In the Linux kernel, the following vulnerability has been resolved:
rcu/nocb: Fix WARN_ON_ONCE() in the rcu_nocb_bypass_lock()
For the kernels built with CONFIG_RCU_NOCB_CPU_DEFAULT_ALL=y and
CONFIG_RCU_LAZY=y, the following scenarios will trigger WARN_ON_ONCE()
in the rcu_nocb_bypass_lock() and rcu_nocb_wait_contended() functions:
CPU2 CPU11
kthread
rcu_nocb_cb_kthread ksys_write
rcu_do_batch vfs_write
rcu_torture_timer_cb proc_sys_write
__kmem_cache_free proc_sys_call_handler
kmemleak_free drop_caches_sysctl_handler
delete_object_full drop_slab
__delete_object shrink_slab
put_object lazy_rcu_shrink_scan
call_rcu rcu_nocb_flush_bypass
__call_rcu_commn rcu_nocb_bypass_lock
raw_spin_trylock(&rdp->nocb_bypass_lock) fail
atomic_inc(&rdp->nocb_lock_contended);
rcu_nocb_wait_contended WARN_ON_ONCE(smp_processor_id() != rdp->cpu);
WARN_ON_ONCE(atomic_read(&rdp->nocb_lock_contended)) |
|_ _ _ _ _ _ _ _ _ _same rdp and rdp->cpu != 11_ _ _ _ _ _ _ _ _ __|
Reproduce this bug with "echo 3 > /proc/sys/vm/drop_caches".
This commit therefore uses rcu_nocb_try_flush_bypass() instead of
rcu_nocb_flush_bypass() in lazy_rcu_shrink_scan(). If the nocb_bypass
queue is being flushed, then rcu_nocb_try_flush_bypass will return
directly.
References
Configurations
Configuration 1 (hide)
|
History
30 Dec 2024, 19:56
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://git.kernel.org/stable/c/4d58c9fb45c70e62c19e8be3f3605889c47601bc - Patch | |
References | () https://git.kernel.org/stable/c/927d1f4f77e4784ab3944a9df86ab14d1cd3185a - Patch | |
References | () https://git.kernel.org/stable/c/dda98810b552fc6bf650f4270edeebdc2f28bd3f - Patch | |
First Time |
Linux linux Kernel
Linux |
21 Nov 2024, 09:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.kernel.org/stable/c/4d58c9fb45c70e62c19e8be3f3605889c47601bc - | |
References | () https://git.kernel.org/stable/c/927d1f4f77e4784ab3944a9df86ab14d1cd3185a - | |
References | () https://git.kernel.org/stable/c/dda98810b552fc6bf650f4270edeebdc2f28bd3f - | |
Summary |
|
20 May 2024, 13:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-19 11:15
Updated : 2024-12-30 19:56
NVD link : CVE-2024-35929
Mitre link : CVE-2024-35929
CVE.ORG link : CVE-2024-35929
JSON object : View
Products Affected
linux
- linux_kernel
CWE