From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C33D6C0218A for ; Tue, 28 Jan 2025 19:42:27 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 542C128021F; Tue, 28 Jan 2025 14:42:27 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 4F33128021C; Tue, 28 Jan 2025 14:42:27 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3BAE328021F; Tue, 28 Jan 2025 14:42:27 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 1E9E828021C for ; Tue, 28 Jan 2025 14:42:27 -0500 (EST) Received: from smtpin12.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id C66CE1A0457 for ; Tue, 28 Jan 2025 19:42:26 +0000 (UTC) X-FDA: 83057882292.12.955FAEC Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.11]) by imf01.hostedemail.com (Postfix) with ESMTP id 4F26D40003 for ; Tue, 28 Jan 2025 19:42:24 +0000 (UTC) Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=KeOOrZQC; spf=pass (imf01.hostedemail.com: domain of lkp@intel.com designates 192.198.163.11 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1738093344; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=uXtAOHCT3ffvJ/OVAHvjiYkUzisbqhOdkM0nbC3ZDn0=; b=2CHoKGgk07RaQ+03W3QQ6BGH+M/kt/pBVEGIppOayI+jcGQ0gcGHptPsoE6UC30WxqoDn+ OjZUWS8vUIL3AADqcV887Ofcr15rGppBClH+ugJaemp5P4w5zLLVPD3fMGjvzjIvECKyb+ BCdfN4FY3R+D/O6d3quFMeUBwPogyRE= ARC-Authentication-Results: i=1; imf01.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=KeOOrZQC; spf=pass (imf01.hostedemail.com: domain of lkp@intel.com designates 192.198.163.11 as permitted sender) smtp.mailfrom=lkp@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1738093344; a=rsa-sha256; cv=none; b=JkyXHzr9fFk7zwUCWrAd8LeNB0PA3b2nWcbkAD/teNiPS4b0TXrQ6dqL9GHRuxwuRfhq2T jRRLUmUS/F7ngyys91rIVJ4qSwFeWt68V+NRer8b4UW3A0eIh7m8t1Gk/qJ7e7sXzTzBNS x0dTyqwwowY6bXArQYFXcH/ziIyrXHg= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1738093344; x=1769629344; h=date:from:to:cc:subject:message-id:mime-version; bh=R029wN9gX6NBUYw5spewMTV38CtE40D8Jl6ywP5kh2Q=; b=KeOOrZQC6P26fpRaysgqWhBEK21+AeuJL4y7H2oTKHmwzH1CJVeyPGBs C2JSf53TbckBOVBK0gm6wZURJ2JVw35oZNGdczUuDeEIqco4McLXjCTgz 8L97J2vc2Al3YjjzCKog/tiq/zC6CSysu6uMfaUwEYLWhGLQHCteU909p w8A6gYFFIWOue0gsWLBTSpTPlGLAG8/DJj2/ZOZ58NPcF3WEXEx00qudt 8ac84qJtWRBVC3fANjKrSN37o163+fr6uCkc+m1ze2LtuZHO9YHWWtV6I ZEqKdRthkPtOzT9P6gwI5F4hq3QYsEb87EwqEEk2JbHaS1TpuJ52P4TLy A==; X-CSE-ConnectionGUID: B4wU4P+5Q0CmabVNbdn/RQ== X-CSE-MsgGUID: MMQ89OkJSpKy9ErbksPBZw== X-IronPort-AV: E=McAfee;i="6700,10204,11329"; a="49181760" X-IronPort-AV: E=Sophos;i="6.13,242,1732608000"; d="scan'208";a="49181760" Received: from fmviesa003.fm.intel.com ([10.60.135.143]) by fmvoesa105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jan 2025 11:42:23 -0800 X-CSE-ConnectionGUID: fdXyCRtrRNi5fILMkb6AEQ== X-CSE-MsgGUID: juutmF6yTH6qMWhLo0HeOA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.12,224,1728975600"; d="scan'208";a="112832124" Received: from lkp-server01.sh.intel.com (HELO d63d4d77d921) ([10.239.97.150]) by fmviesa003.fm.intel.com with ESMTP; 28 Jan 2025 11:42:21 -0800 Received: from kbuild by d63d4d77d921 