Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp262881pxx; Wed, 28 Oct 2020 04:26:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzIgX7+hQWjiKRXYafcsWZFe9kVcc5gmjqhO0gfRb9vo32o718OgmBu6l9IaKvyNXP2zYOo X-Received: by 2002:a05:6402:943:: with SMTP id h3mr7176485edz.88.1603884369039; Wed, 28 Oct 2020 04:26:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603884369; cv=none; d=google.com; s=arc-20160816; b=RnxzupVxzVhRaaOgvdHT88CI2dGLZPKBZ26wz9dd9zK84jiuDAfQT7gvNi7LNqXCM0 q01bm+zJsHSxbZ97C4NE+jd9UytQm55Q5Or3V2S7ujIZ56AYG71wJcSwtyzvohO8SpX0 iP5SONgswTMZv3ORPiwnIbiQum7/Nt4xhvivylwShSeWYT4/k/5T98nx0V1EH8yP7lWX BqBsf/GzKXIQwjakExh3lv5uE6IUVSNMbOZ2nLOyJ++R4ahqWDf1rJxf+A6hsA/Up9CJ EXmBY/Xuq+X8k0jtORHs09xA7F5IeKFcyTE/chqYbU+HVZCcSIy4ipZqTidztxQrbebn zYjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZlmEOYFy5yAFhG2yCVM9VIpVRsqkUZaND7OOKjxZ20Q=; b=AHPHZFoJPlXHLuHfbhvIbO93IXg6qbOh6JgPKnsDnoRGs8e5VmDGRKKqLRSqlb16zS VQ92Y8CUDL2tRBGcuQ32APNPRPaoPSpEWwmk3svEMRpAK/7b1twOtJSHojADyU2C4n1n ZWPMkW0g0nWKTOpQNx47gsU21wgsv2jG+BBrdrJG0NaN4Ra8BEfFl7dU3prB5bEVDJ8A m8oFuzlnfJT77rG3kodGn2Se1bPrn5DVWWuyyuHmFxyVHXgXJiIEalOyoYs4ax3482OL CAg21bE6MA0Mt9hfwTXkJCa27M3pCTulByAa3b9ULTZGTVO/05ahIrIRkhmEtjyVclM1 r3nw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bXbSAcby; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bs17si3022913ejb.543.2020.10.28.04.25.47; Wed, 28 Oct 2020 04:26:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bXbSAcby; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1790018AbgJ0PDe (ORCPT + 99 others); Tue, 27 Oct 2020 11:03:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:33186 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1785915AbgJ0O7r (ORCPT ); Tue, 27 Oct 2020 10:59:47 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 35BF620715; Tue, 27 Oct 2020 14:59:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603810786; bh=ao2j5f+NwiqK8tHkRvp8U3oOgLP9DTNwaK1kiSlhFQI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bXbSAcby5Vsv3RrBlsQXf8bd7cWvolG0+3AyjKgE5C3QbHL2jgHbqGRd0OBrVnEap aAnlGgyW7j6wpp5IohTb/xPxkq6KVWDGfFSOijBUzCyNKm98YXzTL6LhSohFyGVMjp xbW91pgFM8aqE1npev7kRM+/d+J7BaWE4jTxlOHc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nathan Chancellor , Felipe Balbi , Sasha Levin Subject: [PATCH 5.8 263/633] usb: dwc2: Fix parameter type in function pointer prototype Date: Tue, 27 Oct 2020 14:50:06 +0100 Message-Id: <20201027135535.000970367@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135522.655719020@linuxfoundation.org> References: <20201027135522.655719020@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nathan Chancellor [ Upstream commit 362b9398c962c9ec563653444e15ef9032ef3a90 ] When booting up on a Raspberry Pi 4 with Control Flow Integrity checking enabled, the following warning/panic happens: [ 1.626435] CFI failure (target: dwc2_set_bcm_params+0x0/0x4): [ 1.632408] WARNING: CPU: 0 PID: 32 at kernel/cfi.c:30 __cfi_check_fail+0x54/0x5c [ 1.640021] Modules linked in: [ 1.643137] CPU: 0 PID: 32 Comm: kworker/0:1 Not tainted 