lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 20 Jan 2021 23:12:18 +0800
From:   kernel test robot <lkp@...el.com>
To:     Wei Liu <wei.liu@...nel.org>,
        Linux on Hyper-V List <linux-hyperv@...r.kernel.org>
Cc:     kbuild-all@...ts.01.org, virtualization@...ts.linux-foundation.org,
        Linux Kernel List <linux-kernel@...r.kernel.org>,
        Michael Kelley <mikelley@...rosoft.com>,
        Vineeth Pillai <viremana@...ux.microsoft.com>,
        Sunil Muthuswamy <sunilmut@...rosoft.com>,
        Nuno Das Neves <nunodasneves@...ux.microsoft.com>,
        pasha.tatashin@...een.com, Wei Liu <wei.liu@...nel.org>,
        Lillian Grassin-Drake <ligrassi@...rosoft.com>
Subject: Re: [PATCH v5 06/16] x86/hyperv: allocate output arg pages if
 required

Hi Wei,

I love your patch! Perhaps something to improve:

[auto build test WARNING on e71ba9452f0b5b2e8dc8aa5445198cd9214a6a62]

url:    https://github.com/0day-ci/linux/commits/Wei-Liu/Introducing-Linux-root-partition-support-for-Microsoft-Hypervisor/20210120-215640
base:    e71ba9452f0b5b2e8dc8aa5445198cd9214a6a62
config: x86_64-randconfig-s021-20210120 (attached as .config)
compiler: gcc-9 (Debian 9.3.0-15) 9.3.0
reproduce:
        # apt-get install sparse
        # sparse version: v0.6.3-208-g46a52ca4-dirty
        # https://github.com/0day-ci/linux/commit/f93337fc44e13a1506633f5d308bf74a8311dada
        git remote add linux-review https://github.com/0day-ci/linux
        git fetch --no-tags linux-review Wei-Liu/Introducing-Linux-root-partition-support-for-Microsoft-Hypervisor/20210120-215640
        git checkout f93337fc44e13a1506633f5d308bf74a8311dada
        # save the attached .config to linux build tree
        make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' ARCH=x86_64 

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>


"sparse warnings: (new ones prefixed by >>)"
   arch/x86/hyperv/hv_init.c:84:30: sparse: sparse: incorrect type in initializer (different address spaces) @@     expected void const [noderef] __percpu *__vpp_verify @@     got void [noderef] __percpu ** @@
   arch/x86/hyperv/hv_init.c:84:30: sparse:     expected void const [noderef] __percpu *__vpp_verify
   arch/x86/hyperv/hv_init.c:84:30: sparse:     got void [noderef] __percpu **
   arch/x86/hyperv/hv_init.c:89:39: sparse: sparse: incorrect type in initializer (different address spaces) @@     expected void const [noderef] __percpu *__vpp_verify @@     got void [noderef] __percpu ** @@
   arch/x86/hyperv/hv_init.c:89:39: sparse:     expected void const [noderef] __percpu *__vpp_verify
   arch/x86/hyperv/hv_init.c:89:39: sparse:     got void [noderef] __percpu **
   arch/x86/hyperv/hv_init.c:221:30: sparse: sparse: incorrect type in initializer (different address spaces) @@     expected void const [noderef] __percpu *__vpp_verify @@     got void [noderef] __percpu ** @@
   arch/x86/hyperv/hv_init.c:221:30: sparse:     expected void const [noderef] __percpu *__vpp_verify
   arch/x86/hyperv/hv_init.c:221:30: sparse:     got void [noderef] __percpu **
   arch/x86/hyperv/hv_init.c:228:39: sparse: sparse: incorrect type in initializer (different address spaces) @@     expected void const [noderef] __percpu *__vpp_verify @@     got void [noderef] __percpu ** @@
   arch/x86/hyperv/hv_init.c:228:39: sparse:     expected void const [noderef] __percpu *__vpp_verify
   arch/x86/hyperv/hv_init.c:228:39: sparse:     got void [noderef] __percpu **
   arch/x86/hyperv/hv_init.c:364:31: sparse: sparse: incorrect type in assignment (different address spaces) @@     expected void [noderef] __percpu **extern [addressable] [toplevel] hyperv_pcpu_input_arg @@     got void *[noderef] __percpu * @@
   arch/x86/hyperv/hv_init.c:364:31: sparse:     expected void [noderef] __percpu **extern [addressable] [toplevel] hyperv_pcpu_input_arg
   arch/x86/hyperv/hv_init.c:364:31: sparse:     got void *[noderef] __percpu *
>> arch/x86/hyperv/hv_init.c:370:40: sparse: sparse: incorrect type in assignment (different address spaces) @@     expected void [noderef] __percpu **extern [addressable] [toplevel] hyperv_pcpu_output_arg @@     got void *[noderef] __percpu * @@
   arch/x86/hyperv/hv_init.c:370:40: sparse:     expected void [noderef] __percpu **extern [addressable] [toplevel] hyperv_pcpu_output_arg
   arch/x86/hyperv/hv_init.c:370:40: sparse:     got void *[noderef] __percpu *

