x86/sev: Fix address space sparse warning
authorBorislav Petkov <bp@suse.de>
Mon, 2 May 2022 15:33:40 +0000 (17:33 +0200)
committerBorislav Petkov <bp@suse.de>
Mon, 2 May 2022 15:34:29 +0000 (17:34 +0200)
Fix:

  arch/x86/kernel/sev.c:605:16: warning: incorrect type in assignment (different address spaces)
  arch/x86/kernel/sev.c:605:16:    expected struct snp_secrets_page_layout *layout
  arch/x86/kernel/sev.c:605:16:    got void [noderef] __iomem *[assigned] mem

Reported-by: kernel test robot <lkp@intel.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Link: https://lore.kernel.org/r/202205022233.XgNDR7WR-lkp@intel.com
arch/x86/kernel/sev.c

index 1663750..c05f012 100644 (file)
@@ -589,20 +589,23 @@ static u64 __init get_secrets_page(void)
 static u64 __init get_snp_jump_table_addr(void)
 {
        struct snp_secrets_page_layout *layout;
+       void __iomem *mem;
        u64 pa, addr;
 
        pa = get_secrets_page();
        if (!pa)
                return 0;
 
-       layout = (__force void *)ioremap_encrypted(pa, PAGE_SIZE);
-       if (!layout) {
+       mem = ioremap_encrypted(pa, PAGE_SIZE);
+       if (!mem) {
                pr_err("Unable to locate AP jump table address: failed to map the SNP secrets page.\n");
                return 0;
        }
 
+       layout = (__force struct snp_secrets_page_layout *)mem;
+
        addr = layout->os_area.ap_jump_table_pa;
-       iounmap(layout);
+       iounmap(mem);
 
        return addr;
 }