{"id":"CVE-2022-48986","summary":"mm/gup: fix gup_pud_range() for dax","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nmm/gup: fix gup_pud_range() for dax\n\nFor dax pud, pud_huge() returns true on x86. So the function works as long\nas hugetlb is configured. However, dax doesn't depend on hugetlb.\nCommit 414fd080d125 (\"mm/gup: fix gup_pmd_range() for dax\") fixed\ndevmap-backed huge PMDs, but missed devmap-backed huge PUDs. Fix this as\nwell.\n\nThis fixes the below kernel panic:\n\ngeneral protection fault, probably for non-canonical address 0x69e7c000cc478: 0000 [#1] SMP\n\t\u003c snip \u003e\nCall Trace:\n\u003cTASK\u003e\nget_user_pages_fast+0x1f/0x40\niov_iter_get_pages+0xc6/0x3b0\n? mempool_alloc+0x5d/0x170\nbio_iov_iter_get_pages+0x82/0x4e0\n? bvec_alloc+0x91/0xc0\n? bio_alloc_bioset+0x19a/0x2a0\nblkdev_direct_IO+0x282/0x480\n? __io_complete_rw_common+0xc0/0xc0\n? filemap_range_has_page+0x82/0xc0\ngeneric_file_direct_write+0x9d/0x1a0\n? inode_update_time+0x24/0x30\n__generic_file_write_iter+0xbd/0x1e0\nblkdev_write_iter+0xb4/0x150\n? io_import_iovec+0x8d/0x340\nio_write+0xf9/0x300\nio_issue_sqe+0x3c3/0x1d30\n? sysvec_reschedule_ipi+0x6c/0x80\n__io_queue_sqe+0x33/0x240\n? fget+0x76/0xa0\nio_submit_sqes+0xe6a/0x18d0\n? __fget_light+0xd1/0x100\n__x64_sys_io_uring_enter+0x199/0x880\n? __context_tracking_enter+0x1f/0x70\n? irqentry_exit_to_user_mode+0x24/0x30\n? irqentry_exit+0x1d/0x30\n? __context_tracking_exit+0xe/0x70\ndo_syscall_64+0x3b/0x90\nentry_SYSCALL_64_after_hwframe+0x61/0xcb\nRIP: 0033:0x7fc97c11a7be\n\t\u003c snip \u003e\n\u003c/TASK\u003e\n---[ end trace 48b2e0e67debcaeb ]---\nRIP: 0010:internal_get_user_pages_fast+0x340/0x990\n\t\u003c snip \u003e\nKernel panic - not syncing: Fatal exception\nKernel Offset: disabled","modified":"2026-05-18T05:55:49.805352360Z","published":"2024-10-21T20:06:02.502Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48986.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/04edfa3dc06ecfc6133a33bc7271298782dee875"},{"type":"WEB","url":"https://git.kernel.org/stable/c/3ac29732a2ffa64c7de13a072b0f2848b9c11037"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e06d13c36ded750c72521b600293befebb4e56c5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f1cf856123ceb766c49967ec79b841030fa1741f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fcd0ccd836ffad73d98a66f6fea7b16f735ea920"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/48xxx/CVE-2022-48986.