In the Linux kernel, the following vulnerability has been resolved:mm/vmalloc: combine all TLB flush operations of KASAN shadow virtual address into one operationWhen compiling kernel source 'make -j $(nproc)' with the up-and-runningKASAN-enabled kernel on a 256-core machine, the following soft lockup isshown:watchdog: BUG: soft lockup - CPU#28 stuck for 22s! [kworker/28:1:1760]CPU: 28 PID: 1760 Comm: kworker/28:1 Kdump: loaded Not tainted 6.10.0-rc5 #95Workqueue: events drain_vmap_area_workRIP: 0010:smp_call_function_many_cond+0x1d8/0xbb0Code: 38 c8 7c 08 84 c9 0f 85 49 08 00 00 8b 45 08 a8 01 74 2e 48 89 f1 49 89 f7 48 c1 e9 03 41 83 e7 07 4c 01 e9 41 83 c7 03 f3 90 <0f> b6 01 41 38 c7 7c 08 84 c0 0f 85 d4 06 00 00 8b 45 08 a8 01 75RSP: 0018:ffffc9000cb3fb60 EFLAGS: 00000202RAX: 0000000000000011 RBX: ffff8883bc4469c0 RCX: ffffed10776e9949RDX: 0000000000000002 RSI: ffff8883bb74ca48 RDI: ffffffff8434dc50RBP: ffff8883bb74ca40 R08: ffff888103585dc0 R09: ffff8884533a1800R10: 0000000000000004 R11: ffffffffffffffff R12: ffffed1077888d39R13: dffffc0000000000 R14: ffffed1077888d38 R15: 0000000000000003FS: 0000000000000000(0000) GS:ffff8883bc400000(0000) knlGS:0000000000000000CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033CR2: 00005577b5c8d158 CR3: 0000000004850000 CR4: 0000000000350ef0Call Trace:
No PoCs from references.
- https://github.com/cku-heise/euvd-api-doc