From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id A64D7E7717F for ; Thu, 12 Dec 2024 11:03:52 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id D8A406B0089; Thu, 12 Dec 2024 06:03:51 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id D3A366B008C; Thu, 12 Dec 2024 06:03:51 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id C023B6B0092; Thu, 12 Dec 2024 06:03:51 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id A4A4A6B0089 for ; Thu, 12 Dec 2024 06:03:51 -0500 (EST) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 167691213E9 for ; Thu, 12 Dec 2024 11:03:51 +0000 (UTC) X-FDA: 82886021064.30.BE34404 Received: from mgamail.intel.com (mgamail.intel.com [198.175.65.17]) by imf14.hostedemail.com (Postfix) with ESMTP id 7219A10001B for ; Thu, 12 Dec 2024 11:03:21 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=R+74JKm4; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf14.hostedemail.com: domain of lkp@intel.com designates 198.175.65.17 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1734001406; a=rsa-sha256; cv=none; b=W7PYLV7Hgcc6dC+eu6+h7DVDfPxLYpcppM5mnoNq+KZ/TiNG7wNqKwmojXuqCHd5E+AZUb m8FidkZiVJ2ne9xC+Vk6WuSjKP7tYojZAEP2RkJ4O/Pff+Mv7XWh4OVlGN+utQYuKMfWGO kRXVGim4nxDErec/RYcNnlJqC0eXmc0= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=R+74JKm4; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf14.hostedemail.com: domain of lkp@intel.com designates 198.175.65.17 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1734001406; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=rqWPS3CtnCaLZx/3en8iRlMKMC/AqkJTQJvT7a9JgOA=; b=iKP8SGtW42hHsTVKpK9dERpJo3gyeRrVJUpTXXUpdaxddtSRgIyPN2CmVX8HRQ5Wls0Kna OsHKiwUz/eUC8vKN9KJC1MlKiRkXi4V01ywuBWWbqOUfGwxIPZJwkayEPaHmL+SR7WTf6V OrHDBspXb3FaSjcn42hsCnZcMkFglTg= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1734001429; x=1765537429; h=date:from:to:cc:subject:message-id:mime-version; bh=uNi8VYRXqzAJqytMdPO7sC7zCEtCZuyAocnf6y+XjqA=; b=R+74JKm43Nr4jmAcN7DF+zBxMnFQ8un0pVXyamkeBqjs6JjAPchEzkhi a0Gy25WvaNLca+EyHiFCt5ccmHEsz/VLdJwSf/h0ZTzmiszDLC98arq9f qiguBRxyF8N9bp0urn+KczBiKYVAWIGZNngWRfwQ25oPey8zWpCn3U5GY xzJp3ztd6D7mvTxlj/8anlGtLcwoeC5uGbVTiFujijpJFa5RYQpB2qBH7 L8z7RWU3zpKLquxMdDg9R94dVUY2it/QCQ3w10Z0dY6RnNayUEqfLLh9M cCTKrjB5g3D4vZMA08GVRUgLp/SDItsR7yWPyby5G5fTZiNO3A9wQbJqd Q==; X-CSE-ConnectionGUID: 1I/A7Q/jRKKhRW/2UZBkkA== X-CSE-MsgGUID: uFx+ruwQSBu3nxQHKCxx1Q== X-IronPort-AV: E=McAfee;i="6700,10204,11283"; a="34458081" X-IronPort-AV: E=Sophos;i="6.12,228,1728975600"; d="scan'208";a="34458081" Received: from fmviesa002.fm.intel.com ([10.60.135.142]) by orvoesa109.