vim +370 arch/x86/hyperv/hv_init.c

   211	
   212	static int hv_cpu_die(unsigned int cpu)
   213	{
   214		struct hv_reenlightenment_control re_ctrl;
   215		unsigned int new_cpu;
   216		unsigned long flags;
   217		void **input_arg;
   218		void *pg;
   219	
   220		local_irq_save(flags);
 > 221		input_arg = (void **)this_cpu_ptr(hyperv_pcpu_input_arg);
   222		pg = *input_arg;
   223		*input_arg = NULL;
   224	
   225		if (hv_root_partition) {
   226			void **output_arg;
   227	
   228			output_arg = (void **)this_cpu_ptr(hyperv_pcpu_output_arg);
   229			*output_arg = NULL;
   230		}
   231	
   232		local_irq_restore(flags);
   233	
   234		free_pages((unsigned long)pg, hv_root_partition ? 1 : 0);
   235	
   236		if (hv_vp_assist_page && hv_vp_assist_page[cpu])
   237			wrmsrl(HV_X64_MSR_VP_ASSIST_PAGE, 0);
   238	
   239		if (hv_reenlightenment_cb == NULL)
   240			return 0;
   241	
   242		rdmsrl(HV_X64_MSR_REENLIGHTENMENT_CONTROL, *((u64 *)&re_ctrl));
   243		if (re_ctrl.target_vp == hv_vp_index[cpu]) {
   244			/*
   245			 * Reassign reenlightenment notifications to some other online
   246			 * CPU or just disable the feature if there are no online CPUs
   247			 * left (happens on hibernation).
   248			 */
   249			new_cpu = cpumask_any_but(cpu_online_mask, cpu);
   250	
   251			if (new_cpu < nr_cpu_ids)
   252				re_ctrl.target_vp = hv_vp_index[new_cpu];
   253			else
   254				re_ctrl.enabled = 0;
   255	
   256			wrmsrl(HV_X64_MSR_REENLIGHTENMENT_CONTROL, *((u64 *)&re_ctrl));
   257		}
   258	
   259		return 0;
   260	}
   261	
   262	static int __init hv_pci_init(void)
   263	{
   264		int gen2vm = efi_enabled(EFI_BOOT);
   265	
   266		/*
   267		 * For Generation-2 VM, we exit from pci_arch_init() by returning 0.
   268		 * The purpose is to suppress the harmless warning:
   269		 * "PCI: Fatal: No config space access function found"
   270		 */
   271		if (gen2vm)
   272			return 0;
   273	
   274		/* For Generation-1 VM, we'll proceed in pci_arch_init().  */
   275		return 1;
   276	}
   277	
   278	static int hv_suspend(void)
   279	{
   280		union hv_x64_msr_hypercall_contents hypercall_msr;
   281		int ret;
   282	
   283		/*
   284		 * Reset the hypercall page as it is going to be invalidated
   285		 * accross hibernation. Setting hv_hypercall_pg to NULL ensures
   286		 * that any subsequent hypercall operation fails safely instead of
   287		 * crashing due to an access of an invalid page. The hypercall page
   288		 * pointer is restored on resume.
   289		 */
   290		hv_hypercall_pg_saved = hv_hypercall_pg;
   291		hv_hypercall_pg = NULL;
   292	
   293		/* Disable the hypercall page in the hypervisor */
   294		rdmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
   295		hypercall_msr.enable = 0;
   296		wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
   297	
   298		ret = hv_cpu_die(0);
   299		return ret;
   300	}
   301	
   302	static void hv_resume(void)
   303	{
   304		union hv_x64_msr_hypercall_contents hypercall_msr;
   305		int ret;
   306	
   307		ret = hv_cpu_init(0);
   308		WARN_ON(ret);
   309	
   310		/* Re-enable the hypercall page */
   311		rdmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
   312		hypercall_msr.enable = 1;
   313		hypercall_msr.guest_physical_address =
   314			vmalloc_to_pfn(hv_hypercall_pg_saved);
   315		wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
   316	
   317		hv_hypercall_pg = hv_hypercall_pg_saved;
   318		hv_hypercall_pg_saved = NULL;
   319	
   320		/*
   321		 * Reenlightenment notifications are disabled by hv_cpu_die(0),
   322		 * reenable them here if hv_reenlightenment_cb was previously set.
   323		 */
   324		if (hv_reenlightenment_cb)
   325			set_hv_tscchange_cb(hv_reenlightenment_cb);
   326	}
   327	
   328	/* Note: when the ops are called, only CPU0 is online and IRQs are disabled. */
