Hey Dan,

On Tue, Dec 09, 2025 at 04:05:58PM +0300, Dan Carpenter wrote:
> Hello Kernel Hardenning developers,
> 
> Commit b4cbe606dc36 ("clk: visconti: Add support common clock driver
> and reset driver") from Oct 25, 2021 (linux-next), leads to the
> question:
> 
> drivers/clk/visconti/clkc.c
>     187 struct visconti_clk_provider *visconti_init_clk(struct device *dev,
>     188                                                 struct regmap *regmap,
>     189                                                 unsigned long nr_clks)
>     190 {
>     191         struct visconti_clk_provider *ctx;
>     192         int i;
>     193 
>     194         ctx = devm_kzalloc(dev, struct_size(ctx, clk_data.hws, 
> nr_clks), GFP_KERNEL);
>     195         if (!ctx)
>     196                 return ERR_PTR(-ENOMEM);
>     197 
>     198         for (i = 0; i < nr_clks; ++i)
> --> 199                 ctx->clk_data.hws[i] = ERR_PTR(-ENOENT);
>     200         ctx->clk_data.num = nr_clks;
> 
> ctx->clk_data.hws[] is __counted_by() ctx->clk_data.num.  Don't we have to
> set the .num before we fill initialize the array?  Or does the checker

Yes, it looks like line 200 needs to be moved above line 198.

> code allow us to access the array when the counted by variable is zero?

Nope, I just had to fix an instance where num is one and hws[0] is being
accessed:

  
https://lore.kernel.org/20251124-exynos-clkout-fix-ubsan-bounds-error-v1-1-224a52825...@kernel.org/

I suspect there will eventually be a report on real hardware when
CONFIG_UBSAN_BOUNDS is enabled and GCC 15 is used to build the running
kernel, which is the first version that supports __counted_by(). How did
you find this? A new smatch check? It would be nice if the compilers
could flag this but I guess it is probably harder to do this in a
generic way.

Cheers,
Nathan

Reply via email to