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Dec 2024 03:03:47 -0800 X-CSE-ConnectionGUID: NWGq9Z7sTYin7wp2CN7IXw== X-CSE-MsgGUID: y2xHsOHGSpOGHi0F7iDMIQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.12,224,1728975600"; d="scan'208";a="119444564" Received: from lkp-server01.sh.intel.com (HELO 82a3f569d0cb) ([10.239.97.150]) by fmviesa002.fm.intel.com with ESMTP; 12 Dec 2024 03:03:45 -0800 Received: from kbuild by 82a3f569d0cb with local (Exim 4.96) (envelope-from ) id 1tLgys-0007kp-1S; Thu, 12 Dec 2024 11:03:42 +0000 Date: Thu, 12 Dec 2024 19:02:53 +0800 From: kernel test robot To: Ilya Leoshkevich Cc: oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Andrew Morton , Linux Memory Management List , Alexander Potapenko Subject: mm/kmsan/hooks.c:269:14: sparse: sparse: cast removes address space '__user' of expression Message-ID: <202412121809.uLILCZRI-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Stat-Signature: afbfc3h7rt9srqtqpmpq8mh6dapf8szp X-Rspam-User: X-Rspamd-Queue-Id: 7219A10001B X-Rspamd-Server: rspam08 X-HE-Tag: 1734001401-499533 X-HE-Meta: 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 A8nTehgd CjIMncwNf6YHecpyeh7DuCBGTTC8rN5P4OKAnTYrJAtmGmao7mq1zxFP/TFz5hTB+5SeE7mVLpSDI1qMirI4CtcxlyCCJwpi/5jgj7xymATnGQFm8FxVymzbTATa81ac36t+HFNGPw5u3hEJnR2k/YQGPjl/Atrs7KuoenT3F60MZv6dlArLDKKPQRCwXnbMLM2QYLabF9s9V07wHW7I1om9U+GxBGsvi+MTyrq0UZBpTDFeevGnbegaqSRTuiz7P9I/87JqMkUP6TYKHAsT45JLra51iofaeaNgFU1/vf0/sxDtKiCV7glvoj9Nbc/TtbHKRslcCsUKRvRTFHC9qEMI0nBFlQ3P6rRd6jO33CD0qMHVtKHNsHacckeNJx32QgrM8TLWJtdPOr+de6se5IES6oHhurXhzvy7JI8OXPImpdVo2/WuQiQ/Fjjc/+t3/78ZpZsM7urpLJvg= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: 231825b2e1ff6ba799c5eaf396d3ab2354e37c6b commit: 3a8f6f3b469b4075919a3613e182f9a70df92d46 kmsan: enable on s390 date: 5 months ago config: s390-randconfig-r121-20241212 (https://download.01.org/0day-ci/archive/20241212/202412121809.uLILCZRI-lkp@intel.com/config) compiler: clang version 20.0.0git (https://github.com/llvm/llvm-project 2dc22615fd46ab2566d0f26d5ba234ab12dc4bf8) reproduce: (https://download.01.org/0day-ci/archive/20241212/202412121809.uLILCZRI-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202412121809.uLILCZRI-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) >> mm/kmsan/hooks.c:269:14: sparse: sparse: cast removes address space '__user' of expression mm/kmsan/hooks.c:271:75: sparse: sparse: incorrect type in argument 3 (different address spaces) @@ expected void const *user_addr @@ got void [noderef] __user *to @@ mm/kmsan/hooks.c:271:75: sparse: expected void const *user_addr mm/kmsan/hooks.c:271:75: sparse: got void [noderef] __user *to mm/kmsan/hooks.c:280:50: sparse: sparse: cast removes address space '__user' of expression mm/kmsan/hooks.c:306:59: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:319:79: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:325:79: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:421:78: sparse: sparse: Using plain integer as NULL pointer vim +/__user +269 mm/kmsan/hooks.c b073d7f8aee4ebf Alexander Potapenko 2022-09-15 247 75cf0290271bf6d Alexander Potapenko 2022-09-15 248 void kmsan_copy_to_user(void __user *to, const void *from, size_t to_copy, 75cf0290271bf6d Alexander Potapenko 2022-09-15 249 size_t left) 75cf0290271bf6d Alexander Potapenko 2022-09-15 250 { 75cf0290271bf6d Alexander Potapenko 2022-09-15 251 unsigned long ua_flags; 75cf0290271bf6d Alexander Potapenko 2022-09-15 252 75cf0290271bf6d Alexander Potapenko 2022-09-15 253 if (!kmsan_enabled || kmsan_in_runtime()) 75cf0290271bf6d Alexander Potapenko 2022-09-15 254 return; 75cf0290271bf6d Alexander Potapenko 2022-09-15 255 /* 75cf0290271bf6d Alexander Potapenko 2022-09-15 256 * At this point we've copied the memory already. It's hard to check it 75cf0290271bf6d Alexander Potapenko 2022-09-15 257 * before copying, as the size of actually copied buffer is unknown. 