[Bug 216073] [s390x] kernel BUG at mm/usercopy.c:101! usercopy: Kernel memory exposure attempt detected from vmalloc 'n o area' (offset 0, size 1)!

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



https://bugzilla.kernel.org/show_bug.cgi?id=216073

--- Comment #3 from Andrew Morton (akpm@xxxxxxxxxxxxxxxxxxxx) ---
(switched to email.  Please respond via emailed reply-to-all, not via the
bugzilla web interface).

On Sun, 05 Jun 2022 01:00:15 +0000 bugzilla-daemon@xxxxxxxxxx wrote:

> https://bugzilla.kernel.org/show_bug.cgi?id=216073
> 
>             Bug ID: 216073
>            Summary: [s390x] kernel BUG at mm/usercopy.c:101! usercopy:
>                     Kernel memory exposure attempt detected from vmalloc
>                     'n  o area' (offset 0, size 1)!
>            Product: Memory Management
>            Version: 2.5
>     Kernel Version: 5.19-rc0
>           Hardware: All
>                 OS: Linux
>               Tree: Mainline
>             Status: NEW
>           Severity: normal
>           Priority: P1
>          Component: Other
>           Assignee: akpm@xxxxxxxxxxxxxxxxxxxx
>           Reporter: zlang@xxxxxxxxxx
>         Regression: No
> 
> Recently xfstests on s390x always hit below kernel BUG:
>  usercopy: Kernel memory exposure attempt detected from vmalloc 'no area'
> (offset 0, size 1)!

Thanks.  Do you know if this is specific to s390?