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-48986"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"414fd080d125408cb15d04ff4907e1dd8145c8c7"},{"fixed":"04edfa3dc06ecfc6133a33bc7271298782dee875"},{"fixed":"f1cf856123ceb766c49967ec79b841030fa1741f"},{"fixed":"3ac29732a2ffa64c7de13a072b0f2848b9c11037"},{"fixed":"e06d13c36ded750c72521b600293befebb4e56c5"},{"fixed":"fcd0ccd836ffad73d98a66f6fea7b16f735ea920"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"0"},{"last_affected":"c133d8eb894cb280f331608c6f1962ba9fbfe6b0"},{"last_affected":"538162d21ac877b060dc057c89f13718f5caffc5"},{"last_affected":"8b1a7762e0dac5db42a003009fdcb425f10baa07"}]}],"versions":["v4.19.30","v4.14.107","v4.9.164","v4.9.163","v4.14.106","v4.19.29","v4.9.162","v4.14.105","v4.19.28","v4.19.27","v4.19.26","v4.14.104","v4.9.161","v4.19.25","v4.14.103","v4.9.160","v4.19.24","v4.14.102","v4.9.159","v4.19.23","v4.14.101","v4.9.158","v4.19.22","v4.14.100","v4.9.157","v4.19.21","v4.14.99","v4.9.156","v4.19.20","v4.14.98","v4.9.155","v4.9.154","v4.14.97","v4.19.19","v4.19.18","v4.14.96","v4.9.153","v4.9.152","v4.14.95","v4.19.17","v4.9.151","v4.14.94","v4.19.16","v4.19","v4.9.150","v4.14.93","v4.19.15","v4.9.149","v4.14.92","v4.19.14","v4.19.13","v4.14.91","v4.9.148","v4.9.147","v4.14.90","v4.19.12","v4.19.11","v4.14.89","v4.9.146","v4.19.10","v4.9.145","v4.14.88","v4.19.9","v4.9.144","v4.14.87","v4.19.8","v4.9.143","v4.14.86","v4.19.7","v4.9.142","v4.14.85","v4.19.6","v4.9.141","v4.14.84","v4.19.5","v4.19.4","v4.14.83","v4.9.140","v4.9.139","v4.9.138","v4.14.82","v4.19.3","v4.9.137","v4.14.81","v4.19.2","v4.9.136","v4.14.80","v4.19.1","v4.14.79","v4.9.135","v4.14.78","v4.19-rc2","v4.19-rc8","v4.19-rc4","v4.9.134","v4.14.77","v4.19-rc1","v4.14.76","v4.9.133","v4.19-rc7","v4.14.75","v4.9.132","v4.14.74","v4.9.131","v4.19-rc6","v4.19-rc5","v4.9.130","v4.14.73","v4.19-rc3","v4.9.129","v4.14.72","v4.14.71","v4.9.128","v4.9.127","v4.14.70","v4.14.69","v4.9.126","v4.9.125","v4.14.68","v4.14.67","v4.9.124","v4.9.123","v4.14.66","v4.18","v4.9.122","v4.14.65","v4.14.64","v4.9.121","v4.14.63","v4.9.120","v4.18-rc1","v4.9.119","v4.14.62","v4.18-rc8","v4.18-rc2","v4.18-rc5","v4.9.118","v4.14.61","v4.18-rc6","v4.9.117","v4.14.60","v4.18-rc7","v4.9.116","v4.14.59","v4.17","v4.14.58","v4.9.115","v4.18-rc3","v4.14.57","v4.9.114","v4.14.56","v4.9.113","v4.18-rc4","v4.14.55","v4.9.112","v4.14.54","v4.9.111","v4.14.53","v4.14.52","v4.9.110","v4.9.109","v4.14.51","v4.14.50","v4.9.108","v4.14.49","v4.9.107","v4.14.48","v4.17-rc1","v4.9.106","v4.14.47","v4.9.105","v4.17-rc2","v4.17-rc7","v4.17-rc3","v4.17-rc4","v4.16","v4.14.46","v4.9.104","v4.14.45","v4.17-rc6","v4.14.44","v4.9.103","v4.17-rc5","v4.14.43","v4.9.102","v4.14.42","v4.9.101","v4.9.100","v4.14.41","v4.14.40","v4.9.99","v4.14.39","v4.9.98","v4.9.97","v4.14.38","v4.14.37","v4.9.96","v4.14.36","v4.14.35","v4.9.95","v4.9.94","v4.14.34","v4.9.93","v4.14.33","v4.16-rc