75cf0290271bf6d Alexander Potapenko 2022-09-15 258 */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 259 75cf0290271bf6d Alexander Potapenko 2022-09-15 260 /* copy_to_user() may copy zero bytes. No need to check. */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 261 if (!to_copy) 75cf0290271bf6d Alexander Potapenko 2022-09-15 262 return; 75cf0290271bf6d Alexander Potapenko 2022-09-15 263 /* Or maybe copy_to_user() failed to copy anything. */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 264 if (to_copy <= left) 75cf0290271bf6d Alexander Potapenko 2022-09-15 265 return; 75cf0290271bf6d Alexander Potapenko 2022-09-15 266 75cf0290271bf6d Alexander Potapenko 2022-09-15 267 ua_flags = user_access_save(); f926e9326f3a79f Ilya Leoshkevich 2024-06-21 268 if (!IS_ENABLED(CONFIG_ARCH_HAS_NON_OVERLAPPING_ADDRESS_SPACE) || f926e9326f3a79f Ilya Leoshkevich 2024-06-21 @269 (u64)to < TASK_SIZE) { 75cf0290271bf6d Alexander Potapenko 2022-09-15 270 /* This is a user memory access, check it. */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 271 kmsan_internal_check_memory((void *)from, to_copy - left, to, 75cf0290271bf6d Alexander Potapenko 2022-09-15 272 REASON_COPY_TO_USER); 75cf0290271bf6d Alexander Potapenko 2022-09-15 273 } else { 75cf0290271bf6d Alexander Potapenko 2022-09-15 274 /* Otherwise this is a kernel memory access. This happens when a 75cf0290271bf6d Alexander Potapenko 2022-09-15 275 * compat syscall passes an argument allocated on the kernel 75cf0290271bf6d Alexander Potapenko 2022-09-15 276 * stack to a real syscall. 75cf0290271bf6d Alexander Potapenko 2022-09-15 277 * Don't check anything, just copy the shadow of the copied 75cf0290271bf6d Alexander Potapenko 2022-09-15 278 * bytes. 75cf0290271bf6d Alexander Potapenko 2022-09-15 279 */ 75cf0290271bf6d Alexander Potapenko 2022-09-15 280 kmsan_internal_memmove_metadata((void *)to, (void *)from, 75cf0290271bf6d Alexander Potapenko 2022-09-15 281 to_copy - left); 75cf0290271bf6d Alexander Potapenko 2022-09-15 282 } 75cf0290271bf6d Alexander Potapenko 2022-09-15 283 user_access_restore(ua_flags); 75cf0290271bf6d Alexander Potapenko 2022-09-15 284 } 75cf0290271bf6d Alexander Potapenko 2022-09-15 285 EXPORT_SYMBOL(kmsan_copy_to_user); 75cf0290271bf6d Alexander Potapenko 2022-09-15 286 :::::: The code at line 269 was first introduced by commit :::::: f926e9326f3a79f7e01ac790e2361f44d8ca8320 kmsan: fix kmsan_copy_to_user() on arches with overlapping address spaces :::::: TO: Ilya Leoshkevich :::::: CC: Andrew Morton -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki