CVE-2022-49522
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
26/02/2025
Last modified:
26/02/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mmc: jz4740: Apply DMA engine limits to maximum segment size<br />
<br />
Do what is done in other DMA-enabled MMC host drivers (cf. host/mmci.c) and<br />
limit the maximum segment size based on the DMA engine&#39;s capabilities. This<br />
is needed to avoid warnings like the following with CONFIG_DMA_API_DEBUG=y.<br />
<br />
------------[ cut here ]------------<br />
WARNING: CPU: 0 PID: 21 at kernel/dma/debug.c:1162 debug_dma_map_sg+0x2f4/0x39c<br />
DMA-API: jz4780-dma 13420000.dma-controller: mapping sg segment longer than device claims to support [len=98304] [max=65536]<br />
CPU: 0 PID: 21 Comm: kworker/0:1H Not tainted 5.18.0-rc1 #19<br />
Workqueue: kblockd blk_mq_run_work_fn<br />
Stack : 81575aec 00000004 80620000 80620000 80620000 805e7358 00000009 801537ac<br />
814c832c 806276e3 806e34b4 80620000 81575aec 00000001 81575ab8 09291444<br />
00000000 00000000 805e7358 81575958 ffffffea 8157596c 00000000 636f6c62<br />
6220646b 80387a70 0000000f 6d5f6b6c 80620000 00000000 81575ba4 00000009<br />
805e170c 80896640 00000001 00010000 00000000 00000000 00006098 806e0000<br />
...<br />
Call Trace:<br />
[] show_stack+0x84/0x120<br />
[] __warn+0xb8/0xec<br />
[] warn_slowpath_fmt+0x6c/0xb8<br />
[] debug_dma_map_sg+0x2f4/0x39c<br />
[] __dma_map_sg_attrs+0xf0/0x118<br />
[] dma_map_sg_attrs+0x14/0x28<br />
[] jz4740_mmc_prepare_dma_data+0x74/0xa4<br />
[] jz4740_mmc_pre_request+0x30/0x54<br />
[] mmc_blk_mq_issue_rq+0x6e0/0x7bc<br />
[] mmc_mq_queue_rq+0x220/0x2d4<br />
[] blk_mq_dispatch_rq_list+0x480/0x664<br />
[] blk_mq_do_dispatch_sched+0x2dc/0x370<br />
[] __blk_mq_sched_dispatch_requests+0xec/0x164<br />
[] blk_mq_sched_dispatch_requests+0x44/0x94<br />
[] __blk_mq_run_hw_queue+0xb0/0xcc<br />
[] process_one_work+0x1b8/0x264<br />
[] worker_thread+0x2ec/0x3b8<br />
[] kthread+0x104/0x10c<br />
[] ret_from_kernel_thread+0x14/0x1c<br />
<br />
---[ end trace 0000000000000000 ]---
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/353298cadbd4c7d8e8a16d6000066414694933c3
- https://git.kernel.org/stable/c/7923f95997a79cef2ad161a2facae64c25a0bca0
- https://git.kernel.org/stable/c/807f90f1960a59dc557542b818c484a8db9ac978
- https://git.kernel.org/stable/c/90281cadf5077f2d2bec8b08c2ead1f8cd12660e
- https://git.kernel.org/stable/c/a828920b9ec0d89d3011198d482b7fe224d2de19
- https://git.kernel.org/stable/c/afadb04f1d6e74b18a253403f5274cde5e3fd7bd