With PPC builds enabling CONFIG_HARDENED_USERCOPY, interacting with the RunTime Abstraction Services (RTAS) firmware by writing to /proc/powerpc/rtas/firmware_flash will end up triggering the mm/usercopy.c:101 assertion:
[ 38.647148] rw /proc/powerpc/rtas/firmware_flash [ 38.650254] usercopy: Kernel memory overwrite attempt detected to SLUB object 'rtas_flash_cache' (offset 0, size 34)! [ 38.650264] ------------[ cut here ]------------ [ 38.650264] kernel BUG at mm/usercopy.c:101! [ 38.650267] Oops: Exception in kernel mode, sig: 5 [#1] [ 38.650283] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries [ 38.650287] Modules linked in: binfmt_misc loop rfkill bonding tls sunrpc pseries_rng drm fuse drm_panel_orientation_quirks xfs libcrc32c sd_mod t10_pi sg ibmveth ibmvscsi scsi_transport_srp vmx_crypto [ 38.650306] CPU: 0 PID: 12898 Comm: echo Kdump: loaded Not tainted 5.14.0-299.el9.ppc64le #1 [ 38.650311] NIP: c00000000056d870 LR: c00000000056d86c CTR: c000000000886090 [ 38.650314] REGS: c0000000ba6e78c0 TRAP: 0700 Not tainted (5.14.0-299.el9.ppc64le) [ 38.650318] MSR: 8000000000029033 <SF,EE,ME,IR,DR,RI,LE> CR: 28002203 XER: 20040000 [ 38.650326] CFAR: c0000000001f76fc IRQMASK: 0 [ 38.650326] GPR00: c00000000056d86c c0000000ba6e7b60 c000000002b15a00 0000000000000069 [ 38.650326] GPR04: c000000fff447f90 c000000fff4ccd00 000000000000000f 0000000000000027 [ 38.650326] GPR08: 0000000000000000 c000000fff44adc0 0000000ffd2f0000 0000000000002000 [ 38.650326] GPR12: 6174722720746365 c000000002ea0000 0000000000000000 0000000000000000 [ 38.650326] GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 38.650326] GPR20: 0000000000000000 0000000000000000 0000000000000002 0000000000000001 [ 38.650326] GPR24: 0000000000000000 000000012eef55a0 c0000000025f39e0 c0000000b988d000 [ 38.650326] GPR28: c0000000b988d022 0000000000000022 0000000000000000 c00000000134d6e8 [ 38.650366] NIP [c00000000056d870] usercopy_abort+0xb0/0xc0 [ 38.650373] LR [c00000000056d86c] usercopy_abort+0xac/0xc0 [ 38.650377] Call Trace: [ 38.650379] [c0000000ba6e7b60] [c00000000056d86c] usercopy_abort+0xac/0xc0 (unreliable) [ 38.650384] [c0000000ba6e7be0] [c0000000005178f0] __check_heap_object+0xf0/0x120 [ 38.650389] [c0000000ba6e7c00] [c00000000056d5e0] check_heap_object+0x1f0/0x220 [ 38.650394] [c0000000ba6e7c40] [c00000000056d6a0] __check_object_size+0x90/0x1b0 [ 38.650399] [c0000000ba6e7c80] [c0000000000462fc] rtas_flash_write+0x11c/0x2b0 [ 38.650404] [c0000000ba6e7ce0] [c00000000064d2ec] proc_reg_write+0xfc/0x160 [ 38.650409] [c0000000ba6e7d10] [c000000000579e64] vfs_write+0xe4/0x390 [ 38.650413] [c0000000ba6e7d60] [c00000000057a414] ksys_write+0x84/0x140 [ 38.650417] [c0000000ba6e7db0] [c00000000002f314] system_call_exception+0x164/0x310 [ 38.650421] [c0000000ba6e7e10] [c00000000000bfe8] system_call_vectored_common+0xe8/0x278 [ 38.650426] --- interrupt: 3000 at 0x7fff87f3aa34 [ 38.650430] NIP: 00007fff87f3aa34 LR: 0000000000000000 CTR: 0000000000000000 [ 38.650433] REGS: c0000000ba6e7e80 TRAP: 3000 Not tainted (5.14.0-299.el9.ppc64le) [ 38.650436] MSR: 800000000280f033 <SF,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE> CR: 42002408 XER: 00000000 [ 38.650446] IRQMASK: 0 This used to be caught with a warning in __check_heap_object to allow impacted drivers time to update to kmem_cache_create_usercopy, but commit 53944f171a89d ("mm: remove HARDENED_USERCOPY_FALLBACK") removed that check. To resolve this issue, update the creation of the flash_block_cache to use kmem_cache_create_usercopy with a default size of RTAS_BLK_SIZE. Signed-off-by: Audra Mitchell <auba...@redhat.com> --- arch/powerpc/kernel/rtas_flash.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/powerpc/kernel/rtas_flash.c b/arch/powerpc/kernel/rtas_flash.c index a99179d83538..0a156a600f31 100644 --- a/arch/powerpc/kernel/rtas_flash.c +++ b/arch/powerpc/kernel/rtas_flash.c @@ -710,9 +710,9 @@ static int __init rtas_flash_init(void) if (!rtas_validate_flash_data.buf) return -ENOMEM; - flash_block_cache = kmem_cache_create("rtas_flash_cache", + flash_block_cache = kmem_cache_create_usercopy("rtas_flash_cache", RTAS_BLK_SIZE, RTAS_BLK_SIZE, 0, - NULL); + 0, RTAS_BLK_SIZE, NULL); if (!flash_block_cache) { printk(KERN_ERR "%s: failed to create block cache\n", __func__); -- 2.40.1