From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 80047C369CB for ; Tue, 22 Apr 2025 08:16:09 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 99AB36B000E; Tue, 22 Apr 2025 04:16:07 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 94A1D6B0010; Tue, 22 Apr 2025 04:16:07 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8119F6B0030; Tue, 22 Apr 2025 04:16:07 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 5E87E6B000E for ; Tue, 22 Apr 2025 04:16:07 -0400 (EDT) Received: from smtpin24.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 4D3DAC64EE for ; Tue, 22 Apr 2025 08:16:08 +0000 (UTC) X-FDA: 83360972016.24.E647E5B Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.18]) by imf18.hostedemail.com (Postfix) with ESMTP id 95C6A1C0008 for ; Tue, 22 Apr 2025 08:16:05 +0000 (UTC) Authentication-Results: imf18.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="YVtNeZ/7"; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf18.hostedemail.com: domain of lkp@intel.com designates 192.198.163.18 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1745309766; a=rsa-sha256; cv=none; b=FHy5A7ZA15+8IDGmtpB8a9V+xyF7XLphJn8UTquuDdBM6n0h5Wde5EsRQE0k7ZZTEjGME1 boB+fa6aZLb3iISqaXy44jaiG+OispfOTH3dV7DVUz4b95e8CG4Ywv9YFiUoiSyjY280dO hvv8sjKnPsWqkPjBybtrlEalY97kk5A= ARC-Authentication-Results: i=1; imf18.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b="YVtNeZ/7"; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf18.hostedemail.com: domain of lkp@intel.com designates 192.198.163.18 as permitted sender) smtp.mailfrom=lkp@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1745309766; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=i0unGs634cAu/WEXaHrbdAZNx1mvNM1s67dmq8kM3XY=; b=S4DBhKFaUFx0/YwUc0NFwLYpGl1fAc7EjOsxRXJJLTYnqEfNx7LfnWH6+JZza7AXrnyTwT hJdOKs29//oxFlKuyFDA5IeWQYyozoQkfYepeAAoI61a/glWgGvBQwWYh8OhsQGro95B5X RCgSChBNWkJ8HCkkQOmcA0Wc8V/Cysw= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1745309765; x=1776845765; h=date:from:to:cc:subject:message-id:mime-version; bh=KvPOhS69oCGL7AaNjD3lCLWnbvb8F9DwlhqTzhsBovY=; b=YVtNeZ/7cUZSkbw6rsLb0CGbYrI67a1JzcG2SZ6WMu0OxECYsemIWUEt Zz3rA+bK8lpwKhtnauYTk4FlkczsaCZDoa4vDkpEGOD/4LMx3YOTGxSLn 08/rNByZIBMcLJ+c4DH3loPHbahgchqm/Omswwy4Ws5q96ns6Gf+bwfWw RKjtD3Mnug2+SUiNsyiq1NrQPTJN7CSL+5MgJbWmbJY+UB29eyJCc/xB3 SdxnLC6SW6GqLEqmA4E24F29mfVXU5cCo37pc/sjW5+tBBprERSvBBVgU 3/wvoRfztp4ZJocYif95fm7IrzZZP4/ic/C4WI8YeT9r8+kNSVSJslXkY g==; X-CSE-ConnectionGUID: wFr1OA8OQBeZQo4gx9csig== X-CSE-MsgGUID: faIS8JNJTSOG/aQWxKpzpA== X-IronPort-AV: E=McAfee;i="6700,10204,11410"; a="46091752" X-IronPort-AV: E=Sophos;i="6.15,230,1739865600"; d="scan'208";a="46091752" Received: from fmviesa007.fm.intel.com ([10.60.135.147]) by fmvoesa112.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Apr 2025 01:16:04 -0700 X-CSE-ConnectionGUID: h9o4rEQPRWesen/87u1OYA== X-CSE-MsgGUID: h6m6EyDeTsWXIwIA27GC6A== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.15,230,1739865600"; d="scan'208";a="131947041" Received: from lkp-server01.sh.intel.com (HELO 050dd05385d1) ([10.239.97.150]) by fmviesa007.fm.intel.com with ESMTP; 22 Apr 2025 01:16:02 -0700 Received: from kbuild by 050dd05385d1 with local (Exim 4.96) (envelope-from ) id 1u78nQ-0000jp-0R; Tue, 22 Apr 2025 08:16:00 +0000 Date: Tue, 22 Apr 2025 16:15:27 +0800 From: kernel test robot To: Ilya Leoshkevich Cc: