lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:   Thu, 2 Dec 2021 17:24:04 +0800
From:   kernel test robot <lkp@...el.com>
To:     Yejune Deng <yejune.deng@...il.com>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org,
        Rich Felker <dalias@...c.org>
Subject: arch/sh/kernel/crash_dump.c:37:61: sparse: sparse: incorrect type in
 argument 2 (different address spaces)

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   58e1100fdc5990b0cc0d4beaf2562a92e621ac7d
commit: 12285ff8667bf06c168113c10d3619834e423ae6 sh: kdump: add some attribute to function
date:   3 months ago
config: sh-randconfig-s032-20211202 (https://download.01.org/0day-ci/archive/20211202/202112021718.p7G5HuSW-lkp@intel.com/config)
compiler: sh4-linux-gcc (GCC) 11.2.0
reproduce:
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # apt-get install sparse
        # sparse version: v0.6.4-dirty
        # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12285ff8667bf06c168113c10d3619834e423ae6
        git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout 12285ff8667bf06c168113c10d3619834e423ae6
        # save the config file to linux build tree
        mkdir build_dir
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-11.2.0 make.cross C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=sh SHELL=/bin/bash arch/sh/kernel/ fs/proc/

If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@...el.com>


sparse warnings: (new ones prefixed by >>)
>> arch/sh/kernel/crash_dump.c:37:61: sparse: sparse: incorrect type in argument 2 (different address spaces) @@     expected void const *from @@     got void [noderef] __iomem * @@
   arch/sh/kernel/crash_dump.c:37:61: sparse:     expected void const *from
   arch/sh/kernel/crash_dump.c:37:61: sparse:     got void [noderef] __iomem *
>> arch/sh/kernel/crash_dump.c:42:28: sparse: sparse: incorrect type in argument 2 (different address spaces) @@     expected void const *__from @@     got void [noderef] __iomem * @@
   arch/sh/kernel/crash_dump.c:42:28: sparse:     expected void const *__from
   arch/sh/kernel/crash_dump.c:42:28: sparse:     got void [noderef] __iomem *

vim +37 arch/sh/kernel/crash_dump.c

    12	
    13	/**
    14	 * copy_oldmem_page - copy one page from "oldmem"
    15	 * @pfn: page frame number to be copied
    16	 * @buf: target memory address for the copy; this can be in kernel address
    17	 *	space or user address space (see @userbuf)
    18	 * @csize: number of bytes to copy
    19	 * @offset: offset in bytes into the page (based on pfn) to begin the copy
    20	 * @userbuf: if set, @buf is in user address space, use copy_to_user(),
    21	 *	otherwise @buf is in kernel address space, use memcpy().
    22	 *
    23	 * Copy a page from "oldmem". For this page, there is no pte mapped
    24	 * in the current kernel. We stitch up a pte, similar to kmap_atomic.
    25	 */
    26	ssize_t copy_oldmem_page(unsigned long pfn, char *buf,
    27	                               size_t csize, unsigned long offset, int userbuf)
    28	{
    29		void  __iomem *vaddr;
    30	
    31		if (!csize)
    32			return 0;
    33	
    34		vaddr = ioremap(pfn << PAGE_SHIFT, PAGE_SIZE);
    35	
    36		if (userbuf) {
  > 37			if (copy_to_user((void __user *)buf, (vaddr + offset), csize)) {
    38				iounmap(vaddr);
    39				return -EFAULT;
    40			}
    41		} else
  > 42		memcpy(buf, (vaddr + offset), csize);

---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