Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp2602039rwb; Sat, 8 Oct 2022 10:36:41 -0700 (PDT) X-Google-Smtp-Source: AMsMyM44CO4iQoUoILIK7Cwav3t5HInNJnP1nLYQbVqmIeknCAiTyPChUGIWgikZjZQv+Qk5FJd8 X-Received: by 2002:a05:6a00:2141:b0:561:8552:3eb9 with SMTP id o1-20020a056a00214100b0056185523eb9mr11364714pfk.65.1665250601240; Sat, 08 Oct 2022 10:36:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665250601; cv=none; d=google.com; s=arc-20160816; b=EzYQC3GwWeozg6tkJzzDe7YpLLUg7Sguk5Y/w0RC5/rfoINtAzgzEe37Wu5UbzeHti pr+66I1YmT4ybVbHbyqGoewPnuADaVlP07uhfXpZvgoM4NPyVgf1n78z24DaBt0oF1ma 69zBL8Yi7odtNzHWWEOczjxn7C9O5vQzgDFQUlJ6DF6gKNWpwQW4uxR+hZ/X1lxL+bXU ke3IED4U5s6OZFVplhdAjWg13iHzAdyYl27jT2t3pbKR5iLaHP1BPZCh0OESfwoAw6dN 7szFXakECj4kh9Ffkd4IFZ9qS/JOTCFA5B5l/oohA2hRZMh1JOcW5e9FMB9skzK7OWGT veLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id; bh=wFqEJ3pZ2PbKyLihB+vpmjpRvYbPsIrelmxn11AFcp8=; b=sD9CheaqMtUOU340lsqGyeths0opYjFikwcGwmRZn2sdNFgHUjdQrxwXo6QWTyftYJ iKoORJdupfX/fWwLV6jLubmzjM2aoOWZ1qPCxPgRNBUL3VdAsFWwhi2BFZVA05sDZ6pr NToZpRQtyQqqYCaB1XMQUoH0Ek+zICNgw14Ln5hwLYrq4axlvhTEpbNMndrdUBt0fBKf 1XSa6rpE/OjbszpqkOpc09cNAppYcUt4GvG7YahC/Rcuj+4ng/ciCfmUTu7h6jCA/t2y OQJY7HaL+v/IKn2GzMuQFbGI/muGjTN/McFFalZUtUwgHYq2crxQ+CE60JwAT9LsO3S8 bVoA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c5-20020a631c45000000b0043ca0a1f7dasi3646639pgm.674.2022.10.08.10.36.09; Sat, 08 Oct 2022 10:36:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229628AbiJHRII (ORCPT + 99 others); Sat, 8 Oct 2022 13:08:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45748 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229606AbiJHRIG (ORCPT ); Sat, 8 Oct 2022 13:08:06 -0400 Received: from mout.kundenserver.de (mout.kundenserver.de [217.72.192.73]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 64BDF3BC56; Sat, 8 Oct 2022 10:08:05 -0700 (PDT) Received: from [192.168.1.138] ([37.4.248.18]) by mrelayeu.kundenserver.de (mreue108 [212.227.15.183]) with ESMTPSA (Nemesis) id 1MgNpJ-1pOFgQ41uh-00hucE; Sat, 08 Oct 2022 19:07:26 +0200 Message-ID: Date: Sat, 8 Oct 2022 19:07:24 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.2.2 Subject: Re: [PATCH] clk: bcm: rpi: Fix an out-of-bound access to raspberrypi_clk_variants To: Xu Kuohai , linux-kernel@vger.kernel.org, linux-clk@vger.kernel.org, linux-rpi-kernel@lists.infradead.org, linux-arm-kernel@lists.infradead.org Cc: Michael Turquette , Stephen Boyd , Florian Fainelli , Broadcom internal kernel review list , Maxime Ripard , Christophe JAILLET , Xu Kuohai References: <20221008144544.283945-1-xukuohai@huaweicloud.com> Content-Language: en-US From: Stefan Wahren In-Reply-To: <20221008144544.283945-1-xukuohai@huaweicloud.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Provags-ID: V03:K1:AZmXji+Ie9jYHOzIlgRs0gDX/oNVksZ7yKBebF95ZMrkMz8LTTw Hy9D2+qykIRrldaHtJy4bV990ESxz3bpUi36so0Fh8jzYGAtQnqKQZu8W62Of3j4ZaKBieV DJ4fVy1baJLERCQTxXL5lYi8pry+dUUywkbPjDrs/q7SPYMK2mIEuTSRCFqBerKWC1/jyR+ ECGHfxuEsXwRKi3wXPq+w== X-UI-Out-Filterresults: notjunk:1;V03:K0:19cskiiydFc=:6tsc4x3Utxa7k8gtI3IAd6 wNgLrQIpDTY5nr2vfR7PrggjpagVpdjqcpTUzLL81bdhB9HjqZsxxeSoi5dIe42fOWWyRVIbM UwehcSqpngKNRAaP9dAWzzStkw3TouTK2dOw08nfwHX2EiQ/nLt0hTVTguKssPhT1dY+qjp9F PFfcmz0cwOcvJa2+doA6rO2X7/Oz8lE9wol04DdydEw++QRLh+DQJqYyhQCtdGF3sEvKNGsrh tS/tJJoy+uWT6e9D7hf4wvcuqlryelRI9mOANsj5XLXHqK2M1XdMu6XeE7wL2XsrK+6gjmc9q FA+rD5xA2RGVW+PhInygZYWKmq11LG3Q3X+fKHIM510PfX3A9ZkiLD3zy9KAf2ji4SnN43OaX Q9pzjfqCOibGLvSg4Aj7eq1LZatvztu5i70u9jA6hvoVykPPi7+k9iZlnZzXMcjb0GPBwYPiD 4DLZF7mGkmiRqTd8ehLPrjNI2e7wqwDKM02bvwUAOGhYu1d6P4mVXFtDHETO4PzNT+MKT6A9M 4XPhEE/QDFNLUZty/m4hqo1gj0VAjxZUc3yxawx5N3skARebYJuwBdaM3Fh9GLLwqb36pJ5Nx fHhAYjPLqGYstTJfcglSRhJjVx7l0ShHfQ2LPXtmNuNjzJPVuWhfjDM7AjaHTGuRcmsl/LPqU V+Sq/Xo4DuSXk+G5LQUAUHOQbNK5GhhDAfTd9GpuDa8Z9Ca0I2xrgVA5DItx0KTH+Mhd1UUNb upFU2MzxRlKChR9a3h6uywEm+3UJwpp20bp4tEkNYCZ0Y9m6wxRR3GVDHgWZMKyazNK9jyoac Y2Xqw7MPvs4ATNDES0N2meqhj8VBg== X-Spam-Status: No, score=-5.5 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Xu, Am 08.10.22 um 16:45 schrieb Xu Kuohai: > From: Xu Kuohai > > KASAN reports an out-of-bound access to raspberrypi_clk_variants[]: > > ================================================================== > BUG: KASAN: global-out-of-bounds in raspberrypi_clk_probe+0x1dc/0x690 > Read of size 1 at addr ffffcc7116d615a0 by task kworker/u8:0/8 > > CPU: 1 PID: 8 Comm: kworker/u8:0 Not tainted 6.0.0-rc3-00900-g08f4df4a3c53 raspberrypi#10 this kernel is a little bit older and doesn't contain bc163555603e ("clk: bcm: rpi: Prevent out-of-bounds access"). Can you please check Linux 6.0? Best regards