Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp360710pxx; Wed, 28 Oct 2020 06:42:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwOOW1zwXoh5OnQ3lWgki1X2pw6ly1h5l3K8Mwuf1NQUWwdt2Vr7E6SWpkUYsonVHdfWae3 X-Received: by 2002:a17:906:e10e:: with SMTP id gj14mr8080272ejb.134.1603892546393; Wed, 28 Oct 2020 06:42:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603892546; cv=none; d=google.com; s=arc-20160816; b=aKLwhEXkwFLca7ClcUGCOejqYkp4wewf5jPNUxbOFYK4bS3f3oa172iMMnGvB0KlOC udl9tJU/UKA05EZ8VWtPijhgxzHoznJZtKK6a+fR1zAGGuoG5/wVL80p9OKxrd4sv2HI ZRB3EbG7FO8sUxd6eX7Mq/p8jVwo09MrbeI2Sc9eO5BEc6EN2tdRanbmL5UlRHNn0POi y0CVd9NL0am/lp/TKzCp2wSSB4CjiIvVfj054BcSJ5Qcb85Us5fYvk5MYecYB3f97HaP IvS+Btu3GIo51WeJJAAOOIC2adRe++6xssYhH8lVPkLs3GHf/cdhSpZM2rDBfY4NhaP7 XAtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Qo91AIzwSu6ucBpK+i2KPJPH6cQFR9qbyXOXBeyoHco=; b=d3a5MBuDO+bTziy+XMnHM3SXxs+gslD8L4zKMpb9qR4l97C5FmQHfRVcTiHG0yvBgn uLq2idKFfT2ezcBxs+shpU1fyNS7W+S7mtbdnv2Zc2CvPAQMvAFCfHYeSQv7CKmjHCWv NCp1U+Dtq6JUP0Td15Ih3KGve5LxYwzXSuZ/GT5XhxLrSseaz3FRHjvT0KSBIaEY+4zd HXDxTCg6oZOBI5kibwUwk113AKg3kAC4jRKsXGrPAHijuZXMYIdvEtfnOfT6RWEgAhNR 5NcsEbYUK4pkDwL060F2YsKuIBrNSvjIqmmeIlNGL8PiEM3IxA4kWJe4gQmVtKZFCfQ8 m55A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xWqpdfgo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bt10si1135660edb.503.2020.10.28.06.42.04; Wed, 28 Oct 2020 06:42:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=xWqpdfgo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1802819AbgJ0Pvj (ORCPT + 99 others); Tue, 27 Oct 2020 11:51:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:51268 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1799841AbgJ0Pdk (ORCPT ); Tue, 27 Oct 2020 11:33:40 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DA1EB20728; Tue, 27 Oct 2020 15:33:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603812820; bh=9OUV9roJZpMrpK0M9ATSlpnoa1AX7oBeOfpp8/ZDJ5c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xWqpdfgo6zBUj8axaC8rr8AbjNTfO4xzINFxRqnrGj69c340KAR853IyYbKsJFY7L tPt14z12t+v1C1sV6ZNyLVYPqr5QbuKqxw5mgVRm7Pk1EdbJA1t1KVV69uRw1XUtWz cj+AMzoMOzYx+V73LzZh3mR1fQRBiDXdIKIdhm14= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nathan Chancellor , Felipe Balbi , Sasha Levin Subject: [PATCH 5.9 310/757] usb: dwc2: Fix parameter type in function pointer prototype Date: Tue, 27 Oct 2020 14:49:20 +0100 Message-Id: <20201027135505.086949558@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nathan Chancellor [ Upstream commit 362b9398c962c9ec563653444e15ef9032ef3a90 ] When booting up on a Raspberry Pi 4 with Control Flow Integrity checking enabled, the following warning/panic happens: [ 1.626435] CFI failure (target: dwc2_set_bcm_params+0x0/0x4): [ 1.632408] WARNING: CPU: 0 PID: 32 at kernel/cfi.c:30 __cfi_check_fail+0x54/0x5c [ 1.640021] Modules linked in: [ 1.643137] CPU: 0 PID: 32 Comm: kworker/0:1 Not tainted 5.8.0-rc6-next-20200724-00051-g89ba619726de #1 [ 1.652693] Hardware name: Raspberry Pi 4 Model B Rev 1.2 (DT) [ 1.658637] Workqueue: events deferred_probe_work_func [ 1.663870] pstate: 60000005 (nZCv daif -PAN -UAO BTYPE=--) [ 1.669542] pc : __cfi_check_fail+0x54/0x5c [ 1.673798] lr : __cfi_check_fail+0x54/0x5c [ 1.678050] sp : ffff8000102bbaa0 [ 1.681419] x29: ffff8000102bbaa0 x28: ffffab09e21c7000 [ 1.686829] x27: 0000000000000402 x26: ffff0000f6e7c228 [ 1.692238] x25: 00000000fb7cdb0d x24: 0000000000000005 [ 1.697647] x23: ffffab09e2515000 x22: ffffab09e069a000 [ 1.703055] x21: 4c550309df1cf4c1 x20: ffffab09e2433c60 [ 1.708462] x19: ffffab09e160dc50 x18: ffff0000f6e8cc78 [ 1.713870] x17: 0000000000000041 x16: ffffab09e0bce6f8 [ 1.719278] x15: ffffab09e1c819b7 x14: 0000000000000003 [ 1.724686] x13: 00000000ffffefff x12: 0000000000000000 [ 1.730094] x11: 0000000000000000 x10: 00000000ffffffff [ 1.735501] x9 : c932f7abfc4bc600 x8 : c932f7abfc4bc600 [ 1.740910] x7 : 077207610770075f x6 : ffff0000f6c38f00 [ 1.746317] x5 : 0000000000000000 x4 : 0000000000000000 [ 1.751723] x3 : 0000000000000000 x2 : 0000000000000000 [ 1.757129] x1 : ffff8000102bb7d8 x0 : 0000000000000032 [ 1.762539] Call trace: [ 1.765030] __cfi_check_fail+0x54/0x5c [ 1.768938] __cfi_check+0x5fa6c/0x66afc [ 1.772932] dwc2_init_params+0xd74/0xd78 [ 1.777012] dwc2_driver_probe+0x484/0x6ec [ 1.781180] platform_drv_probe+0xb4/0x100 [ 1.785350] really_probe+0x228/0x63c [ 1.789076] driver_probe_device+0x80/0xc0 [ 1.793247] __device_attach_driver+0x114/0x160 [ 1.797857] bus_for_each_drv+0xa8/0x128 [ 1.801851] __device_attach.llvm.14901095709067289134+0xc0/0x170 [ 1.808050] bus_probe_device+0x44/0x100 [ 1.812044] deferred_probe_work_func+0x78/0xb8 [ 1.816656] process_one_work+0x204/0x3c4 [ 1.820736] worker_thread+0x2f0/0x4c4 [ 1.824552] kthread+0x174/0x184 [ 1.827837] ret_from_fork+0x10/0x18 CFI validates that all indirect calls go to a function with the same exact function pointer prototype. In this case, dwc2_set_bcm_params is the target, which has a parameter of type 'struct dwc2_hsotg *', but it is being implicitly cast to have a parameter of type 'void *' because that is the set_params function pointer prototype. Make the function pointer protoype match the definitions so that there is no more violation. Fixes: 7de1debcd2de ("usb: dwc2: Remove platform static params") Link: https://github.com/ClangBuiltLinux/linux/issues/1107 Signed-off-by: Nathan Chancellor Signed-off-by: Felipe Balbi Signed-off-by: Sasha Levin --- drivers/usb/dwc2/params.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/usb/dwc2/params.c b/drivers/usb/dwc2/params.c index 8f9d061c4d5fa..a3611cdd1deaa 100644 --- a/drivers/usb/dwc2/params.c +++ b/drivers/usb/dwc2/params.c @@ -860,7 +860,7 @@ int dwc2_get_hwparams(struct dwc2_hsotg *hsotg) int dwc2_init_params(struct dwc2_hsotg *hsotg) { const struct of_device_id *match; - void (*set_params)(void *data); + void (*set_params)(struct dwc2_hsotg *data); dwc2_set_default_params(hsotg); dwc2_get_device_properties(hsotg); -- 2.25.1