with local (Exim 4.96) (envelope-from ) id 1tcrTX-000i8r-0q; Tue, 28 Jan 2025 19:42:19 +0000 Date: Wed, 29 Jan 2025 03:42:10 +0800 From: kernel test robot To: Ilya Leoshkevich Cc: oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Andrew Morton , Linux Memory Management List , Alexander Potapenko Subject: mm/kmsan/hooks.c:269:14: sparse: sparse: cast removes address space '__user' of expression Message-ID: <202501290356.mlGVL2QZ-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspamd-Queue-Id: 4F26D40003 X-Stat-Signature: hk5fhsprjapn5y87j9qtaur9e9cz86cu X-Rspamd-Server: rspam08 X-Rspam-User: X-HE-Tag: 1738093344-609072 X-HE-Meta: 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 ZNkAZbC4 sMIkXVC8gdPbFsn9tl9H6fGolCuLCzKgZye4xY+lWDFmmOR0h1xueBQGdXEVge+dZosb6Ntt1V3LpYnsJwXHpb2IaW3o8sTQLSPpjBwPO5arxfJABVz9hDimC5rLc71t6l63rUYwYHNWqnVdONMmn+b7pnLFVksUkswxeQzVzL8162d0aiIGD8j2/ESLHkKqPYXMBtFaSN1X8Oijs3PR6vGV9Hlrstlr61I+wAJB6ELlJuwQV9rI7EKdfZoGAnxV2AHWQGGDlvWq55uybEh0mk+x1B7EhWOAKRjaiQi2QCSdeR0X+9ARLW9uvHDnHQrahQGoDO9lAeN9hV5SjAcTG/hUOIxyCgq6s8K/YIcculfxLLmEeNgTckHw4Pw/tnAFIgc48fzt+SmYNeG/JEUo+pR98TLf8cPt1U8m4MNCtKUovoZEMvwgx8v7xC/9Z8Vju6OsoTjCL9an395U= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Hi Ilya, First bad commit (maybe != root cause): tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: e2ee2e9b159094527ae7ad78058b1316f62fc5b7 commit: 3a8f6f3b469b4075919a3613e182f9a70df92d46 kmsan: enable on s390 date: 7 months ago config: s390-randconfig-r132-20250126 (https://download.01.org/0day-ci/archive/20250129/202501290356.mlGVL2QZ-lkp@intel.com/config) compiler: clang version 18.1.8 (https://github.com/llvm/llvm-project 3b5b5c1ec4a3095ab096dd780e84d7ab81f3d7ff) reproduce: (https://download.01.org/0day-ci/archive/20250129/202501290356.mlGVL2QZ-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202501290356.mlGVL2QZ-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) >> mm/kmsan/hooks.c:269:14: sparse: sparse: cast removes address space '__user' of expression mm/kmsan/hooks.c:271:75: sparse: sparse: incorrect type in argument 3 (different address spaces) @@ expected void const *user_addr @@ got void [noderef] __user *to @@ mm/kmsan/hooks.c:271:75: sparse: expected void const *user_addr mm/kmsan/hooks.c:271:75: sparse: got void [noderef] __user *to mm/kmsan/hooks.c:280:50: sparse: sparse: cast removes address space '__user' of expression mm/kmsan/hooks.c:306:59: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:319:79: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:325:79: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:421:78: sparse: sparse: Using plain integer as NULL pointer vim +/__user +269 mm/kmsan/hooks.c b073d7f8aee4eb Alexander Potapenko 2022-09-15 247 75cf0290271bf6 Alexander Potapenko 2022-09-15 248 void kmsan_copy_to_user(void __user *to, const void *from, size_t to_copy, 75cf0290271bf6 Alexander Potapenko 2022-09-15 249 size_t left) 75cf0290271bf6 Alexander Potapenko 2022-09-15 250 { 75cf0290271bf6 Alexander Potapenko 2022-09-15 251 unsigned long ua_flags; 