CVE-2022-48731

Source
https://cve.org/CVERecord?id=CVE-2022-48731
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48731.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-48731
Downstream
Published
2024-06-20T11:13:19.407Z
Modified
2026-05-15T11:54:31.113699730Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
mm/kmemleak: avoid scanning potential huge holes
Details

In the Linux kernel, the following vulnerability has been resolved:

mm/kmemleak: avoid scanning potential huge holes

When using devmrequestfreememregion() and devmmemremappages() to add ZONEDEVICE memory, if requested free mem region's end pfn were huge(e.g., 0x400000000), the nodeendpfn() will be also huge (see movepfnrangetozone()). Thus it creates a huge hole between nodestartpfn() and nodeend_pfn().

We found on some AMD APUs, amdkfd requested such a free mem region and created a huge hole. In such a case, following code snippet was just doing busy test_bit() looping on the huge hole.

for (pfn = startpfn; pfn < endpfn; pfn++) { struct page *page = pfntoonline_page(pfn); if (!page) continue; ... }

So we got a soft lockup:

watchdog: BUG: soft lockup - CPU#6 stuck for 26s! [bash:1221] CPU: 6 PID: 1221 Comm: bash Not tainted 5.15.0-custom #1 RIP: 0010:pfntoonlinepage+0x5/0xd0 Call Trace: ? kmemleakscan+0x16a/0x440 kmemleakwrite+0x306/0x3a0 ? commonfileperm+0x72/0x170 fullproxywrite+0x5c/0x90 vfswrite+0xb9/0x260 ksys_write+0x67/0xe0 __x64syswrite+0x1a/0x20 dosyscall64+0x3b/0xc0 entrySYSCALL64afterhwframe+0x44/0xae

I did some tests with the patch.

(1) amdgpu module unloaded

before the patch:

real 0m0.976s user 0m0.000s sys 0m0.968s

after the patch:

real 0m0.981s user 0m0.000s sys 0m0.973s

(2) amdgpu module loaded

before the patch:

real 0m35.365s user 0m0.000s sys 0m35.354s

after the patch:

real 0m1.049s user 0m0.000s sys 0m1.042s

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48731.json"
}
References

Affected packages

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.14.0
Fixed
5.4.178
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.99
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.22
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
5.16.8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48731.json"