   329	static struct syscore_ops hv_syscore_ops = {
   330		.suspend	= hv_suspend,
   331		.resume		= hv_resume,
   332	};
   333	
   334	/*
   335	 * This function is to be invoked early in the boot sequence after the
   336	 * hypervisor has been detected.
   337	 *
   338	 * 1. Setup the hypercall page.
   339	 * 2. Register Hyper-V specific clocksource.
   340	 * 3. Setup Hyper-V specific APIC entry points.
   341	 */
   342	void __init hyperv_init(void)
   343	{
   344		u64 guest_id, required_msrs;
   345		union hv_x64_msr_hypercall_contents hypercall_msr;
   346		int cpuhp, i;
   347	
   348		if (x86_hyper_type != X86_HYPER_MS_HYPERV)
   349			return;
   350	
   351		/* Absolutely required MSRs */
   352		required_msrs = HV_MSR_HYPERCALL_AVAILABLE |
   353			HV_MSR_VP_INDEX_AVAILABLE;
   354	
   355		if ((ms_hyperv.features & required_msrs) != required_msrs)
   356			return;
   357	
   358		/*
   359		 * Allocate the per-CPU state for the hypercall input arg.
   360		 * If this allocation fails, we will not be able to setup
   361		 * (per-CPU) hypercall input page and thus this failure is
   362		 * fatal on Hyper-V.
   363		 */
   364		hyperv_pcpu_input_arg = alloc_percpu(void  *);
   365	
   366		BUG_ON(hyperv_pcpu_input_arg == NULL);
   367	
   368		/* Allocate the per-CPU state for output arg for root */
   369		if (hv_root_partition) {
 > 370			hyperv_pcpu_output_arg = alloc_percpu(void *);
   371			BUG_ON(hyperv_pcpu_output_arg == NULL);
   372		}
   373	
   374		/* Allocate percpu VP index */
   375		hv_vp_index = kmalloc_array(num_possible_cpus(), sizeof(*hv_vp_index),
   376					    GFP_KERNEL);
   377		if (!hv_vp_index)
   378			return;
   379	
   380		for (i = 0; i < num_possible_cpus(); i++)
   381			hv_vp_index[i] = VP_INVAL;
   382	
   383		hv_vp_assist_page = kcalloc(num_possible_cpus(),
   384					    sizeof(*hv_vp_assist_page), GFP_KERNEL);
   385		if (!hv_vp_assist_page) {
   386			ms_hyperv.hints &= ~HV_X64_ENLIGHTENED_VMCS_RECOMMENDED;
   387			goto free_vp_index;
   388		}
   389	
   390		cpuhp = cpuhp_setup_state(CPUHP_AP_ONLINE_DYN, "x86/hyperv_init:online",
   391					  hv_cpu_init, hv_cpu_die);
   392		if (cpuhp < 0)
   393			goto free_vp_assist_page;
   394	
   395		/*
   396		 * Setup the hypercall page and enable hypercalls.
   397		 * 1. Register the guest ID
   398		 * 2. Enable the hypercall and register the hypercall page
   399		 */
   400		guest_id = generate_guest_id(0, LINUX_VERSION_CODE, 0);
   401		wrmsrl(HV_X64_MSR_GUEST_OS_ID, guest_id);
   402	
   403		hv_hypercall_pg = __vmalloc_node_range(PAGE_SIZE, 1, VMALLOC_START,
   404				VMALLOC_END, GFP_KERNEL, PAGE_KERNEL_ROX,
   405				VM_FLUSH_RESET_PERMS, NUMA_NO_NODE,
   406				__builtin_return_address(0));
   407		if (hv_hypercall_pg == NULL) {
   408			wrmsrl(HV_X64_MSR_GUEST_OS_ID, 0);
   409			goto remove_cpuhp_state;
   410		}
   411	
   412		rdmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
   413		hypercall_msr.enable = 1;
   414		hypercall_msr.guest_physical_address = vmalloc_to_pfn(hv_hypercall_pg);
   415		wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
   416	
   417		/*
   418		 * Ignore any errors in setting up stimer clockevents
   419		 * as we can run with the LAPIC timer as a fallback.
   420		 */
   421		(void)hv_stimer_alloc();
   422	
   423		hv_apic_init();
   424	
   425		x86_init.pci.arch_init = hv_pci_init;
   426	
   427		register_syscore_ops(&hv_syscore_ops);
   428	
   429		return;
   430	
   431	remove_cpuhp_state:
   432		cpuhp_remove_state(cpuhp);
   433	free_vp_assist_page:
   434		kfree(hv_vp_assist_page);
   435		hv_vp_assist_page = NULL;
   436	free_vp_index:
   437		kfree(hv_vp_index);
   438		hv_vp_index = NULL;
   439	}
   440	

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Download attachment ".config.gz" of type "application/gzip" (36939 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