oe-kbuild-all@lists.linux.dev, linux-kernel@vger.kernel.org, Andrew Morton , Linux Memory Management List , Alexander Potapenko Subject: mm/kmsan/hooks.c:269:14: sparse: sparse: cast removes address space '__user' of expression Message-ID: <202504221600.LRuSAGXA-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Rspam-User: X-Rspamd-Queue-Id: 95C6A1C0008 X-Rspamd-Server: rspam04 X-Stat-Signature: jadwmits9itzx178x1tpt7j5zb9x6b3d X-HE-Tag: 1745309765-61943 X-HE-Meta: U2FsdGVkX19J8N6g7wOAUTJVkn4BgYWhz5U1NLpIUv1c4pw8NDaZWWOkyrU9eaWBDy7j7bjnH/9UgT5oNOMkPUixfkGBFslpFWyqj/DLCVlPYadcCi6pPOuNmWbW6WCU6ercQfXouvbwUCOrgrhe3XIfdgl0PRSKb/HfuC57fgz/OKIM1h0mffrXV+bAYZW/7kbMfb95nLeA93X41nSIciMRJjhWdz0Ul7i5tOivum1rNR3IDuYKSQJAig0XHjdhjhDo2ARCEiouVRyI15iFUq9Ove/uZfw2otMUScV1VIlEkJJBYfVwZlmddZS0oFiPuqrOxe1EQVgp1NL7oYw9Ro1MXZ92Q/fWIYAMEJJ020zJXIhRod9ylcEBY6uCBSBjWC8GPE9cAJ8NqrEA7qwKu89x3lnOPDOT3iJ3DC3ndnGdNt3XE2N+FNhuKmsefjJ91g2k9D2uC90ySPwzQPSZy/Q4vIlHj3dW8jqeeAjGA+QZB1/QzCJARzd9IhATBkA8hnbNRiiypcP+mFKwzM3E/BED9DegNZWnxwhJB98gtXobtRNOFy2hTtaaMBbzKJvk1YUEbHfvfL8dOCs9S0e9558rujmyNh6ordgvs1rCUw7yl6rggkSQTaxAajZ90H2fwJ3vVZZ0FlgGj7EhcA6SVrFRSJJ64nSM87DgI9oahUdrGEokklkA2hPPgU/itGFQm3XfdQSeBKk7LGs2X+D34unQbXi8dPUNLGXCaDwysVNcZGOoUC+EFPCpTIWnkskz3xaQM+4Oi66lPyEY6YQGFZDVR+i/6Uu6jD+rA3rWW1TvrxG1vW44fFduZ/7sDFQoTNBZ/n7RhJutLQ9ewnrEWCrJn9mLxoBH6NM9EA177SQ6zgSFUzetUcsHHrwgx7vLzOo8mBSR11XVEGtVIsy4oZptmu4safmZ4ianlIxpg21Nu4WfQptD1z1tk1QixIqqA7dP1KQz2loig3W16RA EzEoRI7u R/KX9Zo1qik48wlJzB3X6u2ygCicYtRwvQu7g1M5AJX4ZadyOskyH31IxGVSfwMqiV7K7zeYe3I/JS4DKUuCnIx+kaGenlM2vRatiPhwo9LvXOTnz0xVWo+4bMqUy4Rya8BCkyHrcEzOFkYLKmhGavoe6/P3V6Jbz/2lKBuHAyFjSzK6O7knon1cMbqNAzqOB/2dh/2Q5pWyQ6L65AWADZ2AHRtuJ28mQwPSQz05SSg+9LDXDSzComDQz/aYr0p/umRUBor1ivWXYFaqe1rDc3FWQk7vyDzAiw3puPq7LQ/dQA2e0ITvkIcf8//y+5Iw+KxZ5O4EjvOITOqVp5Xd+rnK42vFn13XbzyUAPJxZ7L2wQsPB2+tAa0nIrdSIOL1pxpdbFG7CvBUZZwYiLGMwfgAzuQgS0PvsPbYdOecpVauMlxTooOsWF+KDoDiw/+c9EW9a11XQJP+9qrI= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master head: a33b5a08cbbdd7aadff95f40cbb45ab86841679e commit: 3a8f6f3b469b4075919a3613e182f9a70df92d46 kmsan: enable on s390 date: 10 months ago config: s390-randconfig-r113-20250422 (https://download.01.org/0day-ci/archive/20250422/202504221600.LRuSAGXA-lkp@intel.com/config) compiler: clang version 21.0.0git (https://github.com/llvm/llvm-project f819f46284f2a79790038e1f6649172789734ae8) reproduce: (https://download.01.org/0day-ci/archive/20250422/202504221600.LRuSAGXA-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202504221600.LRuSAGXA-lkp@intel.com/ sparse warnings: (new ones prefixed by >>) >> mm/kmsan/hooks.c:269:14: sparse: sparse: cast removes address space '__user' of expression mm/kmsan/hooks.c:271:75: sparse: sparse: incorrect type in argument 3 (different address spaces) @@ expected void const *user_addr @@ got void [noderef] __user *to @@ mm/kmsan/hooks.c:271:75: sparse: expected void const *user_addr mm/kmsan/hooks.c:271:75: sparse: got void [noderef] __user *to mm/kmsan/hooks.c:280:50: sparse: sparse: cast removes address space '__user' of expression mm/kmsan/hooks.c:306:59: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:319:79: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:325:79: sparse: sparse: Using plain integer as NULL pointer mm/kmsan/hooks.c:421:78: sparse: sparse: Using plain integer as NULL pointer vim +/__user +269 mm/kmsan/hooks.c b073d7f8aee4eb Alexander Potapenko 