Home

Description

In the Linux kernel, the following vulnerability has been resolved: gfs2: Prevent recursive memory reclaim Function new_inode() returns a new inode with inode->i_mapping->gfp_mask set to GFP_HIGHUSER_MOVABLE. This value includes the __GFP_FS flag, so allocations in that address space can recurse into filesystem memory reclaim. We don't want that to happen because it can consume a significant amount of stack memory. Worse than that is that it can also deadlock: for example, in several places, gfs2_unstuff_dinode() is called inside filesystem transactions. This calls filemap_grab_folio(), which can allocate a new folio, which can trigger memory reclaim. If memory reclaim recurses into the filesystem and starts another transaction, a deadlock will ensue. To fix these kinds of problems, prevent memory reclaim from recursing into filesystem code by making sure that the gfp_mask of inode address spaces doesn't include __GFP_FS. The "meta" and resource group address spaces were already using GFP_NOFS as their gfp_mask (which doesn't include __GFP_FS). The default value of GFP_HIGHUSER_MOVABLE is less restrictive than GFP_NOFS, though. To avoid being overly limiting, use the default value and only knock off the __GFP_FS flag. I'm not sure if this will actually make a difference, but it also shouldn't hurt. This patch is loosely based on commit ad22c7a043c2 ("xfs: prevent stack overflows from page cache allocation"). Fixes xfstest generic/273.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-24 | Updated 2025-12-24 | Assigner Linux

Product status

Default status
unaffected

dc0b9435238c1a68150c798c9c7a1b5d7414cbb9 (git) before edb2b255618621dc83d0ec23150e16b2c697077f
affected

dc0b9435238c1a68150c798c9c7a1b5d7414cbb9 (git) before 9c0960ed112398bdb6c60ccf6e6b583bc59acede
affected

dc0b9435238c1a68150c798c9c7a1b5d7414cbb9 (git) before 49e7347f4644d031306d56cb4d51e467cbdcbc69
affected

dc0b9435238c1a68150c798c9c7a1b5d7414cbb9 (git) before 2c5f4a53476e3cab70adc77b38942c066bd2c17c
affected

Default status
affected

6.6
affected

Any version before 6.6
unaffected

6.12.63 (semver)
unaffected

6.17.13 (semver)
unaffected

6.18.2 (semver)
unaffected

6.19-rc1 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/edb2b255618621dc83d0ec23150e16b2c697077f

git.kernel.org/...c/9c0960ed112398bdb6c60ccf6e6b583bc59acede

git.kernel.org/...c/49e7347f4644d031306d56cb4d51e467cbdcbc69

git.kernel.org/...c/2c5f4a53476e3cab70adc77b38942c066bd2c17c

cve.org (CVE-2025-68356)

nvd.nist.gov (CVE-2025-68356)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.