5.8.0-rc6-next-20200724-00051-g89ba619726de #1 [ 1.652693] Hardware name: Raspberry Pi 4 Model B Rev 1.2 (DT) [ 1.658637] Workqueue: events deferred_probe_work_func [ 1.663870] pstate: 60000005 (nZCv daif -PAN -UAO BTYPE=--) [ 1.669542] pc : __cfi_check_fail+0x54/0x5c [ 1.673798] lr : __cfi_check_fail+0x54/0x5c [ 1.678050] sp : ffff8000102bbaa0 [ 1.681419] x29: ffff8000102bbaa0 x28: ffffab09e21c7000 [ 1.686829] x27: 0000000000000402 x26: ffff0000f6e7c228 [ 1.692238] x25: 00000000fb7cdb0d x24: 0000000000000005 [ 1.697647] x23: ffffab09e2515000 x22: ffffab09e069a000 [ 1.703055] x21: 4c550309df1cf4c1 x20: ffffab09e2433c60 [ 1.708462] x19: ffffab09e160dc50 x18: ffff0000f6e8cc78 [ 1.713870] x17: 0000000000000041 x16: ffffab09e0bce6f8 [ 1.719278] x15: ffffab09e1c819b7 x14: 0000000000000003 [ 1.724686] x13: 00000000ffffefff x12: 0000000000000000 [ 1.730094] x11: 0000000000000000 x10: 00000000ffffffff [ 1.735501] x9 : c932f7abfc4bc600 x8 : c932f7abfc4bc600 [ 1.740910] x7 : 077207610770075f x6 : ffff0000f6c38f00 [ 1.746317] x5 : 0000000000000000 x4 : 0000000000000000 [ 1.751723] x3 : 0000000000000000 x2 : 0000000000000000 [ 1.757129] x1 : ffff8000102bb7d8 x0 : 0000000000000032 [ 1.762539] Call trace: [ 1.765030] __cfi_check_fail+0x54/0x5c [ 1.768938] __cfi_check+0x5fa6c/0x66afc [ 1.772932] dwc2_init_params+0xd74/0xd78 [ 1.777012] dwc2_driver_probe+0x484/0x6ec [ 1.781180] platform_drv_probe+0xb4/0x100 [ 1.785350] really_probe+0x228/0x63c [ 1.789076] driver_probe_device+0x80/0xc0 [ 1.793247] __device_attach_driver+0x114/0x160 [ 1.797857] bus_for_each_drv+0xa8/0x128 [ 1.801851] __device_attach.llvm.14901095709067289134+0xc0/0x170 [ 1.808050] bus_probe_device+0x44/0x100 [ 1.812044] deferred_probe_work_func+0x78/0xb8 [ 1.816656] process_one_work+0x204/0x3c4 [ 1.820736] worker_thread+0x2f0/0x4c4 [ 1.824552] kthread+0x174/0x184 [ 1.827837] ret_from_fork+0x10/0x18 CFI validates that all indirect calls go to a function with the same exact function pointer prototype. In this case, dwc2_set_bcm_params is the target, which has a parameter of type 'struct dwc2_hsotg *', but it is being implicitly cast to have a parameter of type 'void *' because that is the set_params function pointer prototype. Make the function pointer protoype match the definitions so that there is no more violation. Fixes: 7de1debcd2de ("usb: dwc2: Remove platform static params") Link: https://github.com/ClangBuiltLinux/linux/issues/1107 Signed-off-by: Nathan Chancellor Signed-off-by: Felipe Balbi Signed-off-by: Sasha Levin --- drivers/usb/dwc2/params.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/usb/dwc2/params.c b/drivers/usb/dwc2/params.c index ce736d67c7c34..fd73ddd8eb753 100644 --- a/drivers/usb/dwc2/params.c +++ b/drivers/usb/dwc2/params.c @@ -860,7 +860,7 @@ int dwc2_get_hwparams(struct dwc2_hsotg *hsotg) int dwc2_init_params(struct dwc2_hsotg *hsotg) { const struct of_device_id *match; - void (*set_params)(void *data); + void (*set_params)(struct dwc2_hsotg *data); dwc2_set_default_params(hsotg); dwc2_get_device_properties(hsotg); -- 2.25.1