7","v4.16-rc4","v4.14.32","v4.9.92","v4.16-rc1","v4.16-rc2","v4.16-rc5","v4.9.91","v4.14.31","v4.9.90","v4.14.30","v4.16-rc3","v4.16-rc6","v4.14.29","v4.9.89","v4.9.88","v4.14.28","v4.14.27","v4.9.87","v4.14.26","v4.14.25","v4.9.86","v4.14.24","v4.14","v4.14.23","v4.9.85","v4.15","v4.14.22","v4.9.84","v4.14.21","v4.9.83","v4.9.82","v4.14.20","v4.9.81","v4.14.19","v4.9.80","v4.14.18","v4.14.17","v4.15-rc1","v4.14.16","v4.9.79","v4.15-rc4","v4.14.15","v4.9.78","v4.15-rc9","v4.14.14","v4.9.77","v4.15-rc8","v4.15-rc7","v4.14.13","v4.9.76","v4.15-rc3","v4.15-rc2","v4.15-rc5","v4.15-rc6","v4.14.12","v4.9.75","v4.14.11","v4.9.74","v4.9.73","v4.14.10","v4.14.9","v4.9.72","v4.14.8","v4.9.71","v4.14.7","v4.9.70","v4.14.6","v4.9.69","v4.14.5","v4.9.68","v4.14.4","v4.9.67","v4.14.3","v4.9.66","v4.14.2","v4.9.65","v4.14-rc1","v4.14.1","v4.9.64","v4.14-rc7","v4.9.63","v4.9.62","v4.9.61","v4.14-rc3","v4.13","v4.14-rc8","v4.9.60","v4.14-rc4","v4.14-rc6","v4.9.59","v4.14-rc2","v4.14-rc5","v4.9.58","v4.9.57","v4.9.56","v4.9.55","v4.9.54","v4.9.53","v4.9.52","v4.9.51","v4.13-rc2","v4.9.50","v4.9.49","v4.9.48","v4.13-rc1","v4.13-rc3","v4.9.47","v4.13-rc7","v4.9.46","v4.13-rc4","v4.13-rc5","v4.13-rc6","v4.9.45","v4.9.44","v4.9.43","v4.9.42","v4.9.41","v4.9.40","v4.12-rc1","v4.9.39","v4.12","v4.9.38","v4.9.37","v4.12-rc5","v4.9.36","v4.12-rc7","v4.9.35","v4.12-rc6","v4.12-rc4","v4.9.34","v4.12-rc2","v4.9.33","v4.12-rc3","v4.9.32","v4.11","v4.9.31","v4.9.30","v4.9.29","v4.9.28","v4.9.27","v4.11-rc1","v4.9.26","v4.11-rc6","v4.9.25","v4.11-rc8","v4.9.24","v4.11-rc7","v4.11-rc3","v4.9.23","v4.11-rc5","v4.11-rc2","v4.9.22","v4.11-rc4","v4.9.21","v4.9.20","v4.9.19","v4.9.18","v4.10","v4.9.17","v4.9.16","v4.9.15","v4.9.14","v4.9.13","v4.9","v4.9.12","v4.9.11","v4.10-rc8","v4.10-rc3","v4.10-rc1","v4.10-rc7","v4.9.10","v4.10-rc6","v4.10-rc2","v4.9.9","v4.10-rc5","v4.9.8","v4.9.7","v4.9.6","v4.10-rc4","v4.9.5","v4.9.4","v4.9.3","v4.9.2","v4.9.1","v4.9-rc7","v4.9-rc6","v4.9-rc8","v4.9-rc1","v4.9-rc5","v4.9-rc3","v4.9-rc4","v4.9-rc2","v4.8","v4.8-rc8","v4.8-rc2","v4.8-rc1","v4.8-rc7","v4.8-rc6","v4.8-rc5","v4.8-rc4","v4.8-rc3","v4.7","v4.7-rc4","v4.7-rc2","v4.7-rc1","v4.7-rc7","v4.7-rc6","v4.7-rc3","v4.7-rc5","v4.6","v4.6-rc1","v4.6-rc6","v4.6-rc4","v4.6-rc7","v4.6-rc5","v4.5-rc4","v4.6-rc2","v4.6-rc3","v4.5","v4.4","v4.5-rc1","v4.5-rc6","v4.5-rc2","v4.5-rc7","v4.5-rc5","v4.5-rc3","v4.4-rc1","v4.4-rc2","v4.4-rc8","v4.4-rc3","v4.4-rc7","v4.4-rc5","v4.4-rc6","v4.4-rc4","v4.3","v4.3-rc1","v4.3-rc6","v4.3-rc4","v4.3-rc2","v4.3-rc7","v4.3-rc5","v4.3-rc3","v4.2","v4.2-rc2","v4.2-rc1","v4.2-rc8","v4.2-rc4","v4.2-rc6","v4.2-rc7","v4.0-rc5","v4.2-rc5","v4.2-rc3","v4.1-rc2","v4.1","v4.1-rc1","v4.1-rc8","v4.1-rc7","v4.1-rc6","v4.1-rc3","v4.1-rc4","v4.0","v4.1-rc5","v4.0-rc1","v4.0-rc2","v4.0-rc7","v4.0-rc3","v4.0-rc6","v4.0-rc4","v3.19","v3.19-rc7","v3.19-rc5","v3.19-rc1","v3.19-rc6","v3.19-rc4","v3.18-rc1","v3.19-rc3","v3.19-rc2","v3.18","v3.18-rc7","v3.18-rc6","v3.18-rc2","v3.18-rc3","v3.18-rc4","v3.18-rc5","v3.17","v3.17-rc1","v3.17-rc7","v3.17-rc2","v3.17-rc4","v3.16","v3.17-rc5","v3.17-rc6","v3.17-rc3","v3.16-rc7","v3.16-rc1","v3.16-rc3","v3.16-rc5","v3.16-rc6","v3.16-rc2","v3.16-rc4","v3.13","v3.15","v3.15-rc5","v3.15-rc8","v3.15-rc1","v3.15-rc6","v3.15-rc3","v3.15-rc7","v3.15-rc2","v3.15-rc4","v3.14","v3.14-rc4","v3.14-rc8","v3.14-rc7","v3.14-rc6","v3.14-rc1","v3.14-rc2","v3.14-rc5","v3.14-rc3","v3.13-rc6","v3.13-rc8","v3.12","v3.13-rc7","v3.13-rc1","v3.13-rc4","v3.13-rc3","v3.13-rc5","v3.13-rc2","v3.12-rc7","v3.12-rc3","v3.12-rc6","v3.12-rc1","v3.12-rc5","v3.11","v3.12-rc2","v3.12-rc4","v3.11-rc7","v3.11-rc2","v3.11-rc5","v3.11-rc1","v3.11-rc3","v3.11-rc4","v3.11-rc6","v3.10-rc2","v3.10","v3.10-rc7","v3.10-rc6","v3.10-rc1","v3.10-rc5","v3.10-rc3","v3.10-rc4","v3.9","v3.9-rc2","v3.9-rc7","v3.9-rc8","v3.9-rc3","v3.9-rc6","v3.9-rc5","v3.9-rc4","v3.9-rc1","v3.8","v3.8-rc7","v3.8-rc6","v3.8-rc5","v3.8-rc2","v3.8-rc1","v3.8-rc3","v3.8-rc4","v3.7","v3.7-rc1","v3.6","v3.7-rc6","v3.7-rc7","v3.7-rc3","v3.7-rc8","v3.7-rc2","v3.7-rc4","v3.7-rc5","v3.6-rc7","v3.6-rc1","v3.5-rc3","v3.6-rc6","v3.6-rc5","v3.5","v3.6-rc3","v3.6-rc4","v3.6-rc2","v3.4-rc4","v3.5-rc7","v3.5-rc5","v3.5-rc6","v3.5-rc2","v3.5-rc1","v3.5-rc4","v3.4","v3.4-rc2","v3.4-rc1","v3.4-rc7","v3.4-rc6","v3.4-rc3","v3.4-rc5","v3.3","v3.3-rc6","v3.3-rc3","v3.3-rc7","v3.3-rc2","v3.3-rc5","v3.2","v3.3-rc4","v3.3-rc1","v3.2-rc4","v3.2-rc7","v3.2-rc6","v3.2-rc5","v3.2-rc3","v3.1","v3.2-rc2","v3.2-rc1","v3.1-rc1","v3.1-rc9","v3.1-rc8","v3.1-rc10","v3.1-rc7","v3.1-rc3","v3.1-rc2","v3.1-rc4","v3.1-rc5","v3.0","v3.1-rc6","v3.0-rc7","v3.0-rc4","v3.0-rc6","v3.0-rc5","v3.0-rc3","v3.0-rc1","v2.6.39","v3.0-rc2","v2.6.38","v2.6.39-rc2","v2.6.39-rc7","v2.6.39-rc5","v2.6.39-rc1","v2.6.38-rc7","v2.6.39-rc6","v2.6.39-rc4","v2.6.39-rc3","v2.6.37","v2.6.38-rc1","v2.6.38-rc8","v2.6.38-rc2","v2.6.38-rc6","v2.6.38-rc5","v2.6.38-rc4","v2.6.38-rc3","v2.6.37-rc4","v2.6.37-rc2","v2.6.36","v2.6.37-rc5","v2.6.37-rc8","v2.6.37-rc7","v2.6.37-rc6","v2.6.37-rc1","v2.6.37-rc3","v2.6.36-rc6","v2.6.35-rc4","v2.6.36-rc8","v2.6.35","v2.6.36-rc7","v2.6.36-rc3","v2.6.36-rc5","v2.6.36-rc4","v2.6.36-rc2","v2.6.36-rc1","v2.6.35-rc5","v2.6.35-rc6","v2.6.34","v2.6.35-rc3","v2.6.35-rc1","v2.6.35-rc2","v2.6.34-rc7","v2.6.34-rc6","v2.6.34-rc5","v2.6.34-rc4","v2.6.34-rc3","v2.6.34-rc2","v2.6.34-rc1","v2.6.33","v2.6.33-rc6","v2.6.33-rc8","v2.6.33-rc4","v2.6.33-rc5","v2.6.33-rc3","v2.6.33-rc7","v2.6.33-rc2","v2.6.32","v2.6.33-rc1","v2.6.32-rc8","v2.6.32-rc7","v2.6.32-rc6","v2.6.31","v2.6.32-rc5","v2.6.32-rc4","v2.6.32-rc2","v2.6.32-rc1","v2.6.32-rc3","v2.6.31-rc9","v2.6.31-rc1","v2.6.31-rc7","v2.6.31-rc8","v2.6.31-rc6","v2.6.30-rc6","v2.6.30","v2.6.31-rc4","v2.6.31-rc5","v2.6.31-rc3","v2.6.31-rc2","v2.6.30-rc7","v2.6.30-rc8","v2.6.30-rc5","v2.6.30-rc3","v2.6.30-rc4","v2.6.30-rc1","v2.6.30-rc2","v2.6.29","v2.6.29-rc8","v2.6.29-rc7","v2.6.29-rc5","v2.6.29-rc1","v2.6.29-rc6","v2.6.29-rc4","v2.6.29-rc3","v2.6.29-rc2","v2.6.28","v2.6.28-rc7","v2.6.28-rc9","v2.6.28-rc8","v2.6.28-rc6","v2.6.28-rc5","v2.6.28-rc4","v2.6.28-rc2","v2.6.28-rc3","v2.6.28-rc1","v2.6.27","v2.6.27-rc7","v2.6.27-rc9","v2.6.27-rc8","v2.6.27-rc5","v2.6.27-rc6","v2.6.27-rc4","v2.6.27-rc1","v2.6.27-rc3","v2.6.27-rc2","v2.6.26","v2.6.26-rc9","v2.6.26-rc8","v2.6.26-rc3","v2.6.26-rc7","v2.6.26-rc6","v2.6.26-rc5","v2.6.26-rc4","v2.6.26-rc2","v2.6.26-rc1","v2.6.25","v2.6.25-rc7","v2.6.25-rc9","v2.6.25-rc8","v2.6.25-rc6","v2.6.25-rc5","v2.6.25-rc3","v2.6.25-rc4","v2.6.24","v2.6.25-rc2","v2.6.25-rc1","v2.6.24-rc8","v2.6.24-rc7","v2.6.24-rc6","v2.6.24-rc5","v2.6.24-rc4","v2.6.24-rc3","v2.6.24-rc2","v2.6.24-rc1","v2.6.23","v2.6.23-rc9","v2.6.23-rc8","v2.6.23-rc5","v2.6.23-rc7","v2.6.23-rc6","v2.6.23-rc4","v2.6.23-rc3","v2.6.23-rc2","v2.6.23-rc1","v2.6.22","v2.6.22-rc7","v2.6.22-rc6","v2.6.22-rc5","v2.6.22-rc4","v2.6.22-rc3","v2.6.22-rc2","v2.6.22-rc1","v2.6.21","v2.6.21-rc7","v2.6.21-rc6","v2.6.21-rc5","v2.6.21-rc4","v2.6.21-rc3","v2.6.21-rc2","v2.6.21-rc1","v2.6.20-rc7","v2.6.20-rc6","v2.6.20-rc5","v2.6.20-rc4","v2.6.20-rc3","v2.6.20-rc1","v2.6.20-rc2","v2.6.19-rc2","v2.6.18","v2.6.19-rc1","v2.6.18-rc6","v2.6.18-rc5","v2.6.18-rc3","v2.6.18-rc2","v2.6.18-rc1","v2.6.17","v2.6.17-rc4","v2.6.17-rc6","v2.6.17-rc5","v2.6.17-rc3","v2.6.17-rc2","v2.6.17-rc1","v2.6.16","v2.6.16-rc6","v2.6.16-rc4","v2.6.16-rc5","v2.6.16-rc3","v2.6.16-rc2","v2.6.16-rc1","v2.6.15-rc7","v2.6.15-rc5","v2.6.15-rc4","v2.6.15-rc2","v2.6.15-rc1","v2.6.14-rc3","v2.6.14-rc2","v2.6.14-rc1","v2.6.13","v2.6.13-rc7","v2.6.13-rc6","v2.6.13-rc5","v2.6.13-rc3","v2.6.13-rc4","v2.6.13-rc2","v2.6.13-rc1","v2.6.12-rc4","v2.6.12-rc3","v2.6.12-rc2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48986.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.0.0"},{"fixed":"5.4.227"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.5.0"},{"fixed":"5.10.159"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.83"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.0.13"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-48986.json"}}],"schema_version":"1.7.5"}