We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-50138

bpf: Use raw_spinlock_t in ringbuf



Description

In the Linux kernel, the following vulnerability has been resolved: bpf: Use raw_spinlock_t in ringbuf The function __bpf_ringbuf_reserve is invoked from a tracepoint, which disables preemption. Using spinlock_t in this context can lead to a "sleep in atomic" warning in the RT variant. This issue is illustrated in the example below: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 556208, name: test_progs preempt_count: 1, expected: 0 RCU nest depth: 1, expected: 1 INFO: lockdep is turned off. Preemption disabled at: [<ffffd33a5c88ea44>] migrate_enable+0xc0/0x39c CPU: 7 PID: 556208 Comm: test_progs Tainted: G Hardware name: Qualcomm SA8775P Ride (DT) Call trace: dump_backtrace+0xac/0x130 show_stack+0x1c/0x30 dump_stack_lvl+0xac/0xe8 dump_stack+0x18/0x30 __might_resched+0x3bc/0x4fc rt_spin_lock+0x8c/0x1a4 __bpf_ringbuf_reserve+0xc4/0x254 bpf_ringbuf_reserve_dynptr+0x5c/0xdc bpf_prog_ac3d15160d62622a_test_read_write+0x104/0x238 trace_call_bpf+0x238/0x774 perf_call_bpf_enter.isra.0+0x104/0x194 perf_syscall_enter+0x2f8/0x510 trace_sys_enter+0x39c/0x564 syscall_trace_enter+0x220/0x3c0 do_el0_svc+0x138/0x1dc el0_svc+0x54/0x130 el0t_64_sync_handler+0x134/0x150 el0t_64_sync+0x17c/0x180 Switch the spinlock to raw_spinlock_t to avoid this error.

Reserved 2024-10-21 | Published 2024-11-05 | Updated 2024-11-19 | Assigner Linux

Product status

Default status
unaffected

457f44363a88 before 5eb34999d118
affected

457f44363a88 before ca30e682e5d6
affected

457f44363a88 before 8b62645b09f8
affected

Default status
affected

5.8
affected

Any version before 5.8
unaffected

6.1.115
unaffected

6.11.6
unaffected

6.12
unaffected

References

git.kernel.org/...c/5eb34999d118e69a20dc0c6556f315fcb0a1f8d3

git.kernel.org/...c/ca30e682e5d6de44d12c4610767811c9a21d59ba

git.kernel.org/...c/8b62645b09f870d70c7910e7550289d444239a46

cve.org (CVE-2024-50138)

nvd.nist.gov (CVE-2024-50138)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-50138

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.