75cf0290271bf6 Alexander Potapenko 2022-09-15 252 75cf0290271bf6 Alexander Potapenko 2022-09-15 253 if (!kmsan_enabled || kmsan_in_runtime()) 75cf0290271bf6 Alexander Potapenko 2022-09-15 254 return; 75cf0290271bf6 Alexander Potapenko 2022-09-15 255 /* 75cf0290271bf6 Alexander Potapenko 2022-09-15 256 * At this point we've copied the memory already. It's hard to check it 75cf0290271bf6 Alexander Potapenko 2022-09-15 257 * before copying, as the size of actually copied buffer is unknown. 75cf0290271bf6 Alexander Potapenko 2022-09-15 258 */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 259 75cf0290271bf6 Alexander Potapenko 2022-09-15 260 /* copy_to_user() may copy zero bytes. No need to check. */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 261 if (!to_copy) 75cf0290271bf6 Alexander Potapenko 2022-09-15 262 return; 75cf0290271bf6 Alexander Potapenko 2022-09-15 263 /* Or maybe copy_to_user() failed to copy anything. */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 264 if (to_copy <= left) 75cf0290271bf6 Alexander Potapenko 2022-09-15 265 return; 75cf0290271bf6 Alexander Potapenko 2022-09-15 266 75cf0290271bf6 Alexander Potapenko 2022-09-15 267 ua_flags = user_access_save(); f926e9326f3a79 Ilya Leoshkevich 2024-06-21 268 if (!IS_ENABLED(CONFIG_ARCH_HAS_NON_OVERLAPPING_ADDRESS_SPACE) || f926e9326f3a79 Ilya Leoshkevich 2024-06-21 @269 (u64)to < TASK_SIZE) { 75cf0290271bf6 Alexander Potapenko 2022-09-15 270 /* This is a user memory access, check it. */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 271 kmsan_internal_check_memory((void *)from, to_copy - left, to, 75cf0290271bf6 Alexander Potapenko 2022-09-15 272 REASON_COPY_TO_USER); 75cf0290271bf6 Alexander Potapenko 2022-09-15 273 } else { 75cf0290271bf6 Alexander Potapenko 2022-09-15 274 /* Otherwise this is a kernel memory access. This happens when a 75cf0290271bf6 Alexander Potapenko 2022-09-15 275 * compat syscall passes an argument allocated on the kernel 75cf0290271bf6 Alexander Potapenko 2022-09-15 276 * stack to a real syscall. 75cf0290271bf6 Alexander Potapenko 2022-09-15 277 * Don't check anything, just copy the shadow of the copied 75cf0290271bf6 Alexander Potapenko 2022-09-15 278 * bytes. 75cf0290271bf6 Alexander Potapenko 2022-09-15 279 */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 280 kmsan_internal_memmove_metadata((void *)to, (void *)from, 75cf0290271bf6 Alexander Potapenko 2022-09-15 281 to_copy - left); 75cf0290271bf6 Alexander Potapenko 2022-09-15 282 } 75cf0290271bf6 Alexander Potapenko 2022-09-15 283 user_access_restore(ua_flags); 75cf0290271bf6 Alexander Potapenko 2022-09-15 284 } 75cf0290271bf6 Alexander Potapenko 2022-09-15 285 EXPORT_SYMBOL(kmsan_copy_to_user); 75cf0290271bf6 Alexander Potapenko 2022-09-15 286 :::::: The code at line 269 was first introduced by commit :::::: f926e9326f3a79f7e01ac790e2361f44d8ca8320 kmsan: fix kmsan_copy_to_user() on arches with overlapping address spaces :::::: TO: Ilya Leoshkevich :::::: CC: Andrew Morton -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki