{"id":"CVE-2023-52835","summary":"perf/core: Bail out early if the request AUX area is out of bound","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Bail out early if the request AUX area is out of bound\n\nWhen perf-record with a large AUX area, e.g 4GB, it fails with:\n\n    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n    failed to mmap with 12 (Cannot allocate memory)\n\nand it reveals a WARNING with __alloc_pages():\n\n\t------------[ cut here ]------------\n\tWARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248\n\tCall trace:\n\t __alloc_pages+0x1ec/0x248\n\t __kmalloc_large_node+0xc0/0x1f8\n\t __kmalloc_node+0x134/0x1e8\n\t rb_alloc_aux+0xe0/0x298\n\t perf_mmap+0x440/0x660\n\t mmap_region+0x308/0x8a8\n\t do_mmap+0x3c0/0x528\n\t vm_mmap_pgoff+0xf4/0x1b8\n\t ksys_mmap_pgoff+0x18c/0x218\n\t __arm64_sys_mmap+0x38/0x58\n\t invoke_syscall+0x50/0x128\n\t el0_svc_common.constprop.0+0x58/0x188\n\t do_el0_svc+0x34/0x50\n\t el0_svc+0x34/0x108\n\t el0t_64_sync_handler+0xb8/0xc0\n\t el0t_64_sync+0x1a4/0x1a8\n\n'rb-\u003eaux_pages' allocated by kcalloc() is a pointer array which is used to\nmaintains AUX trace pages. The allocated page for this array is physically\ncontiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the\nsize of pointer array crosses the limitation set by MAX_ORDER, it reveals a\nWARNING.\n\nSo bail out early with -ENOMEM if the request AUX area is out of bound,\ne.g.:\n\n    #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n    failed to mmap with 12 (Cannot allocate memory)","modified":"2026-04-02T09:43:23.814954Z","published":"2024-05-21T15:31:36.239Z","related":["ALSA-2024:4352","SUSE-SU-2024:2360-1","SUSE-SU-2024:2372-1","SUSE-SU-2024:2381-1","SUSE-SU-2024:2394-1","SUSE-SU-2024:2561-1","SUSE-SU-2024:2571-1","SUSE-SU-2024:2896-1","SUSE-SU-2024:2939-1","SUSE-SU-2024:2973-1","SUSE-SU-2025:20008-1","SUSE-SU-2025:20028-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52835.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916"},{"type":"WEB","url":"https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52835.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-52835"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"45bfb2e50471abbbfd83d40d28c986078b0d24ff"},{"fixed":"8c504f615d7ed60ae035c51d0c789137ced6797f"},{"fixed":"788c0b3442ead737008934947730a6d1ff703734"},{"fixed":"1a2a4202c60fcdffbf04f259002ce9bff39edece"},{"fixed":"fd0df3f8719201dbe61a4d39083d5aecd705399a"},{"fixed":"9ce4e87a8efd37c85766ec08b15e885cab08553a"},{"fixed":"2424410f94a94d91230ced094062d859714c984a"},{"fixed":"2e905e608e38cf7f8dcddcf8a6036e91a78444cb"},{"fixed":"54aee5f15b83437f23b2b2469bcf21bdd9823916"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52835.json"}}],"schema_version":"1.7.5"}