From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on gnuweeb.org X-Spam-Level: X-Spam-Status: No, score=-6.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by gnuweeb.org (Postfix) with ESMTPS id D499E7E257 for ; Fri, 5 Aug 2022 18:30:31 +0000 (UTC) Authentication-Results: gnuweeb.org; dkim=pass (2048-bit key; unprotected) header.d=intel.com header.i=@intel.com header.a=rsa-sha256 header.s=Intel header.b=U8yFGPiN; dkim-atps=neutral DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1659724231; x=1691260231; h=date:from:to:cc:subject:message-id:mime-version; bh=gA1qhnPkrMiZHvLHh6i/+ElPloXtyPkqGPh8o3UFt/g=; b=U8yFGPiNMnX9y9qFj9v8lRfnPwPtO3ucN6djJFC+oZ4cvEaeXoxhdtBU C/6bpiFLcA7t/IgvAn6d0WlJ5x2IwC2fh1WWGQ//rGqvV6mA9UM8Yswc7 Z7yqrqQaTbT1A1cmx+b/Kq31VDaTTZi4Qvls1ig13S1CIfard2Q35K+MZ aiMVyQQMO8liGqUu5OAbUzvWfZTD1+Cab/bi3c+JNHg+DOpRkYP8VLrgx 2vpnwUTBAr9aBDyzmUp6yh/sQns2WE/aii/PJdy0zQUNYf1e7LeGzs4nb DtuI+F4OPtnBwV956K51A1LMUPlSzdzpY3vSDZFEs9aoHFgdh0qRyOFvo A==; X-IronPort-AV: E=McAfee;i="6400,9594,10430"; a="290270385" X-IronPort-AV: E=Sophos;i="5.93,216,1654585200"; d="scan'208";a="290270385" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Aug 2022 11:30:30 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.93,216,1654585200"; d="scan'208";a="579591597" Received: from lkp-server01.sh.intel.com (HELO e0eace57cfef) ([10.239.97.150]) by orsmga006.jf.intel.com with ESMTP; 05 Aug 2022 11:30:29 -0700 Received: from kbuild by e0eace57cfef with local (Exim 4.96) (envelope-from ) id 1oK25c-000JdR-1n; Fri, 05 Aug 2022 18:30:28 +0000 Date: Sat, 6 Aug 2022 02:29:39 +0800 From: kernel test robot To: Ammar Faizi , GNU/Weeb Mailing List Cc: kbuild-all@lists.01.org Subject: [ammarfaizi2-block:google/android/kernel/common/android-4.14-stable 640/9999] kernel/bpf/core.c:1500:31: sparse: sparse: incorrect type in return expression (different address spaces) Message-ID: <202208060219.PHmBmVPi-lkp@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline List-Id: tree: https://github.com/ammarfaizi2/linux-block google/android/kernel/common/android-4.14-stable head: c529afa15a69594211793a68cb70c873508061df commit: 9e61c87b1f47b4dc3d48de83d85e9f17c320f91e [640/9999] UPSTREAM: bpf: multi program support for cgroup+bpf config: i386-randconfig-s001 (https://download.01.org/0day-ci/archive/20220806/202208060219.PHmBmVPi-lkp@intel.com/config) compiler: gcc-7 (Ubuntu 7.5.0-6ubuntu2) 7.5.0 reproduce: # apt-get install sparse # sparse version: v0.6.4-39-gce1a6720-dirty # https://github.com/ammarfaizi2/linux-block/commit/9e61c87b1f47b4dc3d48de83d85e9f17c320f91e git remote add ammarfaizi2-block https://github.com/ammarfaizi2/linux-block git fetch --no-tags ammarfaizi2-block google/android/kernel/common/android-4.14-stable git checkout 9e61c87b1f47b4dc3d48de83d85e9f17c320f91e # save the config file mkdir build_dir && cp config build_dir/.config make W=1 C=1 CF='-fdiagnostic-prefix -D__CHECK_ENDIAN__' O=build_dir ARCH=i386 SHELL=/bin/bash fs/crypto/ kernel/bpf/ If you fix the issue, kindly add following tag where applicable Reported-by: kernel test robot sparse warnings: (new ones prefixed by >>) kernel/bpf/core.c:1095:43: sparse: sparse: arithmetics on pointers to functions >> kernel/bpf/core.c:1500:31: sparse: sparse: incorrect type in return expression (different address spaces) @@ expected struct bpf_prog_array [noderef] * @@ got void * @@ kernel/bpf/core.c:1500:31: sparse: expected struct bpf_prog_array [noderef] * kernel/bpf/core.c:1500:31: sparse: got void * >> kernel/bpf/core.c:1504:17: sparse: sparse: incorrect type in return expression (different address spaces) @@ expected struct bpf_prog_array [noderef] * @@ got struct bpf_prog_array * @@ kernel/bpf/core.c:1504:17: sparse: expected struct bpf_prog_array [noderef] * kernel/bpf/core.c:1504:17: sparse: got struct bpf_prog_array * kernel/bpf/core.c:1512:9: sparse: sparse: incorrect type in argument 1 (different address spaces) @@ expected struct callback_head *head @@ got struct callback_head [noderef] * @@ kernel/bpf/core.c:1512:9: sparse: expected struct callback_head *head kernel/bpf/core.c:1512:9: sparse: got struct callback_head [noderef] * kernel/bpf/core.c: note: in included file (through include/trace/trace_events.h, include/trace/define_trace.h, include/trace/events/bpf.h, ...): include/trace/events/bpf.h:56:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/bpf.h:92:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/bpf.h:117:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/bpf.h:188:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/bpf.h:228:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/bpf.h:282:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/bpf.h:312:1: sparse: sparse: Using plain integer as NULL pointer kernel/bpf/core.c: note: in included file (through include/trace/trace_events.h, include/trace/define_trace.h, include/trace/events/xdp.h, ...): include/trace/events/xdp.h:28:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/xdp.h:53:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/xdp.h:111:1: sparse: sparse: Using plain integer as NULL pointer include/trace/events/xdp.h:126:1: sparse: sparse: Using plain integer as NULL pointer vim +1500 kernel/bpf/core.c 1496 1497 struct bpf_prog_array __rcu *bpf_prog_array_alloc(u32 prog_cnt, gfp_t flags) 1498 { 1499 if (prog_cnt) > 1500 return kzalloc(sizeof(struct bpf_prog_array) + 1501 sizeof(struct bpf_prog *) * (prog_cnt + 1), 1502 flags); 1503 > 1504 return &empty_prog_array.hdr; 1505 } 1506 -- 0-DAY CI Kernel Test Service https://01.org/lkp