CVE-2024-56673

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-56673
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-56673.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-56673
Downstream
Related
Published
2024-12-27T15:06:34Z
Modified
2025-10-17T19:12:04.735022Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
riscv: mm: Do not call pmd dtor on vmemmap page table teardown
Details

In the Linux kernel, the following vulnerability has been resolved:

riscv: mm: Do not call pmd dtor on vmemmap page table teardown

The vmemmap's, which is used for RV64 with SPARSEMEMVMEMMAP, page tables are populated using pmd (page middle directory) hugetables. However, the pmd allocation is not using the generic mechanism used by the VMA code (e.g. pmdalloc()), or the RISC-V specific createpgdmapping()/allocpmdlate(). Instead, the vmemmap page table code allocates a page, and calls vmemmapsetpmd(). This results in that the pmd ctor is not called, nor would it make sense to do so.

Now, when tearing down a vmemmap page table pmd, the cleanup code would unconditionally, and incorrectly call the pmd dtor, which results in a crash (best case).

This issue was found when running the HMM selftests:

| tools/testing/selftests/mm# ./testhmm.sh smoke | ... # when unloading the testhmm.ko module | page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10915b | flags: 0x1000000000000000(node=0|zone=1) | raw: 1000000000000000 0000000000000000 dead000000000122 0000000000000000 | raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 | page dumped because: VMBUGONPAGE(ptdesc->pmdhugepte) | ------------[ cut here ]------------ | kernel BUG at include/linux/mm.h:3080! | Kernel BUG [#1] | Modules linked in: testhmm(-) schfqcodel fuse drm drmpanelorientationquirks backlight dmmod | CPU: 1 UID: 0 PID: 514 Comm: modprobe Tainted: G W 6.12.0-00982-gf2a4f1682d07 #2 | Tainted: [W]=WARN | Hardware name: riscv-virtio qemu/qemu, BIOS 2024.10 10/01/2024 | epc : removepgdmapping+0xbec/0x1070 | ra : removepgdmapping+0xbec/0x1070 | epc : ffffffff80010a68 ra : ffffffff80010a68 sp : ff20000000a73940 | gp : ffffffff827b2d88 tp : ff6000008785da40 t0 : ffffffff80fbce04 | t1 : 0720072007200720 t2 : 706d756420656761 s0 : ff20000000a73a50 | s1 : ff6000008915cff8 a0 : 0000000000000039 a1 : 0000000000000008 | a2 : ff600003fff0de20 a3 : 0000000000000000 a4 : 0000000000000000 | a5 : 0000000000000000 a6 : c0000000ffffefff a7 : ffffffff824469b8 | s2 : ff1c0000022456c0 s3 : ff1ffffffdbfffff s4 : ff6000008915c000 | s5 : ff6000008915c000 s6 : ff6000008915c000 s7 : ff1ffffffdc00000 | s8 : 0000000000000001 s9 : ff1ffffffdc00000 s10: ffffffff819a31f0 | s11: ffffffffffffffff t3 : ffffffff8000c950 t4 : ff60000080244f00 | t5 : ff60000080244000 t6 : ff20000000a73708 | status: 0000000200000120 badaddr: ffffffff80010a68 cause: 0000000000000003 | [<ffffffff80010a68>] removepgdmapping+0xbec/0x1070 | [<ffffffff80fd238e>] vmemmapfree+0x14/0x1e | [<ffffffff8032e698>] sectiondeactivate+0x220/0x452 | [<ffffffff8032ef7e>] sparseremovesection+0x4a/0x58 | [<ffffffff802f8700>] _removepages+0x7e/0xba | [<ffffffff803760d8>] memunmappages+0x2bc/0x3fe | [<ffffffff02a3ca28>] dmirrordeviceremovechunks+0x2ea/0x518 [testhmm] | [<ffffffff02a3e026>] hmmdmirrorexit+0x3e/0x1018 [testhmm] | [<ffffffff80102c14>] _riscvsysdeletemodule+0x15a/0x2a6 | [<ffffffff80fd020c>] dotrapecallu+0x1f2/0x266 | [<ffffffff80fde0a2>] _newvmallocrestorecontext_a0+0xc6/0xd2 | Code: bf51 7597 0184 8593 76a5 854a 4097 0029 80e7 2c00 (9002) 7597 | ---[ end trace 0000000000000000 ]--- | Kernel panic - not syncing: Fatal exception in interrupt

Add a check to avoid calling the pmd dtor, if the calling context is vmemmap_free().

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c75a74f4ba19c904c0ae1e011ae2568449409ae4
Fixed
344945806f2f7af68be98bac02836c867f223aa9
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
c75a74f4ba19c904c0ae1e011ae2568449409ae4
Fixed
21f1b85c8912262adf51707e63614a114425eb10

Affected versions

v6.*

v6.10
v6.10-rc2
v6.10-rc3
v6.10-rc4
v6.10-rc5
v6.10-rc6
v6.10-rc7
v6.11
v6.11-rc1
v6.11-rc2
v6.11-rc3
v6.11-rc4
v6.11-rc5
v6.11-rc6
v6.11-rc7
v6.12
v6.12-rc1
v6.12-rc2
v6.12-rc3
v6.12-rc4
v6.12-rc5
v6.12-rc6
v6.12-rc7
v6.12.1
v6.12.2
v6.12.3
v6.12.4
v6.12.5
v6.13-rc1
v6.13-rc2

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.11.0
Fixed
6.12.6