CVE-2026-31466
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
22/04/2026
Last modified:
07/05/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
mm/huge_memory: fix folio isn&#39;t locked in softleaf_to_folio()<br />
<br />
On arm64 server, we found folio that get from migration entry isn&#39;t locked<br />
in softleaf_to_folio(). This issue triggers when mTHP splitting and<br />
zap_nonpresent_ptes() races, and the root cause is lack of memory barrier<br />
in softleaf_to_folio(). The race is as follows:<br />
<br />
CPU0 CPU1<br />
<br />
deferred_split_scan() zap_nonpresent_ptes()<br />
lock folio<br />
split_folio()<br />
unmap_folio()<br />
change ptes to migration entries<br />
__split_folio_to_order() softleaf_to_folio()<br />
set flags(including PG_locked) for tail pages folio = pfn_folio(softleaf_to_pfn(entry))<br />
smp_wmb() VM_WARN_ON_ONCE(!folio_test_locked(folio))<br />
prep_compound_page() for tail pages<br />
<br />
In __split_folio_to_order(), smp_wmb() guarantees page flags of tail pages<br />
are visible before the tail page becomes non-compound. smp_wmb() should<br />
be paired with smp_rmb() in softleaf_to_folio(), which is missed. As a<br />
result, if zap_nonpresent_ptes() accesses migration entry that stores tail<br />
pfn, softleaf_to_folio() may see the updated compound_head of tail page<br />
before page->flags.<br />
<br />
This issue will trigger VM_WARN_ON_ONCE() in pfn_swap_entry_folio()<br />
because of the race between folio split and zap_nonpresent_ptes()<br />
leading to a folio incorrectly undergoing modification without a folio<br />
lock being held.<br />
<br />
This is a BUG_ON() before commit 93976a20345b ("mm: eliminate further<br />
swapops predicates"), which in merged in v6.19-rc1.<br />
<br />
To fix it, add missing smp_rmb() if the softleaf entry is migration entry<br />
in softleaf_to_folio() and softleaf_to_page().<br />
<br />
[tujinjiang@huawei.com: update function name and comments]
Impact
Base Score 3.x
4.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.5 (including) | 5.10.253 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.203 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.168 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.134 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.81 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.18.21 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.19 (including) | 6.19.11 (excluding) |
| cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/426ee10711586617da869c8bb798214965337617
- https://git.kernel.org/stable/c/4c5e7f0fcd592801c9cc18f29f80fbee84eb8669
- https://git.kernel.org/stable/c/722cfaf6b31d31123439e67b5deac6b1261a3dea
- https://git.kernel.org/stable/c/7ad1997b9bc8032603df8f091761114479285769
- https://git.kernel.org/stable/c/7ddcf4a245c1c5a91fdd9698757e3d95179ffe41
- https://git.kernel.org/stable/c/8bfb8414e9f2ce6f5f2f0e3d0da52f2d132128e7
- https://git.kernel.org/stable/c/b8c49ad888892ad7b77062b9c102b799a3e9b4f8
- https://git.kernel.org/stable/c/f1acf5887c2bbaf998dc3fe32c72b7a8b84a3ddd



