Re: [PATCH v3] watchdog: it87_wdt: add PWRGD enable quirk for Qotom QCML04

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Hello,

kernel test robot noticed "BUG:KASAN:global-out-of-bounds_in_dmi_first_match" on:

commit: 4a192c0d3e47d9be2fef576b882165a3b459861d ("[PATCH v3] watchdog: it87_wdt: add PWRGD enable quirk for Qotom QCML04")
url: https://github.com/intel-lab-lkp/linux/commits/James-Hilliard/watchdog-it87_wdt-add-PWRGD-enable-quirk-for-Qotom-QCML04/20241021-072541
base: https://git.kernel.org/cgit/linux/kernel/git/groeck/linux-staging.git hwmon-next
patch link: https://lore.kernel.org/all/20241020232410.2576778-1-james.hilliard1@xxxxxxxxx/
patch subject: [PATCH v3] watchdog: it87_wdt: add PWRGD enable quirk for Qotom QCML04

in testcase: boot

config: x86_64-randconfig-161-20241021
compiler: gcc-12
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+---------------------------------------------------+------------+------------+
|                                                   | 516ddbfef7 | 4a192c0d3e |
+---------------------------------------------------+------------+------------+
| BUG:KASAN:global-out-of-bounds_in_dmi_first_match | 0          | 12         |
+---------------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-lkp/202410251317.64508d45-lkp@xxxxxxxxx


[ 55.288289][ T1] BUG: KASAN: global-out-of-bounds in dmi_first_match (drivers/firmware/dmi_scan.c:935 (discriminator 1)) 
[   55.289377][    T1] Read of size 1 at addr ffffffff84934b48 by task swapper/0/1
[   55.289377][    T1]
[   55.289377][    T1] CPU: 1 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.12.0-rc1-00023-g4a192c0d3e47 #1
[   55.289377][    T1] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[   55.289377][    T1] Call Trace:
[   55.289377][    T1]  <TASK>
[ 55.289377][ T1] dump_stack_lvl (lib/dump_stack.c:123) 
[ 55.289377][ T1] print_address_description+0x52/0x2d1 
[ 55.289377][ T1] print_report (mm/kasan/report.c:489) 
[ 55.289377][ T1] ? rcu_read_unlock_sched (arch/x86/include/asm/preempt.h:103 (discriminator 9) include/linux/rcupdate.h:964 (discriminator 9)) 
[ 55.289377][ T1] ? __virt_addr_valid (arch/x86/mm/physaddr.c:65) 
[ 55.289377][ T1] ? dmi_first_match (drivers/firmware/dmi_scan.c:935 (discriminator 1)) 
[ 55.289377][ T1] kasan_report (mm/kasan/report.c:603) 
[ 55.289377][ T1] ? dmi_first_match (drivers/firmware/dmi_scan.c:935 (discriminator 1)) 
[ 55.289377][ T1] dmi_first_match (drivers/firmware/dmi_scan.c:935 (discriminator 1)) 
[ 55.289377][ T1] it87_wdt_init (drivers/watchdog/it87_wdt.c:302) 
[ 55.289377][ T1] ? it8712f_wdt_init (drivers/watchdog/it87_wdt.c:286) 
[ 55.289377][ T1] do_one_initcall (init/main.c:1270) 
[ 55.289377][ T1] ? rcu_lock_acquire (include/linux/rcupdate.h:849 include/linux/rcupdate.h:1161) 
[ 55.289377][ T1] ? parse_one (kernel/params.c:143) 
[ 55.289377][ T1] ? kasan_unpoison (mm/kasan/shadow.c:182) 
[ 55.289377][ T1] ? poison_kmalloc_redzone (mm/kasan/common.c:376) 
[ 55.289377][ T1] ? rcu_is_watching (include/linux/context_tracking.h:128 kernel/rcu/tree.c:737) 
[ 55.289377][ T1] do_initcalls (init/main.c:1330 init/main.c:1347) 
[ 55.289377][ T1] kernel_init_freeable (init/main.c:1584) 
[ 55.289377][ T1] ? rest_init (init/main.c:1461) 
[ 55.289377][ T1] kernel_init (init/main.c:1471) 
[ 55.289377][ T1] ? rest_init (init/main.c:1461) 
[ 55.289377][ T1] ret_from_fork (arch/x86/kernel/process.c:153) 
[ 55.289377][ T1] ? rest_init (init/main.c:1461) 
[ 55.289377][ T1] ret_from_fork_asm (arch/x86/entry/entry_64.S:257) 
[   55.289377][    T1]  </TASK>
[   55.289377][    T1]
[   55.289377][    T1] The buggy address belongs to the variable:
[ 55.289377][ T1] it87_quirks+0x168/0x180 
[   55.289377][    T1]
[   55.289377][    T1] The buggy address belongs to the physical page:
[   55.289377][    T1] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4934
[   55.289377][    T1] flags: 0x4000000000002000(reserved|zone=1)
[   55.289377][    T1] raw: 4000000000002000 ffffea0000124d08 ffffea0000124d08 0000000000000000
[   55.289377][    T1] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000
[   55.289377][    T1] page dumped because: kasan: bad access detected
[   55.289377][    T1] page_owner info is not present (never set?)
[   55.289377][    T1]
[   55.289377][    T1] Memory state around the buggy address:
[   55.289377][    T1]  ffffffff84934a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.289377][    T1]  ffffffff84934a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   55.289377][    T1] >ffffffff84934b00: 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 00 00 02 f9
[   55.289377][    T1]                                               ^
[   55.289377][    T1]  ffffffff84934b80: f9 f9 f9 f9 00 00 02 f9 f9 f9 f9 f9 00 00 01 f9
[   55.289377][    T1]  ffffffff84934c00: f9 f9 f9 f9 00 00 00 06 f9 f9 f9 f9 00 00 00 00
[   55.289377][    T1] ==================================================================
[   55.337178][    T1] Disabling lock debugging due to kernel taint
[   55.338122][    T1] it87_wdt: no device



The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20241025/202410251317.64508d45-lkp@xxxxxxxxx



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki





[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux