In the Linux kernel, the following vulnerability has been resolved:
debugobjects: Don't wake up kswapd from fill_pool()
syzbot is reporting a lockdep warning in fillpool() because the allocation from debugobjects is using GFPATOMIC, which is (_GFPHIGH | _GFPKSWAPDRECLAIM) and therefore tries to wake up kswapd, which acquires kswapdwait::lock.
Since fillpool() might be called with arbitrary locks held, fillpool() should not assume that acquiring kswapd_wait::lock is safe.
Use GFPHIGH instead and remove _GFPNORETRY as it is pointless for !GFPDIRECT_RECLAIM allocation.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54268.json"
}