2022-09-15 247 75cf0290271bf6 Alexander Potapenko 2022-09-15 248 void kmsan_copy_to_user(void __user *to, const void *from, size_t to_copy, 75cf0290271bf6 Alexander Potapenko 2022-09-15 249 size_t left) 75cf0290271bf6 Alexander Potapenko 2022-09-15 250 { 75cf0290271bf6 Alexander Potapenko 2022-09-15 251 unsigned long ua_flags; 75cf0290271bf6 Alexander Potapenko 2022-09-15 252 75cf0290271bf6 Alexander Potapenko 2022-09-15 253 if (!kmsan_enabled || kmsan_in_runtime()) 75cf0290271bf6 Alexander Potapenko 2022-09-15 254 return; 75cf0290271bf6 Alexander Potapenko 2022-09-15 255 /* 75cf0290271bf6 Alexander Potapenko 2022-09-15 256 * At this point we've copied the memory already. It's hard to check it 75cf0290271bf6 Alexander Potapenko 2022-09-15 257 * before copying, as the size of actually copied buffer is unknown. 75cf0290271bf6 Alexander Potapenko 2022-09-15 258 */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 259 75cf0290271bf6 Alexander Potapenko 2022-09-15 260 /* copy_to_user() may copy zero bytes. No need to check. */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 261 if (!to_copy) 75cf0290271bf6 Alexander Potapenko 2022-09-15 262 return; 75cf0290271bf6 Alexander Potapenko 2022-09-15 263 /* Or maybe copy_to_user() failed to copy anything. */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 264 if (to_copy <= left) 75cf0290271bf6 Alexander Potapenko 2022-09-15 265 return; 75cf0290271bf6 Alexander Potapenko 2022-09-15 266 75cf0290271bf6 Alexander Potapenko 2022-09-15 267 ua_flags = user_access_save(); f926e9326f3a79 Ilya Leoshkevich 2024-06-21 268 if (!IS_ENABLED(CONFIG_ARCH_HAS_NON_OVERLAPPING_ADDRESS_SPACE) || f926e9326f3a79 Ilya Leoshkevich 2024-06-21 @269 (u64)to < TASK_SIZE) { 75cf0290271bf6 Alexander Potapenko 2022-09-15 270 /* This is a user memory access, check it. */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 271 kmsan_internal_check_memory((void *)from, to_copy - left, to, 75cf0290271bf6 Alexander Potapenko 2022-09-15 272 REASON_COPY_TO_USER); 75cf0290271bf6 Alexander Potapenko 2022-09-15 273 } else { 75cf0290271bf6 Alexander Potapenko 2022-09-15 274 /* Otherwise this is a kernel memory access. This happens when a 75cf0290271bf6 Alexander Potapenko 2022-09-15 275 * compat syscall passes an argument allocated on the kernel 75cf0290271bf6 Alexander Potapenko 2022-09-15 276 * stack to a real syscall. 75cf0290271bf6 Alexander Potapenko 2022-09-15 277 * Don't check anything, just copy the shadow of the copied 75cf0290271bf6 Alexander Potapenko 2022-09-15 278 * bytes. 75cf0290271bf6 Alexander Potapenko 2022-09-15 279 */ 75cf0290271bf6 Alexander Potapenko 2022-09-15 280 kmsan_internal_memmove_metadata((void *)to, (void *)from, 75cf0290271bf6 Alexander Potapenko 2022-09-15 281 to_copy - left); 75cf0290271bf6 Alexander Potapenko 2022-09-15 282 } 75cf0290271bf6 Alexander Potapenko 2022-09-15 283 user_access_restore(ua_flags); 75cf0290271bf6 Alexander Potapenko 2022-09-15 284 } 75cf0290271bf6 Alexander Potapenko 2022-09-15 285 EXPORT_SYMBOL(kmsan_copy_to_user); 75cf0290271bf6 Alexander Potapenko 2022-09-15 286 :::::: The code at line 269 was first introduced by commit :::::: f926e9326f3a79f7e01ac790e2361f44d8ca8320 kmsan: fix kmsan_copy_to_user() on arches with overlapping address spaces :::::: TO: Ilya Leoshkevich :::::: CC: Andrew Morton -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki