mm/huge_memory: fix folio isn't locked in softleaf_to_folio()
Summary
| CVE | CVE-2026-31466 |
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-22 14:16:42 UTC |
| Updated | 2026-04-22 14:16:42 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved:
mm/huge_memory: fix folio isn't locked in softleaf_to_folio()
On arm64 server, we found folio that get from migration entry isn't locked
in softleaf_to_folio(). This issue triggers when mTHP splitting and
zap_nonpresent_ptes() races, and the root cause is lack of memory barrier
in softleaf_to_folio(). The race is as follows:
CPU0 CPU1
deferred_split_scan() zap_nonpresent_ptes()
lock folio
split_folio()
unmap_folio()
change ptes to migration entries
__split_folio_to_order() softleaf_to_folio()
set flags(including PG_locked) for tail pages folio = pfn_folio(softleaf_to_pfn(entry))
smp_wmb() VM_WARN_ON_ONCE(!folio_test_locked(folio))
prep_compound_page() for tail pages
In __split_folio_to_order(), smp_wmb() guarantees page flags of tail pages
are visible before the tail page becomes non-compound. smp_wmb() should
be paired with smp_rmb() in softleaf_to_folio(), which is missed. As a
result, if zap_nonpresent_ptes() accesses migration entry that stores tail
pfn, softleaf_to_folio() may see the updated compound_head of tail page
before page->flags.
This issue will trigger VM_WARN_ON_ONCE() in pfn_swap_entry_folio()
because of the race between folio split and zap_nonpresent_ptes()
leading to a folio incorrectly undergoing modification without a folio
lock being held.
This is a BUG_ON() before commit 93976a20345b ("mm: eliminate further
swapops predicates"), which in merged in v6.19-rc1.
To fix it, add missing smp_rmb() if the softleaf entry is migration entry
in softleaf_to_folio() and softleaf_to_page().
[[email protected]: update function name and comments] |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|
| CNA |
Linux |
Linux |
affected e9b61f19858a5d6c42ce2298cf138279375d0d9b 426ee10711586617da869c8bb798214965337617 git |
Not specified |
| CNA |
Linux |
Linux |
affected e9b61f19858a5d6c42ce2298cf138279375d0d9b f1acf5887c2bbaf998dc3fe32c72b7a8b84a3ddd git |
Not specified |
| CNA |
Linux |
Linux |
affected e9b61f19858a5d6c42ce2298cf138279375d0d9b 722cfaf6b31d31123439e67b5deac6b1261a3dea git |
Not specified |
| CNA |
Linux |
Linux |
affected e9b61f19858a5d6c42ce2298cf138279375d0d9b 7ddcf4a245c1c5a91fdd9698757e3d95179ffe41 git |
Not specified |
| CNA |
Linux |
Linux |
affected e9b61f19858a5d6c42ce2298cf138279375d0d9b b8c49ad888892ad7b77062b9c102b799a3e9b4f8 git |
Not specified |
| CNA |
Linux |
Linux |
affected e9b61f19858a5d6c42ce2298cf138279375d0d9b 7ad1997b9bc8032603df8f091761114479285769 git |
Not specified |
| CNA |
Linux |
Linux |
affected e9b61f19858a5d6c42ce2298cf138279375d0d9b 8bfb8414e9f2ce6f5f2f0e3d0da52f2d132128e7 git |
Not specified |
| CNA |
Linux |
Linux |
affected e9b61f19858a5d6c42ce2298cf138279375d0d9b 4c5e7f0fcd592801c9cc18f29f80fbee84eb8669 git |
Not specified |
| CNA |
Linux |
Linux |
affected 4.5 |
Not specified |
| CNA |
Linux |
Linux |
unaffected 4.5 semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.10.253 5.10.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 5.15.203 5.15.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.1.168 6.1.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.6.134 6.6.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.12.81 6.12.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.18.21 6.18.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 6.19.11 6.19.* semver |
Not specified |
| CNA |
Linux |
Linux |
unaffected 7.0 * original_commit_for_fix |
Not specified |
References
| Reference | Source | Link | Tags |
|---|
| git.kernel.org/stable/c/426ee10711586617da869c8bb798214965337617 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/f1acf5887c2bbaf998dc3fe32c72b7a8b84a3ddd |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/4c5e7f0fcd592801c9cc18f29f80fbee84eb8669 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/b8c49ad888892ad7b77062b9c102b799a3e9b4f8 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/722cfaf6b31d31123439e67b5deac6b1261a3dea |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/7ad1997b9bc8032603df8f091761114479285769 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/8bfb8414e9f2ce6f5f2f0e3d0da52f2d132128e7 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| git.kernel.org/stable/c/7ddcf4a245c1c5a91fdd9698757e3d95179ffe41 |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
git.kernel.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.