> It's reproducible on xfs with default mkfs options. But it's easier and 100%
> reproducible (for me) on xfs with 64k directory block size (-n size=65536).
> 
> The kernel HEAD commit is:
> commit 032dcf09e2bf7c822be25b4abef7a6c913870d98
> Author: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
> Date:   Fri Jun 3 20:01:25 2022 -0700
> 
>     Merge tag 'gpio-fixes-for-v5.19-rc1' of
> git://git.kernel.org/pub/scm/linux/kernel/git/brgl/linux
> 
> 
> [20797.425894] XFS (loop1): Mounting V5 Filesystem                            
> [20797.433354] XFS (loop1): Ending clean mount                                
> [20823.669300] usercopy: Kernel memory exposure attempt detected from vmalloc
> 'n 
> o area' (offset 0, size 1)!                                                   
> [20823.669339] ------------[ cut here ]------------                           
> [20823.669340] kernel BUG at mm/usercopy.c:101!                               
> [20823.669385] monitor event: 0040 ilc:2 [#1] SMP                             
> [20823.669415] Modules linked in: ext2 overlay dm_zero dm_log_writes
> dm_thin_poo 
> l dm_persistent_data dm_bio_prison sd_mod t10_pi crc64_rocksoft_generic
> crc64_ro 
> cksoft crc64 sg dm_snapshot dm_bufio ext4 mbcache jbd2 dm_flakey tls loop lcs
> ct 
> cm fsm zfcp scsi_transport_fc dasd_fba_mod rfkill sunrpc vfio_ccw mdev
> vfio_iomm 
> u_type1 zcrypt_cex4 vfio drm fuse i2c_core fb font
> drm_panel_orientation_quirks 
> xfs libcrc32c ghash_s390 prng aes_s390 des_s390 sha3_512_s390 sha3_256_s390
> dasd 
> _eckd_mod dasd_mod qeth_l2 bridge stp llc qeth qdio ccwgroup dm_mirror
> dm_region 
> _hash dm_log dm_mod pkey zcrypt [last unloaded: scsi_debug]                   
> [20823.669520] CPU: 0 PID: 3774731 Comm: rm Kdump: loaded Tainted: G    B   W 
>       5.18.0+ #1                                                              
> [20823.669530] Hardware name: IBM 8561 LT1 400 (z/VM 7.2.0)                   
> [20823.672501] Krnl PSW : 0704d00180000000 000000009df4a85a
> (usercopy_abort+0xaa 
> /0xb0)                                                                        
> [20823.672564]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0
> RI: 
> 0 EA:3                                                                        
> [20823.672575] Krnl GPRS: 0000000000000001 001c000018090e00 000000000000005c
> 000 
> 0000000000004                                                                 
> [20823.672584]            001c000000000000 000000009d332024 000000009e14b1a0
> 001 
> bff8000000000                                                                 
> [20823.672593]            0000000000000001 0000000000000001 0000000000000000
> 000 
> 000009e14b1e0                                                                 
> [20823.672601]            000000009e70d070 00000000a87bdac0 000000009df4a856
> 001 
> bff8001f5f720                                                                 
> [20823.672621] Krnl Code: 000000009df4a84c: b9040031            lgr    
> %r3,%r1 
> [20823.672621]            000000009df4a850: c0e5ffffbbfc        brasl  
> %r14,000 
> 000009df42048                                                                 
> [20823.672621]           #000000009df4a856: af000000            mc      0,0   
> [20823.672621]           >000000009df4a85a: 0707                bcr     0,%r7 
> [20823.672621]            000000009df4a85c: 0707                bcr     0,%r7 
> [20823.672621]            000000009df4a85e: 0707                bcr     0,%r7 
> [20823.672621]            000000009df4a860: c0040007b0a4        brcl   
> 0,000000 
> 009e0409a8                                                                    
> [20823.672621]            000000009df4a866: eb6ff0480024        stmg   
> %r6,%r15 
> ,72(%r15)                                                                     
> [20823.672789] Call Trace:                                                    
> [20823.672794]  [<000000009df4a85a>] usercopy_abort+0xaa/0xb0                 
> [20823.672817] ([<000000009df4a856>] usercopy_abort+0xa6/0xb0)                
> [20823.672825]  [<000000009cd30c34>] check_heap_object+0x474/0x480            
> [20823.672833]  [<000000009cd30cb4>] __check_object_size+0x74/0x150           
> [20823.672840]  [<000000009cd8de06>] filldir64+0x296/0x530                    
> [20823.672849]  [<001bffff805957dc>] xfs_dir2_leaf_getdents+0x40c/0xca0 [xfs] 
> [20823.673277]  [<001bffff80596e18>] xfs_readdir+0x3f8/0x740 [xfs]            
> [20823.673522]  [<000000009cd8c7ac>] iterate_dir+0x41c/0x580                  
> [20823.673529]  [<000000009cd8d6b4>] __do_sys_getdents64+0xc4/0x1c0           
> [20823.673537]  [<000000009c4bda8c>] do_syscall+0x22c/0x330                   
> [20823.673546]  [<000000009df5e8be>] __do_syscall+0xce/0xf0                   
> [20823.673554]  [<000000009df87402>] system_call+0x82/0xb0                    
> [20823.673563] INFO: lockdep is turned off.                                   
> [20823.673568] Last Breaking-Event-Address:                                   
> [20823.673572]  [<000000009df420f4>] _printk+0xac/0xb8                        
> [20823.673581] ---[ end trace 0000000000000000 ]---                           
