[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <38cfd1c4b7297515539bd2c91b3bf541.sboyd@kernel.org>
Date: Mon, 29 Apr 2024 17:04:37 -0700
From: Stephen Boyd <sboyd@...nel.org>
To: Florian Fainelli <florian.fainelli@...adcom.com>, Michael Turquette <mturquette@...libre.com>, Nathan Chancellor <nathan@...nel.org>
Cc: Kees Cook <keescook@...omium.org>, Gustavo A. R. Silva <gustavoars@...nel.org>, bcm-kernel-feedback-list@...adcom.com, linux-clk@...r.kernel.org, linux-rpi-kernel@...ts.infradead.org, linux-arm-kernel@...ts.infradead.org, linux-hardening@...r.kernel.org, patches@...ts.linux.dev, llvm@...ts.linux.dev, stable@...r.kernel.org, Nathan Chancellor <nathan@...nel.org>
Subject: Re: [PATCH 1/2] clk: bcm: dvp: Assign ->num before accessing ->hws
Quoting Nathan Chancellor (2024-04-25 09:55:51)
> Commit f316cdff8d67 ("clk: Annotate struct clk_hw_onecell_data with
> __counted_by") annotated the hws member of 'struct clk_hw_onecell_data'
> with __counted_by, which informs the bounds sanitizer about the number
> of elements in hws, so that it can warn when hws is accessed out of
> bounds. As noted in that change, the __counted_by member must be
> initialized with the number of elements before the first array access
> happens, otherwise there will be a warning from each access prior to the
> initialization because the number of elements is zero. This occurs in
> clk_dvp_probe() due to ->num being assigned after ->hws has been
> accessed:
>
> UBSAN: array-index-out-of-bounds in drivers/clk/bcm/clk-bcm2711-dvp.c:59:2
> index 0 is out of range for type 'struct clk_hw *[] __counted_by(num)' (aka 'struct clk_hw *[]')
>
> Move the ->num initialization to before the first access of ->hws, which
> clears up the warning.
>
> Cc: stable@...r.kernel.org
> Fixes: f316cdff8d67 ("clk: Annotate struct clk_hw_onecell_data with __counted_by")
> Signed-off-by: Nathan Chancellor <nathan@...nel.org>
> ---
Applied to clk-next
Powered by blists - more mailing lists