[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2025091715-CVE-2022-50362-3640@gregkh>
Date: Wed, 17 Sep 2025 16:56:21 +0200
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: linux-cve-announce@...r.kernel.org
Cc: Greg Kroah-Hartman <gregkh@...nel.org>
Subject: CVE-2022-50362: dmaengine: hisilicon: Add multi-thread support for a DMA channel
From: Greg Kroah-Hartman <gregkh@...nel.org>
Description
===========
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: hisilicon: Add multi-thread support for a DMA channel
When we get a DMA channel and try to use it in multiple threads it
will cause oops and hanging the system.
% echo 100 > /sys/module/dmatest/parameters/threads_per_chan
% echo 100 > /sys/module/dmatest/parameters/iterations
% echo 1 > /sys/module/dmatest/parameters/run
[383493.327077] Unable to handle kernel paging request at virtual
address dead000000000108
[383493.335103] Mem abort info:
[383493.335103] ESR = 0x96000044
[383493.335105] EC = 0x25: DABT (current EL), IL = 32 bits
[383493.335107] SET = 0, FnV = 0
[383493.335108] EA = 0, S1PTW = 0
[383493.335109] FSC = 0x04: level 0 translation fault
[383493.335110] Data abort info:
[383493.335111] ISV = 0, ISS = 0x00000044
[383493.364739] CM = 0, WnR = 1
[383493.367793] [dead000000000108] address between user and kernel
address ranges
[383493.375021] Internal error: Oops: 96000044 [#1] PREEMPT SMP
[383493.437574] CPU: 63 PID: 27895 Comm: dma0chan0-copy2 Kdump:
loaded Tainted: GO 5.17.0-rc4+ #2
[383493.457851] pstate: 204000c9 (nzCv daIF +PAN -UAO -TCO -DIT
-SSBS BTYPE=--)
[383493.465331] pc : vchan_tx_submit+0x64/0xa0
[383493.469957] lr : vchan_tx_submit+0x34/0xa0
This occurs because the transmission timed out, and that's due
to data race. Each thread rewrite channels's descriptor as soon as
device_issue_pending is called. It leads to the situation that
the driver thinks that it uses the right descriptor in interrupt
handler while channels's descriptor has been changed by other
thread. The descriptor which in fact reported interrupt will not
be handled any more, as well as its tx->callback.
That's why timeout reports.
With current fixes channels' descriptor changes it's value only
when it has been used. A new descriptor is acquired from
vc->desc_issued queue that is already filled with descriptors
that are ready to be sent. Threads have no direct access to DMA
channel descriptor. In case of channel's descriptor is busy, try
to submit to HW again when a descriptor is completed. In this case,
vc->desc_issued may be empty when hisi_dma_start_transfer is called,
so delete error reporting on this. Now it is just possible to queue
a descriptor for further processing.
The Linux kernel CVE team has assigned CVE-2022-50362 to this issue.
Affected and fixed versions
===========================
Issue introduced in 5.6 with commit e9f08b65250d73ab70e79e194813f52b8d306784 and fixed in 5.10.150 with commit af12e209a9d559394d35875ba0e6c80407605888
Issue introduced in 5.6 with commit e9f08b65250d73ab70e79e194813f52b8d306784 and fixed in 5.15.75 with commit 7cb9b20941e1fb20d22d0a2f460a3d4fa417274c
Issue introduced in 5.6 with commit e9f08b65250d73ab70e79e194813f52b8d306784 and fixed in 5.19.17 with commit d4a8ec5cc7ff5d442bd49a44f26d74b2021ba4c8
Issue introduced in 5.6 with commit e9f08b65250d73ab70e79e194813f52b8d306784 and fixed in 6.0.3 with commit f4cee0b385cd0348e071d4d80c4c13cfe547c70d
Issue introduced in 5.6 with commit e9f08b65250d73ab70e79e194813f52b8d306784 and fixed in 6.1 with commit 2cbb95883c990d0002a77e13d3278913ab26ad79
Please see https://www.kernel.org for a full list of currently supported
kernel versions by the kernel community.
Unaffected versions might change over time as fixes are backported to
older supported kernel versions. The official CVE entry at
https://cve.org/CVERecord/?id=CVE-2022-50362
will be updated if fixes are backported, please check that for the most
up to date information about this issue.
Affected files
==============
The file(s) affected by this issue are:
drivers/dma/hisi_dma.c
Mitigation
==========
The Linux kernel CVE team recommends that you update to the latest
stable kernel version for this, and many other bugfixes. Individual
changes are never tested alone, but rather are part of a larger kernel
release. Cherry-picking individual commits is not recommended or
supported by the Linux kernel community at all. If however, updating to
the latest release is impossible, the individual changes to resolve this
issue can be found at these commits:
https://git.kernel.org/stable/c/af12e209a9d559394d35875ba0e6c80407605888
https://git.kernel.org/stable/c/7cb9b20941e1fb20d22d0a2f460a3d4fa417274c
https://git.kernel.org/stable/c/d4a8ec5cc7ff5d442bd49a44f26d74b2021ba4c8
https://git.kernel.org/stable/c/f4cee0b385cd0348e071d4d80c4c13cfe547c70d
https://git.kernel.org/stable/c/2cbb95883c990d0002a77e13d3278913ab26ad79
Powered by blists - more mailing lists