> [20829.875273] usercopy: Kernel memory exposure attempt detected from vmalloc
> 'n 
> o area' (offset 0, size 1)!                                                   
> [20829.875316] ------------[ cut here ]------------                           
> [20829.875318] kernel BUG at mm/usercopy.c:101!                               
> [20829.875448] monitor event: 0040 ilc:2 [#2] SMP                             
> [20829.875468] Modules linked in: ext2 overlay dm_zero dm_log_writes
> dm_thin_poo 
> l dm_persistent_data dm_bio_prison sd_mod t10_pi crc64_rocksoft_generic
> crc64_r 
> cksoft crc64 sg dm_snapshot dm_bufio ext4 mbcache jbd2 dm_flakey tls loop lcs
> ct 
> cm fsm zfcp scsi_transport_fc dasd_fba_mod rfkill sunrpc vfio_ccw mdev
> vfio_iomm 
> u_type1 zcrypt_cex4 vfio drm fuse i2c_core fb font
> drm_panel_orientation_quirks 
> xfs libcrc32c ghash_s390 prng aes_s390 des_s390 sha3_512_s390 sha3_256_s390
> dasd 
> _eckd_mod dasd_mod qeth_l2 bridge stp llc qeth qdio ccwgroup dm_mirror
> dm_region 
> _hash dm_log dm_mod pkey zcrypt [last unloaded: scsi_debug]                   
> [20829.875616] CPU: 0 PID: 3776251 Comm: find Kdump: loaded Tainted: G    B D
> W 
>         5.18.0+ #1                                                            
> [20829.875629] Hardware name: IBM 8561 LT1 400 (z/VM 7.2.0)                   
> [20829.879533] Krnl PSW : 0704d00180000000 000000009df4a85a
> (usercopy_abort+0xaa 
> /0xb0)                                                                        
> [20829.879554]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0
> RI: 
> 0 EA:3                                                                        
> [20829.879573] Krnl GPRS: 0000000000000001 001c000018090e00 000000000000005c
> 000 
> 0000000000004                                                                 
> [20829.879578]            001c000000000000 000000009d332024 000000009e14b1a0
> 001 
> bff8000000000                                                                 
> [20829.879583]            0000000000000001 0000000000000001 0000000000000000
> 000 
> 000009e14b1e0                                                                 
> [20829.879587]            000000009e70d070 00000000a21852c0 000000009df4a856
> 001 
> bff8004fef728                                                                 
> [20829.879599] Krnl Code: 000000009df4a84c: b9040031            lgr    
> %r3,%r1 
> [20829.879599]            000000009df4a850: c0e5ffffbbfc        brasl  
> %r14,000 
> 000009df42048                                                                 
> [20829.879599]           #000000009df4a856: af000000            mc      0,0   
> [20829.879599]           >000000009df4a85a: 0707                bcr     0,%r7 
> [20829.879599]            000000009df4a85c: 0707                bcr     0,%r7 
> [20829.879599]            000000009df4a85e: 0707                bcr     0,%r7 
> [20829.879599]            000000009df4a860: c0040007b0a4        brcl   
> 0,000000 
> 009e0409a8                                                                    
> [20829.879599]            000000009df4a866: eb6ff0480024        stmg   
> %r6,%r15 
> ,72(%r15)                                                                     
> [20829.879631] Call Trace:                                                    
> [20829.879634]  [<000000009df4a85a>] usercopy_abort+0xaa/0xb0                 
> [20829.879639] ([<000000009df4a856>] usercopy_abort+0xa6/0xb0)                
> [20829.879644]  [<000000009cd30c34>] check_heap_object+0x474/0x480            
> [20829.879650]  [<000000009cd30cb4>] __check_object_size+0x74/0x150           
> [20829.879654]  [<000000009cd8de06>] filldir64+0x296/0x530                    
> [20829.879661]  [<001bffff805957dc>] xfs_dir2_leaf_getdents+0x40c/0xca0 [xfs] 
> [20829.879971]  [<001bffff80596e18>] xfs_readdir+0x3f8/0x740 [xfs]            
> [20829.880107]  [<000000009cd8c7ac>] iterate_dir+0x41c/0x580                  
> [20829.880112]  [<000000009cd8d6b4>] __do_sys_getdents64+0xc4/0x1c0           
> [20829.880117]  [<000000009c4bda8c>] do_syscall+0x22c/0x330                   
> [20829.880124]  [<000000009df5e8be>] __do_syscall+0xce/0xf0                   
> [20829.880129]  [<000000009df87402>] system_call+0x82/0xb0                    
> [20829.880135] INFO: lockdep is turned off.                                   
> [20829.880138] Last Breaking-Event-Address:                                   
> [20829.880141]  [<000000009df420f4>] _printk+0xac/0xb8                        
> [20829.880148] ---[ end trace 0000000000000000 ]---                           
> [20829.975537] XFS (loop0): Unmounting Filesystem
> 
> -- 
> You may reply to this email to add a comment.
> 
> You are receiving this mail because:
> You are the assignee for the bug.

-- 
You may reply to this email to add a comment.

You are receiving this mail because:
You are watching someone on the CC list of the bug.



[Index of Archives]     [XFS Filesystem Development (older mail)]     [Linux Filesystem Development]     [Linux Audio Users]     [Yosemite Trails]     [Linux Kernel]     [Linux RAID]     [Linux SCSI]


  Powered by Linux