296,202
Total vulnerabilities in the database
In the Linux kernel, the following vulnerability has been resolved:
mm/swapfile: add cond_resched() in get_swap_pages()
The softlockup still occurs in get_swap_pages() under memory pressure. 64 CPU cores, 64GB memory, and 28 zram devices, the disksize of each zram device is 50MB with same priority as si. Use the stress-ng tool to increase memory pressure, causing the system to oom frequently.
The plist_for_each_entry_safe() loops in get_swap_pages() could reach tens of thousands of times to find available space (extreme case: cond_resched() is not called in scan_swap_map_slots()). Let's add cond_resched() into get_swap_pages() when failed to find available space to avoid softlockup.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 6.2-rc1 | 6.2-rc1.x |
linux / linux_kernel | 6.2-rc2 | 6.2-rc2.x |
linux / linux_kernel | 6.2-rc3 | 6.2-rc3.x |
linux / linux_kernel | 6.2-rc4 | 6.2-rc4.x |
linux / linux_kernel | 6.2-rc5 | 6.2-rc5.x |
linux / linux_kernel | 6.2-rc6 | 6.2-rc6.x |
linux / linux_kernel | - | 4.14.306 |
linux / linux_kernel | 4.15 | 4.19.273 |
linux / linux_kernel | 4.20 | 5.4.232 |
linux / linux_kernel | 5.5 | 5.10.168 |
linux / linux_kernel | 5.11 | 5.15.93 |
linux / linux_kernel | 5.16 | 6.1.11 |