hostedemail.com (Postfix) with ESMTP id D8F56C000B for ; Fri, 1 Nov 2024 04:56:58 +0000 (UTC) Authentication-Results: imf10.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=RvQsMAIT; spf=pass (imf10.hostedemail.com: domain of lkp@intel.com designates 192.198.163.16 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1730436853; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=YG5qh8SCekMoZzsG52ljS0F1YZ9r4Put4fPHYNmv9OI=; b=dLn1czFeuOy9J8NH00myLAQg4ZtqYPX3FhdAmK8tI+HHqvhQ1Fsc9+BBz/7hqVqvz1oqh8 rE30IVETqfBCPwzBM9xe9P5dAyrb/fM4X5KYSgViWJ4osD2wxuQen+1Vc3ev7pe9izL5vC pR65P13IOumx553oiayklxlyEjqddcQ= ARC-Authentication-Results: i=1; imf10.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=RvQsMAIT; spf=pass (imf10.hostedemail.com: domain of lkp@intel.com designates 192.198.163.16 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1730436853; a=rsa-sha256; cv=none; b=6Tlkxu4EoC4k4dpLhnqKvUFKJb89xGfBKo5TinCXmf/aPVJ6Mkd2lLypamzVvE8a1qzDQD CqGoDhDLaU1USaJn8K/xWBYDRvLnhZOYa4UMwQtR2ZVAmJM2bEFxoI9VOsEMNxSTiwTl42 k6jowDPh3jSw7vMUk47ehlB1My9Kto8= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1730437031; x=1761973031; h=date:from:to:cc:subject:message-id:mime-version; bh=0Cai3H5eK7XtVf04/cs9wHer1MXsZhHNYaewLEXDdGU=; b=RvQsMAITRLO0jABen4t1reLCd9Tit3l+qJDNpu3ZwFopSkbGOuePf4pG 2P5DYzrS4L+de/gGajN6KAxpj14pmYBT4U6tpVvA+TzLdGgVSuPVARNcB SukUZZIqw7qB7a2jLGMRTTpS4OACnuDZicPPqb6G3KrSsTR1u1uEpkpLS cJkW1CXGATAdxX3EKGXFPqLVekcLR1+8AeSV5NwgNgB6upORNCGn5t5O0 rcJM3ijuMGxQ91cID9S8WMc0BCi5d8831aOnyxrv0h3+TEBvRrPHSZb8c /G5DLPWpYdLOe3mwn4+sLXmkQzOr913yWK+TI5la7FjEuIq315Js/1NfX g==; X-CSE-ConnectionGUID: WEJeLDGJSdCu5wGXKzaEZA== X-CSE-MsgGUID: pA7LNZj+RYeDn6poe0pWHw== X-IronPort-AV: E=McAfee;i="6700,10204,11242"; a="17835767" X-IronPort-AV: E=Sophos;i="6.11,248,1725346800"; d="scan'208";a="17835767" Received: from fmviesa009.fm.intel.com ([10.60.135.149]) by fmvoesa110.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Oct 2024 21:57:09 -0700 X-CSE-ConnectionGUID: O3GSXUjeSxCZ88b8f9oerw== X-CSE-MsgGUID: TlunNVQoQeSeA/6LG2IZ9g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.11,248,1725346800"; d="scan'208";a="82964577" Received: from lkp-server01.sh.intel.com (HELO a48cf1aa22e8) ([10.239.97.150]) by fmviesa009.fm.intel.com with ESMTP; 31 Oct 2024 21:57:08 -0700 Received: from kbuild by a48cf1aa22e8 with local (Exim 4.96) (envelope-from ) id 1t6jib-000h9L-2C; Fri, 01 Nov 2024 04:57:05 +0000 Date: Fri, 1 Nov 2024 12:56:34 +0800 From: kernel test robot To: Ilya Leoshkevich Cc: oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Andrew Morton , Linux Memory Management List , Alexander Potapenko Subject: mm/kmsan/hooks.c:269:14: sparse: sparse: cast removes address space '__user' of expression Message-ID: <202411011212.6RM81BEd-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: D8F56C000B X-Stat-Signature: q6awh9gfucxr7bppag89r9tyigyg16pi X-Rspam-User: X-HE-Tag: 1730437018-49452 X-HE-Meta: U2FsdGVkX18brcK+D+SY1IN1kLD3rHbBaFA5KLy2pK2nSoXd0mbJ3zhrxg6waTxaq7Df1GEiP2BWnI4L3OEvZlv5SNiRI3StrEcnTfWxxysRWVwhmnf6Gp1s59aZdVWc42sUxw1aeXyZpn7YzJFANvANwLkc1i+YZStBtznpNYS8JyvOitNotHmVEiwVB99POy9TDtCT6dr5xYN4/paXbepdhaVXmU8osvY8LKvikTFTcAzmT4oYg1FVodoXmcxnwccFjQeDZrcB5Bq3x87eKPrD8M1e+FgEwTjL52NjokyGS1HqWMk2fa1ymmzOBxcBFMPCePAvAcjjzMDyWAPAFxWwIVPfWQdW7Qe3WyAltWKEwdiJUnm0XE36XsjkMvizw7UDcWpB/vBc2F6FF24TDVVTbYvk1SMrZejCEZbL5ijaSqxQVJxyfqxp/5qD8MNKHcCWW8L2v3dbGrdpoYACI0JArrXcObs41SzFLDuxvPV+Sz9vbxeqH/PukR8UswgYNwEYVxynC4nkMCk2Jp3uMYjokCn5+v3gfWu2xgxBW3INDwkOxxv6YAXoF5DnPuN+Iw9YTcys592ulKi1P0zw2Pftl3xx11z1rPBxKRAXQPccYX1GsHIuQzXtgOi3gePBazJQ0pREd3jf4HSctiZGgeoHDNB6JTk5+1Fq/XJyUnNRixmjTtJmgJk306ONGBs5TU4HXyl+3F00SgQ66CfwesH79Iaoh2pLf/1hd+4P6hRMEuRdln+jeX2WZUpJKNW5gYkxPq9emUy0byYlQOo3kr3IS9zIUy2Hsn8egnAd3Gpg67Rz2r8Yd32yId/75U3dj9IezDHOYYRvC+KRU9E+PmgM4Md3iS09wWjPpZTFm9odn+vCu01dderC4lEypVplSCc1qTPBHVocl/y27FhgA6Is24DvA2JA4RVUMztxywiShFzlcf4sdrUv21e6ZFiYoHSN4uWFe2CQ2RH4DDr lHsQFn07 10u+CIWYqKQyke8GK59ukasT6seqEBYnbGhOI28A6Vmr97j7SlE1eerjTef/vJ42mfCavOEl5u+uN/2YOx7Dkg++NhOpjLxWkB8xfkRKROssCAMuIp5/1Ne8OOgxOINgrl4prsEgAbKRAKUiy2PON1FmktnqPkDDFXiomkl64frsga1Vu+ROJRz37oyskALdxHeAXgGDc3aQ/yb05JfzLZEC+LRI1a+T2ZM1gnOxt4hbIJpuYAmHI/pdMPkUilFMtENLkXLfqAZGZmNWHuWMxyOUq1TJJI3IvyN2RvHm81h6F5rSJv+m+C5HS2UBuJtXJOz8YeaATcqqTR+aJLu2gtgW0AAYAbBhUR79tgahRm2umIOpbqECZ4A/BHkiWzkNkkrLB49ty26sKZNGCVJ6W1y158HVUijEmj3KAmbBKR6aBBsyXPv3LrCtWcCLjQyX4f/KOiHreUBLn9Ug= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Ilya, First bad commit (maybe != root cause): tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: 6c52d4da1c742cd01a797a4d0a2d3c5a60dc9bfe commit: 3a8f6f3b469b4075919a3613e182f9a70df92d46 kmsan: enable on s390 date: 4 months ago config: s390-randconfig-r112-20241030 (https://download.01.org/0day-ci/archive/20241101/202411011212.6RM81BEd-lkp@intel.com/config) compiler: clang version 20.0.0git (https://github.com/llvm/llvm-project 639a7ac648f1e50ccd2556e17d401c04f9cce625) reproduce: (https://download.01.org/0day-ci/archive/20241101/202411011212.6RM81BEd-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202411011212.6RM81BEd-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) >> mm/kmsan/hooks.c:269:14: sparse: sparse: cast removes address space '__user' of expression mm/kmsan/hooks.c:271:75: sparse: sparse: incorrect type in argument 3 (different address spaces) @@ expected void const *user_addr @@ got void [noderef] __user *to @@ mm/kmsan/hooks.c:271:75: sparse: expected void const *user_addr mm/kmsan/hooks.c:271:75: sparse: got void [noderef] __user *to mm/kmsan/hooks.c:280:50: sparse: sparse: cast removes address space '__user' of expression mm/kmsan/hooks.c:306:59: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:319:79: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:325:79: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:421:78: sparse: sparse: Using plain integer as NULL pointer vim +/__user +269 mm/kmsan/hooks.c b073d7f8aee4ebf Alexander Potapenko 2022-09-15 247 75cf0290271bf6d Alexander Potapenko 2022-09-15 248 void kmsan_copy_to_user(void __user *to, const void *from, size_t to_copy, 75cf0290271bf6d Alexander Potapenko 2022-09-15 249 size_t left) 75cf0290271bf6d Alexander Potapenko 2022-09-15 250 { 75cf0290271bf6d Alexander Potapenko 