Received: by 2002:a05:6358:f14:b0:e5:3b68:ec04 with SMTP id b20csp1516627rwj; Sun, 18 Dec 2022 09:40:37 -0800 (PST) X-Google-Smtp-Source: AMrXdXsXj/Q4j4PhdTDomA3CiysiEUowvbb+BfAhA5PZMKhWuIvhaGgogS7vyx/LzESZwDJYRK9V X-Received: by 2002:a17:90b:4a4b:b0:219:9940:e6f6 with SMTP id lb11-20020a17090b4a4b00b002199940e6f6mr6627542pjb.22.1671385236923; Sun, 18 Dec 2022 09:40:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671385236; cv=none; d=google.com; s=arc-20160816; b=JauPkqO3laTVRurvszkn8EChE5CkYvpzDrLqYk2ZVEmHU0QhggA1uveyarO72EjYJd 1Rr1Z+FwvqqWEOJkCQ8idNeRjYuTz6/eowvm3rFgqtLpZzi7O7fcAXFhgCjg8KlHSTVM AmnD6f1OFTkuU9oYZNrVTSHvM4TX7PRSXoztntkROgGaOpdDmPYUWOIs+3323sAnaFUb LcrS8XYaJPtjWHBQ4twNJRKo4QTIAx0QY3Yyzba62QncfPMV8GRGRAdADMKlbFuNEFv1 FHS9FyM3JzxP2R93JnEUuU50uQDLr9zDnYHc3jjBSy0VtoDMAwl2CJ2B+y9yaDBA+xyd WHPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=AuddC/d8St+dO6e7vDzwi93JIVbBqAfWm3FxRpZdVCs=; b=U6goKcAYX1pnYjGPwzDq+gY6sXnLO+1tyNZ+RK/wb87OFDF48ffcZJqMEcfDJIXO6y tXUdHLAo+vFMBIwZam47541J/EByuFCicuy00XJzwAJbYettz1ZNQVVD9jnkvSVVz8jD oRtIJh1Qgr2jMTvbgTYIpxdxnQ6MQgSuuenq4UVfkoUVOhmn+ynLWqpePY4moGegTjFq SAmVCffCEDDB+CUa4RVQGs3dPBir464g1S1pPH7ZRZOaa5cg2IOxN+KVoGB5lRdJNZTR TaQn3gFvohgtK/25cwR97l974Ign8X5Eb5seNBJp8kgnJGauV0UlxH3f+LCikrpNHOCw dm0A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=TnCNjNS6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id pi2-20020a17090b1e4200b0022387a1f9a5si9212569pjb.134.2022.12.18.09.40.28; Sun, 18 Dec 2022 09:40:36 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=TnCNjNS6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231741AbiLRQjb (ORCPT + 70 others); Sun, 18 Dec 2022 11:39:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38922 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232245AbiLRQix (ORCPT ); Sun, 18 Dec 2022 11:38:53 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A705817E2B; Sun, 18 Dec 2022 08:13:54 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id E83C360DD4; Sun, 18 Dec 2022 16:13:36 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C2FADC433F0; Sun, 18 Dec 2022 16:13:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1671380016; bh=74oED/ABmW0A+X9spJM7GV1K+ZhLhsueqGtIF4eopHE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TnCNjNS61mn+iRukovitPuoWYDMmSEBYF/s2dEOt/8aVc039U2ncU4RS0Rb4Pw8ba OKmqrziJQPr9nCfrBsELpeownwaCbkrZEmhY7AFEXWchbzfSvZCJl1PU83rSXNO8j1 cG8moQhrY5MXBYwNy+gNxq6EkPi3CBG+wbXTzAcjgkl8VFpK54HfJMzEMoUqa/7Z4S ehRKBkwZnj1XG0fHhRD/Yidwy6QmhvKz4UmWx/WbNjv4MrtkeAR5XNtffO0q+Ltx8F Aqpaisdj5IeNWFyhhp47jkoEAiZDL1muwSi0p2EhjR6tG1OYgPYBcbPiUvW3e7o+wE oTYfd3dCcU8Gw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Nathan Chancellor , Kees Cook , Jakub Kicinski , Sasha Levin , davem@davemloft.net, edumazet@google.com, pabeni@redhat.com, ndesaulniers@google.com, mkl@pengutronix.de, paul@xen.org, f.fainelli@gmail.com, colin.i.king@gmail.com, netdev@vger.kernel.org, llvm@lists.linux.dev Subject: [PATCH AUTOSEL 5.15 12/46] net: ethernet: ti: Fix return type of netcp_ndo_start_xmit() Date: Sun, 18 Dec 2022 11:12:10 -0500 Message-Id: <20221218161244.930785-12-sashal@kernel.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20221218161244.930785-1-sashal@kernel.org> References: <20221218161244.930785-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nathan Chancellor [ Upstream commit 63fe6ff674a96cfcfc0fa8df1051a27aa31c70b4 ] With clang's kernel control flow integrity (kCFI, CONFIG_CFI_CLANG), indirect call targets are validated against the expected function pointer prototype to make sure the call target is valid to help mitigate ROP attacks. If they are not identical, there is a failure at run time, which manifests as either a kernel panic or thread getting killed. A proposed warning in clang aims to catch these at compile time, which reveals: drivers/net/ethernet/ti/netcp_core.c:1944:21: error: incompatible function pointer types initializing 'netdev_tx_t (*)(struct sk_buff *, struct net_device *)' (aka 'enum netdev_tx (*)(struct sk_buff *, struct net_device *)') with an expression of type 'int (struct sk_buff *, struct net_device *)' [-Werror,-Wincompatible-function-pointer-types-strict] .ndo_start_xmit = netcp_ndo_start_xmit, ^~~~~~~~~~~~~~~~~~~~ 1 error generated. ->ndo_start_xmit() in 'struct net_device_ops' expects a return type of 'netdev_tx_t', not 'int'. Adjust the return type of netcp_ndo_start_xmit() to match the prototype's to resolve the warning and CFI failure. Link: https://github.com/ClangBuiltLinux/linux/issues/1750 Signed-off-by: Nathan Chancellor Reviewed-by: Kees Cook Link: https://lore.kernel.org/r/20221102160933.1601260-1-nathan@kernel.org Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- drivers/net/ethernet/ti/netcp_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/ti/netcp_core.c b/drivers/net/ethernet/ti/netcp_core.c index eda2961c0fe2..07bdeece1723 100644 --- a/drivers/net/ethernet/ti/netcp_core.c +++ b/drivers/net/ethernet/ti/netcp_core.c @@ -1262,7 +1262,7 @@ static int netcp_tx_submit_skb(struct netcp_intf *netcp, } /* Submit the packet */ -static int netcp_ndo_start_xmit(struct sk_buff *skb, struct net_device *ndev) +static netdev_tx_t netcp_ndo_start_xmit(struct sk_buff *skb, struct net_device *ndev) { struct netcp_intf *netcp = netdev_priv(ndev); struct netcp_stats *tx_stats = &netcp->stats; -- 2.35.1