2022-09-15 251 unsigned long ua_flags; 75cf0290271bf6d Alexander Potapenko 2022-09-15 252 75cf0290271bf6d Alexander Potapenko 2022-09-15 253 if (!kmsan_enabled || kmsan_in_runtime()) 75cf0290271bf6d Alexander Potapenko 2022-09-15 254 return; 75cf0290271bf6d Alexander Potapenko 2022-09-15 255 /* 75cf0290271bf6d Alexander Potapenko 2022-09-15 256 * At this point we've copied the memory already. It's hard to check it 75cf0290271bf6d Alexander Potapenko 2022-09-15 257 * before copying, as the size of actually copied buffer is unknown. 75cf0290271bf6d Alexander Potapenko 2022-09-15 258 */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 259 75cf0290271bf6d Alexander Potapenko 2022-09-15 260 /* copy_to_user() may copy zero bytes. No need to check. */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 261 if (!to_copy) 75cf0290271bf6d Alexander Potapenko 2022-09-15 262 return; 75cf0290271bf6d Alexander Potapenko 2022-09-15 263 /* Or maybe copy_to_user() failed to copy anything. */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 264 if (to_copy <= left) 75cf0290271bf6d Alexander Potapenko 2022-09-15 265 return; 75cf0290271bf6d Alexander Potapenko 2022-09-15 266 75cf0290271bf6d Alexander Potapenko 2022-09-15 267 ua_flags = user_access_save(); f926e9326f3a79f Ilya Leoshkevich 2024-06-21 268 if (!IS_ENABLED(CONFIG_ARCH_HAS_NON_OVERLAPPING_ADDRESS_SPACE) || f926e9326f3a79f Ilya Leoshkevich 2024-06-21 @269 (u64)to < TASK_SIZE) { 75cf0290271bf6d Alexander Potapenko 2022-09-15 270 /* This is a user memory access, check it. */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 271 kmsan_internal_check_memory((void *)from, to_copy - left, to, 75cf0290271bf6d Alexander Potapenko 2022-09-15 272 REASON_COPY_TO_USER); 75cf0290271bf6d Alexander Potapenko 2022-09-15 273 } else { 75cf0290271bf6d Alexander Potapenko 2022-09-15 274 /* Otherwise this is a kernel memory access. This happens when a 75cf0290271bf6d Alexander Potapenko 2022-09-15 275 * compat syscall passes an argument allocated on the kernel 75cf0290271bf6d Alexander Potapenko 2022-09-15 276 * stack to a real syscall. 75cf0290271bf6d Alexander Potapenko 2022-09-15 277 * Don't check anything, just copy the shadow of the copied 75cf0290271bf6d Alexander Potapenko 2022-09-15 278 * bytes. 75cf0290271bf6d Alexander Potapenko 2022-09-15 279 */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 280 kmsan_internal_memmove_metadata((void *)to, (void *)from, 75cf0290271bf6d Alexander Potapenko 2022-09-15 281 to_copy - left); 75cf0290271bf6d Alexander Potapenko 2022-09-15 282 } 75cf0290271bf6d Alexander Potapenko 2022-09-15 283 user_access_restore(ua_flags); 75cf0290271bf6d Alexander Potapenko 2022-09-15 284 } 75cf0290271bf6d Alexander Potapenko 2022-09-15 285 EXPORT_SYMBOL(kmsan_copy_to_user); 75cf0290271bf6d Alexander Potapenko 2022-09-15 286 :::::: The code at line 269 was first introduced by commit :::::: f926e9326f3a79f7e01ac790e2361f44d8ca8320 kmsan: fix kmsan_copy_to_user() on arches with overlapping address spaces :::::: TO: Ilya Leoshkevich :::::: CC: Andrew Morton -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki